Startup – Apply Now to iHLS Security Accelerator
Have you been developing a ground-breaking technology in the fields of video analytics, cybersecurity, unmanned systems, counter drones, terror tunnel detection, border security, etc.?...
Attend Big Data for Security and Intelligence Conference & Exhibition
The Big Data for Security and Intelligence Conference and Exhibition organized by iHLS will showcase the latest requirements of the commercial and security sectors...
DARPA Creating a Buzz
The US military is looking to expand its artificial intelligence operation, but it's not intending to start it up from scratch. Instead, in a...
Military Communication Just Got Simpler
Communication between commanders and forces on the field has become a crucial aspect of modern warfare. Because of this, the US Army is rolling...
Digging – New Drone Ability
While drones are primarily known for what they can do in the sky, like aerial photography or gathering intelligence, a new project out of...
US Navy Investing in Unmanned Battleships
The US navy is investing in unmanned technologies due to the threats posed by its two significant rivals in global dominance - Russia and...
Impressive Growth in Military UAV Market
Military Drone/Unmanned Aerial Vehicle (UAV) market was estimated to be over USD 5 billion in 2016, and will have a market value of more...
UUVs to be Equipped with Nuclear Capabilities
Russia has been making efforts to advance a nuclear-powered unmanned underwater vehicle program. The Russian Navy plans to place more than 30 Poseidon strategic...
Smart Cities. Is it Wise to Get Smarter?
We are in an era of intelligent and urgent urban innovation. Our homes are connected, our streets are thriving labyrinths of interconnectivity, and our...
Further Step Towards Integration of Drones in Aerial Space
The US Department of Transportation announced it would allow drones to fly overnight and over people without waivers under certain conditions. “Drones…are well on...
Quantum Tech to Secure Financial Data
Normal fiber optics can be easily physically tapped and massages can be intercepted. Intruders can bend the cable with a small clamp, then use...
Future’s Tactical Assault Operator Suit
American war-fighters have long enjoyed a technological preponderance over their opponents. They are equipped with the best high-tech gear in the world, such as...
One of World’s Top Battlefields for Drones
Extremists continue to explore ways to surprise their enemies. The Iranian-aligned Shiite Houthi group in Yemen operated a drone strike on a attacked a...
Technology Has Adapted Itself to Users
CES 2019 electronics show reflected some major shifts that will characterize world technology in the near future. Four trends stood out above the others,...
Robotic Solution for Tunnel Warfare
Some U.S. Army leaders believe future wars will take place underground and in tunnels. A new Swiss robot may be a solution for this...
New Monitoring Network Increases Drone Awareness
New research achieved an unmanned aircraft systems (UAS) industry milestone in December 2018 with the first-ever drone test flights over a specially developed network.
The...
2019 Looks Like a Year of Innovation
2018 was a pretty good year for military innovation, but it looks like 2019 is going to be even better. The Pentagon and other...
Ukraine Deploys Wide Array of Unmanned Vehicles
For several years, Ukrainian troops have been locked in a “frozen conflict” with Russian-backed separatists for control of the Donbas region in Eastern Ukraine....
Unique Drone Payload Offers Long-Range Recognition and Low Signature
To achieve accurate recognition and high-resolution imaging, drones need to approach the target from a short range. But what if the drone is required...
Giant Data Breach: 773 Million Passwords and Email Addresses
More than 87GB of passwords and email addresses have been leaked and distributed in a folder dubbed "Collection #1" by hackers in a significant...
Cyber Trends and Threats – A Review of 2018 and Expectations...
Summary of 2018
2018 has begun with a recovery from the events of 2017 such as WannaCry, Petya, and the information leak from Equifax -...










































