TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2020-05-05

Looking For Vulnerable IoT Devices

It takes a deep dive to discover the many unseen, unsecured & vulnerable devices spread across the Internet of Things. By David Balaban

2020-04-17

Quantum Computing, Hackers & The Internet of Things

Quantum computing is still in its development stage but its potential to enable interaction between humans and the IoT is uniquely powerful.

2020-04-06

IoT - Pandemics, Opportunities And Massive Data Risks

The IoT transfers very large amounts of data without human interaction and this data is difficult to process using traditional management tools.

2020-02-17

Some Expert Predictions For Industrial Cyber Security

Industrial control systems are becoming increasingly connected. They are also becoming increasingly vulnerable. Business must get ready.

2020-02-03

Mandatory IoT Security In Britain

The UK government has unveiled a new IoT law to prohibit the sale of smart consumer products that fail to meet three strict security requirements.

2020-01-16

Smart Cities Already Exist

A 'smart city' is a framework for living that is totally connected to the Internet, with the infrastructure dependent on remaining connected.

2020-01-08

Ten Predictions For Smart Cities

With $80 billion already invested, we can expect fewer IoT projects, more citizen input, and more communication between cars and infrastructure.

2020-01-07

Warning: Smart TVs Are The IoT Gateway Into Your Home

The FBI say that Smart TV and other IoT devices can used by criminals to hack into home computer networks to rob you and spy on your family.

2019-12-10

Finland Has A Cyber Security Standard For IoT

As consumers become more reliant on smart devices and calls for IoT regulation spread internationally, Finland has set the standard.

2019-12-09

AI And IoT Have Created The AIoT

The IoT creates vast connections, AI makes these devices come alive, creating AIoT networks of devices that can communicate and process data.

2019-11-29

Internet of Things: Cyber Security Threats In 2020

IoT devices can work seamlessly at home, industry and in business. The problem is they also allow hackers easy ways into computer systems.

ManageEngine
CyberSecurity Jobsite
Check Point

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

Tripwire

Tripwire

Tripwire are a leading provider of risk-based security, compliance and vulnerability management solutions.

Security Mentor

Security Mentor

Security Mentor provides innovative, online security awareness training designed for how people learn and work.

Forcepoint

Forcepoint

Forcepoint provide a unified, cloud-centric platform that safeguards users, networks and data while eliminating the inefficiencies of managing multiple point security products.

ObjectSecurity

ObjectSecurity

ObjectSecurity is a leader in authorization policy automation. With OpenPMF, you can manage application security policies for access control and auditing.

MedCrypt

MedCrypt

MedCrypt are a team of medical device experts focused on bringing modern cybersecurity features to the next generation of healthcare technology.

Hassans International Law Firm

Hassans International Law Firm

Hassans is the largest law firm in Gibraltar, providing a full range of legal services across corporate and commercial law including Data Protection and GDPR compliance.

Regulativ.ai

Regulativ.ai

Regulativ.ai is an innovative and comprehensive platform, driven by AI, to address the regulatory and compliance needs of Cyber Security Regulatory compliance and reporting.

Mainstream Technologies

Mainstream Technologies

Mainstream Technologies is an information technology services firm specializing in custom software development, managed IT services, cybersecurity services and hosting.

stackArmor

stackArmor

stackArmor specializes in compliance and security-focused solutions delivered using our Agile Cloud Transformation (ACT) methodology.

Pessimistic Security

Pessimistic Security

The team behind Pessimistic helps blockchain startups meet modern security challenges since 2017.

ASRC Federal

ASRC Federal

ASRC Federal’s mission is to help federal civilian, intelligence and defense agencies achieve successful outcomes and elevate their mission performance.

Ceeyu

Ceeyu

Ceeyu is an all-in-one cybersecurity ratings and third party risk management platform.

DIGISOC

DIGISOC

DIGISOC, a leader in Latin America in Cybersecurity solutions, combines machine learning with human intelligence to be effective in detecting cyber threats.

Munio

Munio

Munio is a leading Fortified IT Support and Cyber Security companies in the south east of the UK.

QualySec

QualySec

QualySec is a leading cybersecurity firm specializing in comprehensive penetration testing and risk assessment services.

Deimos

Deimos

Deimos is a technology, cloud, hybrid and multi-cloud focused, professional services company. Our expertise and focus is on cloud native Developer and Security Operations.