Dual-Use Startups Open Call
INNOFENSE Call for startups – Dual-Use Technologies:
Following the immense success of the previous four cycles and their integration into the defense sector, iHLS invites...
Human Vs. Machine – Does Technology Require People at Battlefield?
More sensors mean more data. Today’s battlefield is networked with sensors at an unprecedented scale. It is the Internet of Battlefield Things (IoBT) that...
The Dangers of IoT: Breaking-in Through The New Fridge
Everything around us is becoming “smarter”. Who of us hasn’t dreamt of turning on the boiler 15 minutes before we get home from a...
Boost to Biometric Identitiy Market
As organizations search for more secure authentication methods for data access, physical access and general security, many are turning to biometrics. The field has...
China Warns Its Soldiers: Wearable Tech Could Leak Secrets
The Chinese military said fitness trackers and watches could send private and strategic data to hackers who've gained access to the vulnerable devices. China...
Startup in the Security Field? Join iHLS Accelerator
Are you a disruptive startup in the security field?
We at the iHLS Security Accelerator are looking for innovative ground-breaking technologies offering solutions for civilian...
Mounting Efforts to Regulate IoT Security
While IoT devices and the data they collect and transmit present enormous benefits to consumers and industry, the relative insecurity of many devices presents...
Smart Devices to Monitor Military Supply Chain
Connected and smart devices can monitor logistical supply chains efficiently, tracking items and verifying the status of various assets. The US Department of Defense...
Cyber Threats – What to Expect in 2021?
2020 has been a challenging year from the point of view of cybersecurity, with many organizations reacting to the unexpected impact of the COVID-19...
Application for iHLS Security Accelerator Third Cycle at Its Peak
We are excited to offer you to apply to the third cycle of the iHLS security accelerator.
We are looking for startups who are offering solutions...
Largest-Ever DDoS Attack Foiled
The largest-ever distributed denial of service (DDoS) attack was foiled by the internet infrastructure giant Cloudflare. The attack occurred earlier this summer.
According to Cloudflare,...
Solving the Problems of Tomorrow, Today
As concerns over security risks for connected vehicles continue to build, an automotive cybersecurity company believes that a branch of machine learning called unsupervised...
Your Smoke Detector Will Also Be Wired
Surely you’ve all gone off for a few days’ vacation in some remote location and failed to leave your worries behind. Some of us,...
IoT Realm Seeks Governance
Industries are beginning to adopt Internet of Things (IoT) technologies in unprecedented scopes. However, security concerns continue to threaten IoT’s progress. A study by...
Cyber Resiliency Has to Be Part of Weapon Systems DNA
The U.S. military’s weapons systems today are reliant on complex software and interconnectivity with a host of components, sensors and computer systems. The highly...
Dual-Use Startup? Apply Now to iHLS Security Accelerator
Are you developing a ground-breaking technology in the fields of unmanned systems, counter drones, terror tunnel detection, border security, safe city?
We invite you to...
American Law Enforcement to Implement Smart Patrolling
Two leading tech-based companies are collaborating in order to provide law enforcement with Smart Patrolling, the first in-car camera video system, powered by artificial...
Quantum-Based Solution for Connected Devices Security
A dichotomy inherent in the Internet of Things (IoT) is that one wants the devices to be cheap, often lightweight and small, with low...
2021 Predictions: Hackers will Continue to Exploit COVID-19 Vulnerabilities
In 2021, remote working due to COVID-19 will require that organizations better secure their new distributed networks and cloud deployments to keep their applications...
IoT Solutions Keep Surprising
Some people consider IoT (the Internet of Things) as the next industrial revolution. The connected devices networks present in all aspects of life and...
Accelerate Your Startup! Apply to iHLS Security Accelerator
Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?
We...
IoT Devices Infected with Pre-Installed Malware
German cybersecurity authorities have recently taken action against a significant malware threat, blocking around 30,000 digital picture frames, media players, and other Android-based devices...

















































