TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2022-01-31

Millions Of IoT Devices At Risk To Malware

Source code of previously unknown malware named BotenaGo has been made widely available via GitHub, threatening millions of exposed IoT devices.

2021-09-27

Medical Devices Need Better Cyber Security

The new generation of connected medical devices permit access to real-time patient data and the opportunity to remotely adjust & monitor therapy.

2021-09-22

EU Proposes Legislation To Secure Connected Devices

The European Commission has put forward a number of policy proposals to introduce mandatory cyber security standards for connected devices. 

2021-09-17

Industrial Companies At Risk As Attacks Double

Unprepared: The industrial sector experienced a 91% jump in attacks and a 54% rise in malware-related attacks in 2020 compared to 2019.

2021-05-06

Securing Smart Devices

Data centers may be safe from outside intrusion, but IoT devices are often at risk of being exploited by those looking for an easier way into systems.

2021-04-28

Better Cyber Security For Smart Devices

Secure by Design: The British government is working to ensure consumer "smart" devices are more secure, with security built in from the start.

2021-04-27

Industry 5.0 Will Transform The Workplace

Connectivity: Just when you were starting to get a handle on Industry 4.0, the next technolgical step change has already begun to take shape.

2021-04-12

Industrial Control System Security Is Overlooked

Not My Job: Conventional IT-led network security often does not view control system devices and processes as their problem. By Joe Weiss

2021-03-10

Cyber Security For The Internet of Medical Things

The Internet of Medical Things (IoMT) has the potential to improve healthcare, but if not properly secured, these devices can pose huge risks.

2021-03-04

Connected Cars & Cyber Security

An increase in malicious attacks arising from the wider adoption of connected vehicles is driving growth in the automotive cyber security market.

2020-12-10

Connected Devices Must Be More Secure

The US will establish baseline security standards for IoT manufacturers and require contractors to implement vulnerability disclosure policies.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Maureen Data Systems

Maureen Data Systems

Maureen Data Systems (MDS) services cover Data Centres, Cloud Computing, Cyber Security, Mobility, Virtualisation, Managed Services.

Contrast Security

Contrast Security

Contrast Security is the leader in modernized application security, embedding code analysis and attack prevention directly into software.

Swedish Civil Contingencies Agency (MSB)

Swedish Civil Contingencies Agency (MSB)

MSB's Information Assurance Department is responsible for supporting and coordinating work relating to Sweden's national societal information security.

National Cybersecurity Institute (NCI) - Excelsior College

National Cybersecurity Institute (NCI) - Excelsior College

NCI is Excelsior College’s research center dedicated to assisting government, industry, military and academic sectors meet the challenges in cybersecurity policy, technology and education.

Sikur

Sikur

Sikur have developed a communication platform that sets new boundaries for corporate privacy and security.

Armis

Armis

Armis is the first agentless, enterprise-class security platform to address the new threat landscape of unmanaged and IoT devices.

Crayonic

Crayonic

Crayonic digital identity technologies protect and guarantee the identity of people and things.

Open Cloud Factory

Open Cloud Factory

Open Cloud Factory is a European based security company, that strives to ease the pressure on IT managers, by providing tools to implement your Security Strategy in an effective and easy manner.

InnoValor

InnoValor

InnoValor realises value from digital innovation for organisations and government. We provide advisory services and develop innovative software solutions, based on our background in research.

CyberSaint Security

CyberSaint Security

CyberSaint’s CyberStrong Platform empowers organizations to implement automated, intelligent cybersecurity compliance and risk management.

Dutch Innovation Park

Dutch Innovation Park

Dutch Innovation Park in Zoetermeer is a breeding ground for applied IT solutions in the field of cyber security, e-health, smart mobility and big data.

Chess

Chess

Chess is one of the UK’s leading independent and trusted technology service providers offering a range of services including cyber security.

BreachQuest

BreachQuest

BreachQuest brings together cybersecurity experts with decades of experience identifying security flaws, penetrating networks, and responding to incidents.

Deutsche Gesellschaft für Cybersicherheit (DGC)

Deutsche Gesellschaft für Cybersicherheit (DGC)

As a leading provider of cyber security, DGC supports companies in taking advantage of the opportunities offered by the digital transformation – and in minimizing the associated risks.

Purple Team

Purple Team

Purple Team is an expert cybersecurity and managed security service provider focused on arming your IT infrastructure with both red team and blue team services.

Unit42

Unit42

Unit 42 brings together world-renowned threat researchers, incident responders and security consultants to create an intelligence-driven, response-ready organization.