Industrial Security

Industrial Security

Image provided by pixabay

In today's day and age, even with the modern leap of technology, construction sites are still being operated in the same way that they...
Image provided by pixabay

During 2022, we saw a rise in the sophistication and sheer number of attacks targeting industrial infrastructure. At the same time, incident response engagements...
Image provided by pixabay

The practice of using voice-controlled machines in manufacturing was previously considered prone to errors, and as a result, it was hardly ever adopted. Now,...
security. image provided by pixabay

As new technologies and capabilities have emerged in recent years, artificial intelligence and security have become intertwined, leading to a high level of safety. Artificial...
IoT. image provided by pixabay

The IoT revolution has been transforming the logistics and supply chain industries. From fleet management through in-vehicle sensors to remote temperature monitoring, and automated...

By: Or Shalom, HLS expert OT networks are continuing to pose a security risk for cyber security personnel. In addition to routine attacks, ransomware attacks...
internet. image by pixabay

From increasing the safety of roads, cars and homes, to fundamentally improving the way we manufacture and consume products, IoT solutions provide valuable data...
Image by pixabay. GPS

Global Positioning Systems (GPS) and other satellite tracking systems (GNSS) are significant and important tools that support military goals and missions, and they are...
Agriculture. image by pixabay

Nowadays, farming might look a little different than it looked 100 years ago. Using data collected by GPS, satellite imagery, internet-connected sensors and other...
Robot. image by pixabay

More and more cybercriminals are taking advantage of the deep fake technology to evade security controls and attack organizations. Researchers are seeing a 13%...
Production line. image by pixabay

Written by Or Shalom  The OT (operational technology) networks present a security challenge for cyber security officials. Such networks are kinetic networks in different sectors,...
Industry. image by pixabay

A US Robotics company is adding new artificial intelligence anomaly detection capabilities to its autonomous Scout System drone. A leading US provider of private...
IDF's School for UAV operators, photo by IDF Spokesman

A new report assesses the evolving trends in the UAV industry in Israel, in the context of various geopolitical, economical and technological influences in...
K5 Autonomous Security Robot, Photo: Business Wire

One of the S&P 500 companies in Southern California has welcomed a new employee - a robot that will be patrolling and securing an...
innotech conference

Attend INNOTECH 2021 - the International Cyber, Homeland Security Technologies and Innovation event organized by iHLS. A large two-day exhibition with national pavilions and...
biometric

The multitude of devices on ever-expanding corporate networks poses a unique challenge from the point of view of security. These IoT devices are typically...
Photo illustration Echole Polytechnic Flickr

iHLS is proud to present the International Cyber, Homeland Security Technologies, and Innovation Conference and Exhibition: INNOTECH 2021. November 17-18, 2021 at EXPO Tel Aviv,...
photo illus. cybersecurity by Pixabay

Cybersecurity vulnerabilities in an Android app that powers the Chinese DJI drone could help the Chinese government scoop up reams of information. However, there’s...
Photo EasySec Solutions at Nimrod Group

Industrial connected devices, the Industrial IoT, is a real opportunity for industries to share efficiently their resources and increase their productivity. However, network sharing...
malicious drone illustration

As drones become more prominently used, so does the misuse of these emerging technologies. New drone detection solution could protect military bases, venues, cities...
cybersecurity

Just a few days before the President Trump inauguration, 70% of Washington DC’s CCTV cameras had been infected with a ransomware causing the system...
mobile app

Mobile apps often serve for monitoring and managing machines, and even entire industrial processes. However, the combination of apps and industrial control systems makes...