Panel Discussion Topics – INNOTECH International Live Conference Broadcast for HLS,...
The InnoTech 2020 International Live Conference Broadcast organized by iHLS is a unique opportunity to take a close look at the transformation caused by...
Best HLS, Cyber & Innovation Experts at InnoTech International Live Conference...
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
Privacy Concerns Over Amazon’s New Indoor Drone
Amazon's new Ring Always Home Cam, a security camera is also a drone that flies around the inside of your house shooting video that...
InnoTech 2020: How COVID-19 Changed Cyber & HLS World: Special Broadcast...
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
InnoTech 2020: How COVID-19 Changed Cyber & HLS World: Special Broadcast...
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
Major Themes in Marine Port Security and Protection
By Or Shalom, security and cyber expert and adviser
Marine ports have strategic importance as critical infrastructure. The ports are vital to the economy, the...
InnoTech 2020: How COVID-19 Changed Cyber & HLS World: Special Broadcast...
The COVID-19 pandemic has intensified the multiple challenges states and cities are currently facing. Technology has become more and more important in our daily...
This Invention Will Revolutionize Communication Authentication
Authentication is one of the core pillars of wireless communications security, along with secrecy and privacy. The value of authentication in a military setting...
Soon: Jamming-Resistant GPS Signal
The U.S. Space Force has completed upgrades to the Global Position System’s ground segment that will allow it to partially use a new military...
Call for Startups – Apply to iHLS Security Accelerator 8th Batch
Are you developing a ground-breaking technology in the fields of unmanned systems, coping with COVID-19 pandemic, counter drones, border security, safe city?
We invite you...
As Quantum Computing and IoT Merge
Quantum computing is still in a development stage but it is expected to accelerate us into the future by impacting the landscape of artificial...
ISIS and Hamas Use Cryptocurrency for Laundering
A think tank urges EU governments to collaborate on a regulatory framework for tighter regulations on money laundering by terrorist organizations. ISIS is using...
Cyber Intelligence Crucial for Cybersecurity Plan Validation
By Or Shalom, security and cyber expert and adviser
The establishment of a work plan in the cyber field is not a simple task. Alongside...
How Safe is Zoom App?
The Zoom video conference app has seen a huge rise in downloads since quarantines were imposed around the world. Public Zoom hangouts and working...
Prepare Now for Year Y2Q Quantum Threats
Quantum computers are expected to supply the most powerful computing capabilities ever. Advances in quantum computing are finally beginning to reach commercial applications, such...
IoT Security – Killing the Problem at Its Source
In an internet-connected world where devices are networked, the security of embedded devices is essential, as they are more and more exposed to cyber...
Technological Race – Will it Revolutionize Battlefield?
“The race to build next-generation technology is reshaping the contours of global relations.” However, new technologies like artificial intelligence “will neither cause a revolution...
New Player at Quantum Cryptography Field
Quantum cryptography is called the “ultimate code” as it is theoretically impossible to hack. Many countries have been rushing to put quantum cryptography into...
Connectivity – Name of the Game at Remote Battlefield
Connectivity is the name of the game when it comes to coordination and information flow. The US Army’s global network GAIT (Global Agile Integrated...
Secure Communications – Enabled by 3mm Chip
In most leading security standards used in secure communication methods — from withdrawing cash from the ATM to purchasing goods online on the smartphone...
Quantum Supremacy Race – New Cold War
By harnessing the properties of quantum physics, powerful quantum computers have the potential to sort through a vast number of possibilities in nearly real...
Register! First Quantum Tech for Security Conference
Take a closer look at the quantum revolution at the Quantum Tech Conference on November 18, 2019 at the Lago Conference Center, Rishon LeZion.
FREE...

















































