TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2021-04-28

Better Cyber Security For Smart Devices

Secure by Design: The British government is working to ensure consumer "smart" devices are more secure, with security built in from the start.

2021-04-27

Industry 5.0 Will Transform The Workplace

Connectivity: Just when you were starting to get a handle on Industry 4.0, the next technolgical step change has already begun to take shape.

2021-03-10

Cyber Security For The Internet of Medical Things

The Internet of Medical Things (IoMT) has the potential to improve healthcare, but if not properly secured, these devices can pose huge risks.

2021-03-04

Connected Cars & Cyber Security

An increase in malicious attacks arising from the wider adoption of connected vehicles is driving growth in the automotive cyber security market.

2020-12-10

Connected Devices Must Be More Secure

The US will establish baseline security standards for IoT manufacturers and require contractors to implement vulnerability disclosure policies.

2020-07-10

Cyber Security Technology To Protect Autonomous Vehicles

Collaboration between smart car manufacturers and cyber security experts is essential to establish standards in this emerging technology.

2020-05-05

Looking For Vulnerable IoT Devices

It takes a deep dive to discover the many unseen, unsecured & vulnerable devices spread across the Internet of Things. By David Balaban

2020-04-17

Quantum Computing, Hackers & The Internet of Things

Quantum computing is still in its development stage but its potential to enable interaction between humans and the IoT is uniquely powerful.

2020-04-06

IoT - Pandemics, Opportunities And Massive Data Risks

The IoT transfers very large amounts of data without human interaction and this data is difficult to process using traditional management tools.

2020-02-03

Mandatory IoT Security In Britain

The UK government has unveiled a new IoT law to prohibit the sale of smart consumer products that fail to meet three strict security requirements.

Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law are experts in information technology, data privacy and cybersecurity law.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Cylance Smart Antivirus

Cylance Smart Antivirus

An antivirus that works smarter, not harder, from BlackBerry. Lightweight, non-intrusive protection powered by artificial intelligence. BUY NOW - LIMITED DISCOUNT OFFER.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Oxygen Forensics

Oxygen Forensics

Oxygen Forensics offer the most advanced forensic data examination tools for mobile devices and cloud services.

Technology Association of Georgia (TAG)

Technology Association of Georgia (TAG)

TAG's mission is to educate, promote, influence and unite Georgia's technology community to stimulate and enhance Georgia's tech-based economy.

TrustArc

TrustArc

TrustArc provide privacy compliance and risk management with integrated technology, consulting and TRUSTe certification solutions – addressing all phases of privacy program management.

Cradlepoint

Cradlepoint

With Cradlepoint customers leverage the speed and economics of wired and wireless Internet broadband for branch, mobile, and IoT networks while maintaining end-to-end visibility, security and control.

Secure Crossing

Secure Crossing

Secure Crossing specializes in critical infrastructure and industrial control system security technology.

Visual Guard

Visual Guard

Visual Guard is a modular solution covering most application security requirements, from application-level security systems to Corporate Identity and Access Management Solutions.

Austrian Trust Circle

Austrian Trust Circle

Austrian Trust Circle is an initiative of CERT.at and the Austrian Federal Chancellery and consists of Security Information Exchanges in the areas of the strategic information infrastructure.

Kognos

Kognos

Kognos provides the world's first automated investigation and threat story building platform.

Threat Status

Threat Status

Threat Status are a Threat Intelligence company. We are the developers of Trillion. A cloud based Security As A Service (SaaS) platform.

Maven Security Consulting

Maven Security Consulting

Maven Security Consulting helps companies secure their information assets and digital infrastructure by providing a wide range of customized consulting and training services.

Security In Motion

Security In Motion

Security in Motion is an independent provider of IT security and infrastructure services, supplying the SME and enterprise markets.