Image provided by pixabay

Dual-Use Startups Open Call

0
INNOFENSE Call for startups – Dual-Use Technologies: Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...

Human Vs. Machine – Does Technology Require People at Battlefield?

0
More sensors mean more data. Today’s battlefield is networked with sensors at an unprecedented scale. It is the Internet of Battlefield Things (IoBT) that...

The Dangers of IoT: Breaking-in Through The New Fridge

0
Everything around us is becoming “smarter”. Who of us hasn’t dreamt of turning on the boiler 15 minutes before we get home from a...
secure authentication

Boost to Biometric Identitiy Market

0
As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...

China Warns Its Soldiers: Wearable Tech Could Leak Secrets

0
The Chinese military said fitness trackers and watches could send private and strategic data to hackers who've gained access to the vulnerable devices. China...
startup

Startup in the Security Field? Join iHLS Accelerator

0
Are you a disruptive startup in the security field? We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
iot security

Mounting Efforts to Regulate IoT Security

0
While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
resupply chain

Smart Devices to Monitor Military Supply Chain

0
Connected and smart devices can monitor logistical supply chains efficiently, tracking items and verifying the status of various assets. The US Department of Defense...

Cyber Threats – What to Expect in 2021?

0
2020 has been a challenging year from the point of view of cybersecurity, with many organizations reacting to the unexpected impact of the COVID-19...
iHLS accelerator

Application for iHLS Security Accelerator Third Cycle at Its Peak

0
  We are excited to offer you to apply to the third cycle of the iHLS security accelerator. We are looking for startups who are offering solutions...
photo illus. cyber attack by Pixabay

Largest-Ever DDoS Attack Foiled

0
The largest-ever distributed denial of service (DDoS) attack was foiled by the internet infrastructure giant Cloudflare. The attack occurred earlier this summer. According to Cloudflare,...

Solving the Problems of Tomorrow, Today

0
As concerns over security risks for connected vehicles continue to build, an automotive cybersecurity company believes that a branch of machine learning called unsupervised...

Your Smoke Detector Will Also Be Wired

0
Surely you’ve all gone off for a few days’ vacation in some remote location and failed to leave your worries behind. Some of us,...
iot

IoT Realm Seeks Governance

0
Industries are beginning to adopt Internet of Things (IoT) technologies in unprecedented scopes. However, security concerns continue to threaten IoT’s progress. A study by...
cyber resiliency

Cyber Resiliency Has to Be Part of Weapon Systems DNA

0
The U.S. military’s weapons systems today are reliant on complex software and interconnectivity with a host of components, sensors and computer systems. The highly...

Dual-Use Startup? Apply Now to iHLS Security Accelerator

0
Are you developing a ground-breaking technology in the fields of unmanned systems, counter drones, terror tunnel detection, border security, safe city? We invite you to...
Smart Patrolling

American Law Enforcement to Implement Smart Patrolling

0
Two leading tech-based companies are collaborating in order to provide law enforcement with Smart Patrolling, the first in-car camera video system, powered by artificial...
quantum-based solution

Quantum-Based Solution for Connected Devices Security

0
A dichotomy inherent in the Internet of Things (IoT) is that one wants the devices to be cheap, often lightweight and small, with low...

2021 Predictions: Hackers will Continue to Exploit COVID-19 Vulnerabilities

0
In 2021, remote working due to COVID-19 will require that organizations better secure their new distributed networks and cloud deployments to keep their applications...

IoT Solutions Keep Surprising

0
Some people consider IoT (the Internet of Things) as the next industrial revolution. The connected devices networks present in all aspects of life and...
security accelerator

Accelerate Your Startup! Apply to iHLS Security Accelerator

0
Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.? We...
Image by Unsplash

IoT Devices Infected with Pre-Installed Malware

0
German cybersecurity authorities have recently taken action against a significant malware threat, blocking around 30,000 digital picture frames, media players, and other Android-based devices...

Latest

RADIANT Shines a Light on Invisible Industrial Threats

0
A new intrusion detection system is offering a more efficient way to identify and defend against advanced cyber threats targeting critical infrastructure like power...