BUSINESS > Services > Transport & Travel


« Back to News

2016-09-27

Internet Takes The Wheel Inside Driverless Cars

Fully automated vehicles are teetering on the edge of commercial viability. Big manufacturers and startups are piling in.

2016-09-21

Tesla Announces Update To Self-Driving System

Tesla is updating its semi-autonomous driving system Autopilot with new limits on hands-off driving.

2016-09-19

Uber Starts Self Driving Taxis

Uber users will get a surprise the next time they request a pickup: the option to ride in a self-driving car.

2016-09-22

Cybersecurity in Aviation

It’s no secret that the rise of the Internet of Things (IoT) introduces a host of new cybersecurity challenges and vulnerabilities for aircraft.

2016-09-12

New Self-Driving Cars On The Market In 2019

MobileEye and Delphi are cooperating to offer vehicle manufacturers an end-to-end technology platform to make mass-market driverless cars.

2016-09-12

Protecting Vehicles From Cyber- Attack

Cars and trucks with GPS, Bluetooth, and internet connections are clearly vulnerable to cyber attacks.

2016-09-07

Uber’s First Self-Driving Cars

Uber is fast catching up with Google in the race to introduce driverless cars.

2016-09-06

Keyless Entry Renders Millions Of Cars Vulnerable

Tens of millions of cars are made vulnerable to theft by their keyless entry systems, according to a report by computer security experts.

2016-08-29

The Future Of Transport

Leaps in productivity created by the car, train, ship & planes have changed our lives. Now, we’re at the start of a new mobility revolution.

2016-08-26

Solutions To Automotive Cyber Hacking Risks

Hacking is now one of the auto industry’s biggest concerns, especially as modern cars add more electronic controls and infotainment systems.

2016-08-24

Made in Britain: Facebook's Drones

In a warehouse in Somerset UK, the latest phase in Facebook's bid for world domination has been taking shape.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Andrisoft

Andrisoft

Andrisoft develops WANGUARD, an anti-DDoS Software solution that monitors IP traffic using packet-based and flow-based Sensors, and protects networks

Ambersail

Ambersail

Ambersail provide Penetration Testing and Cyber Security Compliance services.

(ISC)2

(ISC)2

(ISC)² is an international, nonprofit membership association for information security leaders. Our information security certifications are recognized as the global standard for excellence.

Cyberkov

Cyberkov

Cyberkov services include Pentesting, Vulnerability Assessments, Digital Forensics, Incident Response, Source Code Analysis and Security Training.

Cyber Risk & Insurance Forum (CRIF)

Cyber Risk & Insurance Forum (CRIF)

CRIF helps organisations understand cyber risks and the damage that might occur by supporting the development of effective insurance solutions.

DFLabs

DFLabs

DFlabs is a pioneer in Security Automation & Orchestration technology, leveraging your existing security products to dramatically reduce the response and remediation gap.

CloudAlly

CloudAlly

CloudAlly provides online cloud to cloud backup and recovery solutions, which backs up daily changes in your SaaS to unlimited Amazon S3 storage and makes it available for restore or export.

HumanFirewall

HumanFirewall

Your secuirty is dorectly proportional to the awareness of your employees. Use Phishing simulation across your organization to train & profile user behavior.

Malleum

Malleum

MALLEUM are specialists in penetration testing and security assessments. We think like hackers – and act like them – to disclose discreet dangers to your organization.

Maven Technologies

Maven Technologies

Maven Technologies specialize in secure data destruction, electronics recycling, asset management, and highly detailed reporting.

Crypto Valley Association

Crypto Valley Association

Crypto Valley Association is an independent, government-supported association established to build the world’s leading blockchain and cryptographic technologies ecosystem.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

CyberSN

CyberSN

CyberSN matches cybersecurity professionals to jobs and removes the pain from job searching and hiring.

Seknox

Seknox

Seknox TRASA™ protects your business from insider threats.

Lucidum

Lucidum

The Lucidum platform helps you assess risk and mitigate vulnerabilities by finding and correlating data from your security tech stack.

ACI Learning

ACI Learning

ACI Learning - Training tomorrow’s industry leaders with formats for all types of learners in Audit, Cybersecurity, and IT.