TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2021-03-10

Cyber Security For The Internet of Medical Things

The Internet of Medical Things (IoMT) has the potential to improve healthcare, but if not properly secured, these devices can pose huge risks.

2021-03-04

Connected Cars & Cyber Security

An increase in malicious attacks arising from the wider adoption of connected vehicles is driving growth in the automotive cyber security market.

2020-12-10

Connected Devices Must Be More Secure

The US will establish baseline security standards for IoT manufacturers and require contractors to implement vulnerability disclosure policies.

2020-07-10

Cyber Security Technology To Protect Autonomous Vehicles

Collaboration between smart car manufacturers and cyber security experts is essential to establish standards in this emerging technology.

2020-05-05

Looking For Vulnerable IoT Devices

It takes a deep dive to discover the many unseen, unsecured & vulnerable devices spread across the Internet of Things. By David Balaban

2020-04-17

Quantum Computing, Hackers & The Internet of Things

Quantum computing is still in its development stage but its potential to enable interaction between humans and the IoT is uniquely powerful.

2020-04-06

IoT - Pandemics, Opportunities And Massive Data Risks

The IoT transfers very large amounts of data without human interaction and this data is difficult to process using traditional management tools.

2020-02-03

Mandatory IoT Security In Britain

The UK government has unveiled a new IoT law to prohibit the sale of smart consumer products that fail to meet three strict security requirements.

2020-01-16

Smart Cities Already Exist

A 'smart city' is a framework for living that is totally connected to the Internet, with the infrastructure dependent on remaining connected.

2020-01-08

Ten Predictions For Smart Cities

With $80 billion already invested, we can expect fewer IoT projects, more citizen input, and more communication between cars and infrastructure.

Perimeter 81

Directory of Suppliers

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

ECSC Group

ECSC Group

ECSC is a full-service information security provider, specialising in 24/7/365 security breach detection and Artificial Intelligence (AI).

Exploit Database (EDB)

Exploit Database (EDB)

The Exploit Database (EDB) is an ultimate archive of exploits and vulnerable software. A great resource for penetration testers and vulnerability researchers.

Trustwave

Trustwave

Trustwave provides cloud and managed security services that help businesses fight cybercrime, protect data and reduce security risk.

Authenware

Authenware

AuthenWare delivers the highest level of identity security based on behavioral biometrics.

SolutionsPT

SolutionsPT

SolutionsPT enables customers to strengthen their Operational Technology (OT) network to meet the ever increasing demand for performance, availability, connectivity and security.

WAJA IT

WAJA IT

WAJA IT is a technically innovative IT service provider in Saudi Arabia offering solutions in a wide range of areas including cyber security.

Data Killers

Data Killers

Data Killers provides secure data destruction services to government agencies and corporations.

Geepy Smart Technology

Geepy Smart Technology

Geepy is the name for a range of smart products that integrate sensors, control, communications, cloud platform and cyber security.

Orca Security

Orca Security

Orca Security delivers full stack visibility including prioritized alerts to vulnerabilities, compromises, misconfigurations, and more across your entire inventory on all your cloud accounts.

Westgate IT

Westgate IT

Westgate IT are a leading provider of IT Support, Cloud and Cyber Security services in the South West of the UK.