TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2019-10-15

Incompatible: Privacy & The Internet of Things

Video surveillance is now considered an IoT application and cameras often connect with domestic automation systems, threatening privacy.

2019-09-16

10 Predictions For The IoT Future

It’s not just about computers, laptops, tablets, and smartphones anymore. Now a multitude of devices are Internet-connected. What next?

2019-09-10

What Is The Internet of Things?

Fast becoming the one of the most important changes in business, the IoT is also taking effect across government and social networks.

2019-08-20

Connected Cars Are The New Attack Vector

Hacking some smart devices might lead to nothing more than an invasion of privacy. Hacks of connected cars could be used for lethal purposes.

2019-08-14

Microsoft Say The IoT Is Under Attack

One of Russia's elite state-sponsored hacking groups is going after IoT devices as a way to breach corporate networks.

2019-07-08

Developing Smart Cities In Practice

Security and privacy issues plus a lack of IoT interoperability are seen as a major factors in speeding deployment of Smart City technology.

2019-05-20

IoT Connected Devices Need Better Cybersecurity

Connected IoT Devices will soon be running artificial intelligence software to speed up image- and speech-processing tasks.

2019-04-30

The IoT Is A Big Headache For Software Developers

Connectivity, performance, and standards are growing areas of concern as the Internet of Things moves from concept to production reality.

2019-02-21

IoT Is In The Dark When It Comes To ePrivacy

As if GDPR wasn’t enough of a challenge, the new ePrivacy regulation is set to shake things up massively when it comes to the Internet of Things.

2019-01-17

Blockchain Transforms The Internet of Things

Volkswagen and Bosch are changing the way they work by connecting the IoT to the decentralised data market using Blockchain technology.

2018-12-19

IoT Cybercrime Hotspot In Canada

Cyber criminals are shifting their attention from computers to IoT and other internet-connected devices in Canadian homes.

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

International Organization for Standardization (ISO)

International Organization for Standardization (ISO)

ISO is an independent, non-governmental international standards organization. The ISO/IEC 27001 is the standard for information security management systems.

Cipher Security

Cipher Security

Cipher Security provides unique robustness tests and penetration tests, as well as customizable development services for vendors and providers.

Tubitak

Tubitak

Tubitak is the scientific and technological research council of Turkey. Areas of research include information technology and security.

SISSDEN

SISSDEN

SISSDEN will improve cybersecurity through the development of increased awareness and the effective sharing of actionable threat information.

Ikarus Security Software

Ikarus Security Software

Ikarus focuses on antivirus and content-security solutions.

Virtru

Virtru

Virtru's Data Protection platform protects and controls sensitive information regardless of where it's been created, stored or shared.

Stealthcare

Stealthcare

Stealthcare is a full service, global cyber security firm offering solutions that educate, empower and protect.

TierPoint

TierPoint

TierPoint delivers secure, reliable, and connected infrastructure solutions at the internet’s edge. We meet you where you are in your journey to solve for data storage, compute, and recovery.

SuperCom

SuperCom

SuperCom are a global secure solutions integrator and technology provider for governments and other consumers facing organizations around the world.

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

FREE eBook: Practical Guide To Optimizing Your Cloud Deployments

AWS Marketplace eBook: Optimizing your cloud deployments to accelerate cloud activities, reduce costs, and improve customer experience.

Infiot

Infiot

Infiot is a pioneer in enabling secure, reliable access with zero trust security, network optimization, edge-intelligence and AI driven operations for all remote users, devices, sites and cloud.

Anonos

Anonos

Anonos is a global software company that provides the only technology capable of protecting data in use with 100% accuracy, even in untrusted environments.

Kubus Hitam

Kubus Hitam

Kubus Hitam are a research-based company focused on cyber security. we strongly believe that innovation and safety are the two keywords for the future business market.

Amyna Systems

Amyna Systems

Amyna has developed an IoT cybersecurity platform that prevents malignant attacks, helping users to protect themselves from cyberattacks.

Relatech

Relatech

Relatech is a Digital Enabler Solution Knowledge (D.E.S.K.) Company that offers digital services and solutions dedicated to the digital transformation of businesses.

Black Bison Cyber

Black Bison Cyber

Black Bison Cyber is a premier cybersecurity firm specializing in elite, discreet, and highly personalized digital protection for high-profile individuals and executives.