TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2017-09-12

IoT For Business & Creating 'Digital Twins'

If your organisation is planning to leverage the Internet of Things it needs to become familiar with the concept of the “digital twin.”

2017-07-31

IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is about connecting smart devices but it is far from a simple challenge for IT departments.

2017-07-10

Fraud And The Internet of Things

Cyber criminals have the funding and resources to infect millions of IoT gadgets with disruptive and potentially hazardous mechanisms.

2017-06-27

IoT Will Change (Almost) Everything In Cybersecurity

An over reliance on AI technology could easily result in complacency - which is exactly what the cybercriminals want in prospective targets.

2017-06-16

Guidance For Connected Vehicle Security

The Future Of Motoring: New forms of connectivity and relationships to cloud-based services, smart homes, even smart cites.

2017-06-19

Internet of Things Brings Threats To Security

Why has the US escaped most digital damage from the global WannaCry ransomware attack and will this continue beyond the next attack?

2017-06-05

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As more smart devices become connected, the world will become more exposed to attacks like the one that hit UK’s NHS. Opinion By Hannah Bryce

2017-05-23

Data Breaches & The Internet of Things

The IoT opens up new pathways for hackers. Are new laws needed to protect consumers and to govern disclosure of data breaches?

2017-04-07

Internet of Things Is The Next Big Security Risk

The Internet of Things (IoT) has been the target of many recent high profile cyber-attacks, but the full scale of its vulnerability is yet to be seen.

2017-02-21

Guide To The Internet of Things

You’ve likely heard the phrase Internet of Things, or IoT, at some point if you have been following any tech news in the last several years.

2017-02-14

Police Using IoT To Detect Crime

Just the Beginning: A local US Police force is trying to access the records of an Amazon Echo device as evidence in a murder investigation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Chatham House Cyber Conference

Chatham House Cyber Conference

14 June 2023 - Connect with cyber security experts and senior policymakers to explore the role of cyber security in the global economy and how to deliver an open and secure internet.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

UK Cyber Week Expo & Conference

UK Cyber Week Expo & Conference

Award-winning event organiser ROAR B2B announces the launch of UK Cyber Week and its inaugural event on 4 and 5 April 2023 at the Business Design Centre, London.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Techmeme

Techmeme

Techmeme is an online news curation service focused on leading edge technology, including cyber security.

Malta Information Technology Agency (MITA)

Malta Information Technology Agency (MITA)

MITA is the central driver of Government Information and Communications Technology (ICT) policy, programmes and initiatives in Malta.

Authorize.Net

Authorize.Net

Authorize.Net is a Payment Gateway which provides the complex infrastructure and security necessary to ensure fast, reliable and secure transactions.

Zivver

Zivver

Zivver provide pioneering software that prevents data leaks when sending an e-mail, chat message or sharing a file.

itWatch

itWatch

itWatch is focused on data loss prevention (DLP), endpoint security, mobile security, encryption, and cost reducing solutions for IT operations.

NAVEX Global

NAVEX Global

NAVEX Global’s compliance management system consolidates your entire GRC program onto a scalable cloud-based platform.

OneTrust

OneTrust

OneTrust is the largest and most widely used technology platform to operationalize privacy, security and third-party risk management.

Tenzir

Tenzir

Tenzir's primary focus lies on network forensics: the systematic investigation of cyber attacks with big data analytics.

Elysium Analytics

Elysium Analytics

Elysium Cognitive Security Analytics delivers the latest and most flexible security system to reduce cost and complexity while providing unmatched scalability.

Olympus Sky

Olympus Sky

Olympus Sky has created a complete security system that is specifically designed to meet the challenges of IoT, including all of the deficiencies currently challenging Public Key Infrastructure.

MyCena

MyCena

MyCena has developed a complete system of security, control and management for decentralised credentials.

Computer Services Inc (CSI)

Computer Services Inc (CSI)

CSI is a leading fintech, regtech and cybersecurity solutions partner operating at the intersection of innovation and service.

Toka Group

Toka Group

Toka empowers government agencies with critical and previously out-of-reach digital forensics, force protection and Intelligence capabilities, tackling the fields' most pressing challenges.

Cymune

Cymune

At Cymune we help businesses to fight against cybercrime, protect patented data and diminish security risks.

Nasuni

Nasuni

The Nasuni File Data Platform offers the protection, detection, and recovery of file shares from ransomware attacks or random disasters within minutes.

Radiance Technologies

Radiance Technologies

Radiance solutions provide technological advantage and operational superiority for our nation in the areas of intelligence, cyber and advanced weapon systems.