TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2019-05-20

IoT Connected Devices Need Better Cybersecurity

Connected IoT Devices will soon be running artificial intelligence software to speed up image- and speech-processing tasks.

2019-04-30

The IoT Is A Big Headache For Software Developers

Connectivity, performance, and standards are growing areas of concern as the Internet of Things moves from concept to production reality.

2019-02-21

IoT Is In The Dark When It Comes To ePrivacy

As if GDPR wasn’t enough of a challenge, the new ePrivacy regulation is set to shake things up massively when it comes to the Internet of Things.

2019-01-17

Blockchain Transforms The Internet of Things

Volkswagen and Bosch are changing the way they work by connecting the IoT to the decentralised data market using Blockchain technology.

2018-12-19

IoT Cybercrime Hotspot In Canada

Cyber criminals are shifting their attention from computers to IoT and other internet-connected devices in Canadian homes.

2018-10-12

IoT Poses Special Cyber Risks

Internet-connected devices pose special risks for federal agencies and NIST is developing guidance to meet the need.

2018-10-10

Blockchain Tech Promises Better Security For IoT

IBM has won a patent for the autonomous self-servicing of networked devices that form part of its ADEPT environment.

2018-09-27

Security Flaws In Smart City Technology

The “smart city” sounds like a digital utopia, but like the rest of the Internet of Things (IoT) ecosystem, security is always a concern.

2018-09-05

How Blockchain Can Protect IoT Devices

IoT devices which are online all the time are especially vulnerable to cyberattack and could even be part of one. Blockchain can mitigate that.

2018-08-17

Internet of Things For Healthcare

Healthcare providers and device makers are all looking to the IoT to revolutionise the gathering of healthcare data and the delivery of care itself.

Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

WEBINAR: How To Build A Security Observability Strategy In AWS

WEBINAR: How To Build A Security Observability Strategy In AWS

Thursday, Apr 22, 2021 - Join this webinar to learn how to build a security observability strategy in AWS, covering cloud-native monitoring sources, guardrails, and automation capabilities.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

eBook: Practical Guide to Security in the AWS Cloud

eBook: Practical Guide to Security in the AWS Cloud

AWS Marketplace would like to present you with a digital copy of the new book, Practical Guide to Security in the AWS Cloud, by the SANS Institute.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Perimeter 81

Perimeter 81

Perimeter 81 is a Zero Trust Network as a Service designed to simplify secure network, cloud and application access for the modern and distributed workforce.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Free Access: Cyber Security Supplier Directory listing 5,000+ specialist service providers.

SItesAssure

SItesAssure

SitesAssure specialise in website security, malware removal and firewall protection.

LMG Security

LMG Security

LMG Security is a cybersecurity consulting, research and training firm.

North European Cybersecurity Cluster (NECC)

North European Cybersecurity Cluster (NECC)

NECC promotes information security and cybersecurity-related cooperation and collaboration in the Northern European region in order to enhance integration into the European Digital Single Market.

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference (AtlSecCon)

Atlantic Security Conference is a non-profit, annual, information security conference located in Halifax, Nova Scotia, Canada.

I/O Digital Foundation

I/O Digital Foundation

I/O Coin is an open source blockchain scientific project being developed by a team of Freelance / volunteer blockchain and security experts. IOC has focus on security, global adoption and scalability.

Nokia

Nokia

Nokia is a proven leader in fixed, mobile and IoT security offering capabilities that range from systems design to integration and support.

Schweitzer Engineering Laboratories (SEL)

Schweitzer Engineering Laboratories (SEL)

SEL specializes in creating digital products and systems that protect, control, and automate power systems around the world.

DataExpert Singapore

DataExpert Singapore

DataExpert Singapore provide solutions and services in the areas of Digital Forensics, Data Recovery, Data Duplication, Data Degaussing & Wiping, Data Destruction, and IT Disposal.