innotech

Panel Discussion Topics – INNOTECH International Live Conference Broadcast for HLS,...

0
The InnoTech 2020 International Live Conference Broadcast organized by iHLS is a unique opportunity to take a close look at the transformation caused by...
Photo illus. cyber security by Pixabay

Best HLS, Cyber & Innovation Experts at InnoTech International Live Conference...

0
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...

Privacy Concerns Over Amazon’s New Indoor Drone 

0
Amazon's new Ring Always Home Cam, a security camera is also a drone that flies around the inside of your house shooting video that...
innovation

InnoTech 2020: How COVID-19 Changed Cyber & HLS World: Special Broadcast...

0
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
image provided by pixabay

InnoTech 2020: How COVID-19 Changed Cyber & HLS World: Special Broadcast...

0
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...

Major Themes in Marine Port Security and Protection

0
By Or Shalom, security and cyber expert and adviser Marine ports have strategic importance as critical infrastructure. The ports are vital to the economy, the...
innotech

InnoTech 2020: How COVID-19 Changed Cyber & HLS World: Special Broadcast...

0
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
photo illus. cyber by Pixabay

This Invention Will Revolutionize Communication Authentication

0
Authentication is one of the core pillars of wireless communications security, along with secrecy and privacy. The value of authentication in a military setting...
photo illus. satellite by Pixabay

Soon: Jamming-Resistant GPS Signal 

0
The U.S. Space Force has completed upgrades to the Global Position System’s ground segment that will allow it to partially use a new military...
startup accelerator

Call for Startups – Apply to iHLS Security Accelerator 8th Batch

0
Are you developing a ground-breaking technology in the fields of unmanned systems, coping with COVID-19 pandemic, counter drones, border security, safe city? We invite you...
quantum computing

As Quantum Computing and IoT Merge

0
Quantum computing is still in a development stage but it is expected to accelerate us into the future by impacting the landscape of artificial...

ISIS and Hamas Use Cryptocurrency for Laundering

0
A think tank urges EU governments to collaborate on a regulatory framework for tighter regulations on money laundering by terrorist organizations. ISIS is using...
cybersecurity

Cyber Intelligence Crucial for Cybersecurity Plan Validation

0
By Or Shalom, security and cyber expert and adviser The establishment of a work plan in the cyber field is not a simple task. Alongside...

How Safe is Zoom App?

0
The Zoom video conference app has seen a huge rise in downloads since quarantines were imposed around the world. Public Zoom hangouts and working...

Prepare Now for Year Y2Q Quantum Threats

0
Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...

IoT Security – Killing the Problem at Its Source

0
In an internet-connected world where devices are networked, the security of embedded devices is essential, as they are more and more exposed to cyber...
Photo illust. AI by Pixabay

Technological Race – Will it Revolutionize Battlefield?

0
“The race to build next-generation technology is reshaping the contours of global relations.” However, new technologies like artificial intelligence “will neither cause a revolution...
quantum encryption

New Player at Quantum Cryptography Field

0
Quantum cryptography is called the “ultimate code” as it is theoretically impossible to hack. Many countries have been rushing to put quantum cryptography into...
connectivity at battlefield

Connectivity – Name of the Game at Remote Battlefield

0
Connectivity is the name of the game when it comes to coordination and information flow. The US Army’s global network GAIT (Global Agile Integrated...

Secure Communications – Enabled by 3mm Chip

0
In most leading security standards used in secure communication methods — from withdrawing cash from the ATM to purchasing goods online on the smartphone...

Quantum Supremacy Race – New Cold War

0
By harnessing the properties of quantum physics, powerful quantum computers have the potential to sort through a vast number of possibilities in nearly real...
quantum tech for security

Register! First Quantum Tech for Security Conference

0
Take a closer look at the quantum revolution at the Quantum Tech Conference on November 18, 2019 at the Lago Conference Center, Rishon LeZion. FREE...

Latest

3D-Printed Antennas Bend Without Breaking the Signal

0
A new type of 3D-printed antenna could transform how vehicles, drones, and wearable devices maintain wireless communication while in motion. Developed by researchers at...