Save the Date! iHLS INNOTECH International Conference

0
iHLS is proud to present the international Homeland Security, Cyber Technologies and Innovation Conference and Exhibition: INNOTECH 2021. iHLS is celebrating the return to normal...
ihls security accelerator

We Are Looking for You! iHLS Security Accelerator is Recruiting New...

0
iHLS is inviting startups in this field to join the 8th cycle of its Security Accelerator, the world’s first accelerator in the HLS field....
security accelerator

Call for Startups: Applications Now Open for iHLS Security Accelerator!

0
iHLS is inviting startups in this field to join the 8th cycle of its Security Accelerator, the world’s first accelerator in the HLS field....
aircraft carrier

Maritime Cybersecurity and the Israeli Aspect

0
An oil spill such as the one that has drenched Israel’s coastline in tar, can be replicated by hackers that remotely take control of...
perimeter & offshore security

Call for Startups: Apply to iHLS Security Accelerator – Your Entrance...

0
iHLS is inviting startups in this field to join the 8th cycle of its Security Accelerator, the world’s first accelerator in the HLS field....

US DoD Kicks Off Smart 5G-Enabled Logistics Site

0
An initiative to deploy a private 5G wireless network that will enable an array of cutting-edge technologies has been officially kicked off in a...
Cybersecurity photo illus. by Pixabay

Internet of Medical Things – New Cybersecurity Solution

0
According to a recent report from Unit 42, 83% of medical imaging devices are running on unsupported operating systems, making them potential avenues for...
non-destructive

Non-Destructive Monitoring of Connected Sensors Now Possible

0
Connected devices (IoT) that are now in widespread use include wireless equipment, autonomous machinery, wearable sensors, security systems, and more. They have to be...
automotive cybersecurity

Forecast: Growth in Automotive Cybersecurity Market

0
The growing incidence of malicious cyber-attacks owing to the rising adoption of connected cars will propel the growth of the global automotive cybersecurity market....
IoT

More Security to Connected Medical Devices   

0
Connected medical devices remotely monitoring patient data are exposed to various threats, including data breaches if the information is not properly encrypted, viruses and...
Photo illus. soldiers by US National Archives

Data Transferred Directly to Smartphone

0
Exoskeletons transfer much of the weight a soldier carries to the ground through battery-powered, titanium legs, allowing warfighters to carry extra gear with less...

Implementing Smart Cities Approach to Military Bases Requires Essential Component 

0
The US Army Installations Strategy published in December 2020 leans heavily on Internet of Things technologies, which collect data about people, machines, and climate...

IoT – the Sensitive Link of COVID-19 Vaccine Supply Chain

0
Millions of doses of COVID-19 vaccines are transported to healthcare facilities across the world. The numerous steps involved with the distribution process and the...

COVID-19 Challenge: How to Secure Connected Medical Devices?

0
The healthcare industry increasingly relies on IoT networks to securely connect a growing variety of medical devices and equipment. Internet of Medical Things (IoMT)...

During COVID-19 – Quantum Leap in Securing Non-Permanent Sites

0
Physical security technologies for public buildings have advanced considerably, moving away from legacy standalone CCTV systems to modern digital video surveillance technologies. However, security...

Cyber Threats – What to Expect in 2021?

0
2020 has been a challenging year from the point of view of cybersecurity, with many organizations reacting to the unexpected impact of the COVID-19...
5g drone

Nati Cohen, CyberIL Chairman: 5G Challenge – Securing Systems in the...

0
The transition from simple machine-to-machine (M2M) connections to the complex Internet of Things (IoT) is already underway. Massive IoT is a category driven by...

The Broadcast You Can’t Afford to Miss! All Innovation, Cyber, &...

0
Have a taste of INNOTECH international conference broadcast on innovation, cyber, and HLS - December 8-9, 2020 Register now

INNOTECH 2020 Broadcast – Expect Acceleration and Innovation

0
“COVID-19 has created an accelerated digital transformation” - this was one of the insights from the panel discussions. The filming of the special international broadcast...

“In the COVID-19 Age – Security, Cyber, and Innovation Have Gained...

0
The INNOTECH International Live Conference Broadcast for HLS, Cyber, and Innovation on December 8-9 will host the leading experts at the intriguing panel discussion....

2021 Predictions: Hackers will Continue to Exploit COVID-19 Vulnerabilities

0
In 2021, remote working due to COVID-19 will require that organizations better secure their new distributed networks and cloud deployments to keep their applications...

New Challenges in Remote Access for Operational Environments (OT) 

0
By Or Shalom, security and cyber expert and adviser OT environments are computing networks characterized by computerized processes operations and command & control, therefore they...

Latest

RADIANT Shines a Light on Invisible Industrial Threats

0
A new intrusion detection system is offering a more efficient way to identify and defend against advanced cyber threats targeting critical infrastructure like power...