Blockchain As IoT Security Solution
As IoT adds more and more devices to the digital fold every day, organizations of all types and sizes are recognizing IoT's potential to...
Valuable Prizes at The Startup Festival and Startup Live Competition
Meet influential people! Mingle with entrepreneurs, investors VCs and get exposure to the media.
Apply now for the Startup Festival and Startup Live Competition -...
New Algorithms to Track Violent Groups on Twitter
New sentiment analysis algorithms are able to monitor the social network Twitter in search of violent groups. The system analyses both the messages they...
Start-Up: Integration at the Push of a Button
In a world where every organization works with a wealth of data sources - cameras, sensors, organizational processes etc. - there is a growing...
Pentagon to Launch Hacker Proof Helicopter Drone by 2018
This unmanned helicopter is designed to feature protection from hacking.
Boeing is set to replace 100,000 lines of code on its Little Bird drone before...
How the Internet of Things can save cities millions of dollars
The Internet of Things (IoT) is considered to be one of the biggest technological revolutions in recent times, and government officials in the United...
The Prestigious Event – Startup Festival and Startup Live Competition
The prestigious Startup Festival will be held on March 29th, hosting the Startup Live startup competition.
Undoubtedly, this is one of the largest entrepreneurial event...
Towards African Network of Safe and Smart Cities?
An information and communication (ICT) company has been meeting with several government leaders in Africa to detail how its safe city solution could be...
Major Advancement in IT Security from Unexpected Destination
Researchers at New York University Abu Dhabi’s Design for Excellence lab (NYUAD) have developed new innovations in computer chip technology that present landmark achievements...
Equation Group: The Crown Creator of Cyber-Espionage
Kaspersky Lab discovers the ancestor of Stuxnet and Flame – powerful threat actor with an absolute dominance in terms of cyber-tools and techniques.
For several...
What is Cyber Security’s Next Challenge? Special Panel
In the near future, the cyber industry will have to cope with a wider array of cyber threats and challenges resulting from the vulnerabilities...
Smart Communications to Bring Breakthrough in Industrial IoT
As we move toward industrial things being digital and connected, putting in place the right communications infrastructure is a critical piece of the Industrial...
Will China Become An IoT International Power?
The Internet of Things (IoT) is network of uniquely identifiable endpoints (or "things" that communicate without human interaction using IP (Internet Protocol) connectivity. The...
Mounting Efforts to Regulate IoT Security
While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
New Layer of Defense for IoT Devices
A new layer of defense for IoT devices (the Internet of Things) has been announced. With Cloudflare’s Orbit, IoT manufacturers can add security on...
Air Traffic Control System Vulnerable to Cyberattack
The country’s air traffic control systems are vulnerable to hackers. This, according to a 42-page document entitled "Information Security: FAA Needs to Address Weaknesses...
iHLS TV Future Forces For HLS
Future Forces For HLS
Future Forces 4 HLS
The upcoming conference for the HLS Future Forces is to be held on July 21st, bringing with...
Great Interest in IHLS Big Data for Homeland Security Conference
iHLS fifth annual conference on Big Data for Homeland Security attracted many technology experts, investors, entrepreneurs and representatives of the high-tech industries, defense industries,...
IoT Solutions Keep Surprising
Some people consider IoT (the Internet of Things) as the next industrial revolution. The connected devices networks present in all aspects of life and...
Lawful interception
One of the world’s fastest growing technological fields is called ’Lawful Interception’, namely enforcing the law in cyberspace and gathering cyber intelligence, as well...
Catching Up on Evolving Smart City Tech
The Punjab Information Technology Board (PITB), an autonomous body set by the Government of Punjab (a region partly in North India and partly in...
Intel reveals new Intel Quark processors – targeting wearable computers
On the first day of Intel's annual convention, the Intel Developers Forum (IDF), the company revealed a new processor family – Intel Quark, talking...












































