Startup in the Security Field? Join iHLS Accelerator
                Are you a disruptive startup in the security field?
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...            
            
        APT39 – Iranian Espionage Array Focusing on Personal Information
                Another Iranian cyber attack group is exposed as posing an immediate threat to Israel. The group, called APT39, is responsible for stealing a vast...            
            
        Major Power Embraces Blockchain for Cybersecurity
                Russia has decided to take a closer look at blockchain technology applications for security. The Russian Ministry of Defense has been launching a research...            
            
        Groundbreaking Tech Offers Secure Sharing of Sensitive Data
                A new technology aims to help the US Department of Homeland Security (DHS) allow sensitive data to be shared and analyzed while it remains...            
            
        Israeli Cybersecurity at Forefront of War Against Cybercrime
                The cyber incidents that dominated global headlines over the past year indicated not only a growing trend but one that is escalating in size,...            
            
        Bypassing Encryption Under Protection of Law
                In an attempt to target Islamist terrorism, pedophile networks and organized crime, several governments worldwide have been leading a policy forcing technology companies to...            
            
        Join the Game! iHLS Security Accelerator is Opening its 5th Startup...
                Apply Now!
Are you a disruptive startup in the security field? 
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for...            
            
        IoT Device Encryption Feasible with Minimal Power
                The vast array of connected industrial devices, such as embedded sensors, smart lighting, and monitoring systems, requires high levels of security. Most sensitive web...            
            
        Law Enforcement Authorities Purchase Tech to Unlock iPhones
                iPhones encrypt user data by default. Those in physical possession normally cannot access the phone’s data, such as contact list, saved messages, or photos,...            
            
        Joint Counter-Terror Intelligence and Cyber Move
                The US has been enhancing its anti-terrorist coordination measures with its allies. An agreement was recently signed by the US Homeland Security Secretary (DHS)...            
            
        Blockchain Technology Will Be Used At Russian Presidential Elections
                State-run VTSIOM will introduce cutting-edge blockchain technology for exit polls at the forthcoming Russian presidential elections. It’s designed to ensure transparency of data collection...            
            
        What is Quantum Computing and Why do We Need it?
                It appears that conventional computers are beginning to reach their limit. Quantum computers, which calculate using quantum phenomena, have been marked as the potential...            
            
        The Race to IoT Security
                Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...            
            
        Quantum Tech to Secure Financial Data
                Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...            
            
        Self-Driving Cars to Get Quantum Encryption
                In the ‘hyper-connected’ 5G communications networks era, the issue of “network security” becomes critical. A quantum-safe technology can encrypt transmitted data using special quantum...            
            
        Giant Data Breach: 773 Million Passwords and Email Addresses
                More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...            
            
        Coming Soon! Prestigious Startup Competition for Security, Defense and HLS
                iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...            
            
        Call for Startups – Apply to iHLS Security Accelerator 8th Batch
                Are you developing a ground-breaking technology in the fields of unmanned systems, coping with COVID-19 pandemic, counter drones, border security, safe city?
We invite you...            
            
        Telegram Changes Stance on User Data Sharing Amid Criminal Concerns
                In a significant policy shift, the encrypted messaging app Telegram will now provide user data to authorities in response to legal requests regarding criminal...            
            
        Power-Saving Chip to Revolutionize IoT Network
                The IoT network is capable of connecting many different sensors integrated in civil structures, appliances, vehicles, manufacturing equipment, etc. to online servers. However, one...            
            
        Apply Now: iHLS Startup Competition for Security, Defense and HLS
                iHLS is delighted to host for the first time the prestigious Startup Competition for innovative technologies in the security, defense and homeland security fields,...            
            
        Call for Startups: Applications Now Open for iHLS Security Accelerator!
                iHLS is inviting startups in this field to join the 8th cycle of its Security Accelerator, the world’s first accelerator in the HLS field....            
            
        
 
            
