We Are Looking for Groundbreaking Technologies
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian defense, securing government institutions, vital infrastructure and borders,...
iHLS TV Weekly Video Report – March 31st 2015
Register to iHLS Israel Homeland Security
In this weekly Video report (March 31st 2015):
Missile Defense: US Unveils Innovative AEGIS System
ISIS Recruiting In New York
The Threat:...
IoT Technologies Are Revolutionizing Smart Cities
The Internet of Things (IoT) has become widespread in all sectors, slowly changing industries ranging from manufacturing to agriculture and revolutionizing cities. The Brookings...
New Dual-Use Video Analytics Platform
A new Video IoT Platform was recently launched by Gorilla Technology at the 2017 International Security Conference (ISC West) in Las Vegas.
The Internet...
World’s Smallest Sensor Eliminates Battery Replacement Need
As the spread of IoT systems gains momentum, expectations are rising for sensor devices that support LPWA ( Low Power Wide Area) technology, which...
iHLS TV Weekly Video Report – March 24th 2015
Register to iHLS Israel Homeland Security
In this weekly Video report (March 24th 2015):
Turkey and ISIS – more than meets the eye
US Navy resting exoskeletons
ISIS’s...
Smart City – Convergence of IoT and Video Analytics
When video systems first moved from analogue to digital and then became part of the IoT world, they were primarily used to provide visual...
iHLS to Raise $20 Million for a Homeland Security Fund
iHLS is on the process of founding a unique fund which will make investments in start-ups at the security technology and homeland security sector....
Unexpected Solutions Were Showcased at Video Analytics Conference
As every year, the fifth Video Analytics Conference and Exhibition organized by iHLS have gathered the leading experts, developers, entrepreneurs and manufacturers from the...
Israeli system intercepts cloud-stored data
Nowadays, everything is available at the palm of our hand. Nevertheless, these amazing capabilities, combined with our instinctive fear of the "Big Sister Syndrome"...
The Middle East – The Kingdom of IoT
Who says the Middle East is all about bloody wars? A new report by Deloitte shows a slightly more positive picture. According to its...
Current IoT Security Industry Trends
Internet of Things - IoT security breaches have been dominating headlines lately. Even if you personally don’t suffer consequences of the mediocre security of...
Technological Solutions to Help Secure Healthcare Institutions
Violent attacks in hospital wards and healthcare institutions can pose a serious challenge to security authorities. Technological solutions can help tackle this problem.
In...
Qatar Adopting Smart Airport Technologies
Qatar's Hamad International Airport plans to ramp up biometric solutions alongside other innovations such as VR and robotics on its way to become a...
Which are the most notorious hacking groups?
Anonymous is perhaps the most notorious of all hacker groups. It is a decentralized online community of tens of thousands of anonymous 'hacktivists', who...
Come to iHLS Startup Festival and Startup Live Competition
The prestigious startup stage is back on March 29th!
The Startup Festival and Startup Live Competition is the leading annual event at the ecosystem...
Impressive Meeting Between iHLS Advisory Board and Accelerator 3rd Cycle Graduates
During a special meeting at its new offices in Kiryat Atidim, Tel Aviv on November 15th, iHLS presented to its Advisory Board its vision,...
IoT Cameras Risk to Cybersecurity Revealed
Cybersecurity professionals have warned for years that IoT presents potential safety and privacy concerns for consumers. Now there are widening concerns regarding the risk...
iHLS TV Weekly Video Report – February 3rd 2015
Register to iHLS Israel Homeland Security
In this weekly Video report (February 3rd 2015):
Coalition against Isis: Too Little Too Late
Kaspersky Technology Forecast for 2045
The US...
Is ISIS besting counterterror efforts?
Experts: ISIS's social media terrorist messaging far ahead of US government efforts to counter it.
The U.S. government is a doing a feeble job of...
Radio Frequency Identification – Is It Secure?
Radio-frequency identification (RFID) tags have begun appearing everywhere. When one looks carefully, it’s easy to notice them in passports, credit cards, library books, office...
Cloud computing: cyber security breaches attract hackers
Organizations and business are increasingly turning towards cloud computing in order to streamline their operations and to enable their employees an easier and more...












































