TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2020-01-07

Warning: Smart TVs Are The IoT Gateway Into Your Home

The FBI say that Smart TV and other IoT devices can used by criminals to hack into home computer networks to rob you and spy on your family.

2019-12-10

Finland Has A Cyber Security Standard For IoT

As consumers become more reliant on smart devices and calls for IoT regulation spread internationally, Finland has set the standard.

2019-12-09

AI And IoT Have Created The AIoT

The IoT creates vast connections, AI makes these devices come alive, creating AIoT networks of devices that can communicate and process data.

2019-11-29

Internet of Things: Cyber Security Threats In 2020

IoT devices can work seamlessly at home, industry and in business. The problem is they also allow hackers easy ways into computer systems.

2019-10-15

Incompatible: Privacy & The Internet of Things

Video surveillance is now considered an IoT application and cameras often connect with domestic automation systems, threatening privacy.

2019-09-16

10 Predictions For The IoT Future

It’s not just about computers, laptops, tablets, and smartphones anymore. Now a multitude of devices are Internet-connected. What next?

2019-09-10

What Is The Internet of Things?

Fast becoming the one of the most important changes in business, the IoT is also taking effect across government and social networks.

2019-08-20

Connected Cars Are The New Attack Vector

Hacking some smart devices might lead to nothing more than an invasion of privacy. Hacks of connected cars could be used for lethal purposes.

2019-08-14

Microsoft Say The IoT Is Under Attack

One of Russia's elite state-sponsored hacking groups is going after IoT devices as a way to breach corporate networks.

2019-07-08

Developing Smart Cities In Practice

Security and privacy issues plus a lack of IoT interoperability are seen as a major factors in speeding deployment of Smart City technology.

Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

DigitalStakeout

DigitalStakeout

A simple and cost-effective solution to monitor, investigate and analyze data from the web, social media and cyber sources to identify threats and make better security decisions.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Deep Secure

Deep Secure

Deep Secure’s Content Threat Removal platform delivers total protection of high value data for your business.

TWNCERT

TWNCERT

TWNCERT is the National Computer Emergency Response Team of Taiwan.

ContentKeeper

ContentKeeper

ContentKeeper provides Web Threat Protection solutions to secure today’s Web 2.0 and mobile centric business environments.

Proact IT Group

Proact IT Group

Proact is Europe's leading independent data centre and Cloud services enabler. We deliver flexible, accessible and secure IT solutions and services.

CRYPTTECH

CRYPTTECH

CRYPTTECH specializes in Information Security and Intelligence, Risk Evaluation and Vulnerability Recognition against Cyber-Attacks and APTs.

CyberLaw

CyberLaw

CyberLaw's world-class team of cyber security experts and legal practitioners offers unparalleled advice, consultancy and legal representation in the field of cyber security.

ALTR

ALTR

ALTR provide software-embedded solutions for data security and privacy.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

WidePoint

WidePoint

WidePoint Corporation is an innovative provider of Trusted Mobility Management (TM2) solutions.

Dashlane

Dashlane

Dashlane puts all your passwords, payments, and personal info in one place that only you control. So you can use them instantly. Securely. Exactly when you need them.