Internet of Things (IoT)

Internet of Things (IoT)

iot for seucriyt

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...
inernational standard

The Internet of Things continues to grow at a rapid pace across a range of sectors. Most applications deploy existing technology and combine this...
resupply chain

Connected and smart devices can monitor logistical supply chains efficiently, tracking items and verifying the status of various assets. The US Department of Defense...
iot for security

Attend the largest and leading conference in Israel on IoT (Internet of Things) from the security perspective on December 24th, 2018. The IoT for Security...
connectivity

Light will receive a strategic meaning as the new intelligent language in the digital age, especially with the arrival of the Internet of Things...
security accelerator

Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...

The largest and leading conference in Israel on IoT (Internet of Things) from the security perspective will be held on December 24th, 2018. The IoT...

Firefighters, law enforcement officers and other first responders have to be constantly connected. Legacy communication systems or smartphones are not always the right and...
communications

The United Nations has been upgrading its communications network. Currently, there are 14 peacekeeping operations around the world led by the United Nations. These...
IOT security

Cloudflare, the internet infrastructure and networking giant, has been expanding its focus to include mobile privacy and the security of connected devices. On November 11,...
bluetooth chip

Wireless access points can come in many forms, such as a router or an internet of things device. If a hacker gains access to...
pilot

An off-the-shelf commercial helicopter was recently modified to fly itself in typical military missions, including supply runs, medevac, and reconnaissance. The long-term goal: Design...
cyber

The recent wave of ransomware attacks and preceding waves of cyber breaches could make it appear as though cyber criminals want their pay-off immediately....
5g network

5G wireless network deployments at major world events such as the 2018 Winter Games in PyeongChang have shown the great potential of a 5G-driven...
Processor

The first artificial intelligence processor that is a deep neural-network accelerator, delivering both high operational capability and high energy conversion efficiency for a full...
nuclear

A scary yet realistic scenario in the digital age could involve the following: attackers, sponsored by a rogue organization or radical state, gain access...
Cryptomining

Author: Aryeh Danon, Data Security Department Manager at Abnet Communications, distributing Sophos solutions in Israel. Hackers have discovered a new way to take advantage...
terrorism

Asymmetric warfare, meaning conventional militaries combatting guerrilla and terrorist organizations, has long posed a challenge for states. New technology combining mobile platforms with the...
Router

Securing our routers and ensuring they are safe and protected is sometimes neglected by many. It is essential to check your router settings and...
IoT

Cybersecurity is an ongoing concern for many, especially with the proliferation of Internet of Things (IoT) technologies. The importance of securing IoT is increasingly...
Smart Patrolling

Two leading tech-based companies are collaborating in order to provide law enforcement with Smart Patrolling, the first in-car camera video system, powered by artificial...
Pocket Notepad

The IDF’s training camp in the Negev, “Ir Habahadim” (the “City of Training Bases”), is known for its magnitude and innovation. The wide array...

iHLS Events