TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2017-09-12

IoT For Business & Creating 'Digital Twins'

If your organisation is planning to leverage the Internet of Things it needs to become familiar with the concept of the “digital twin.”

2017-07-31

IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is about connecting smart devices but it is far from a simple challenge for IT departments.

2017-07-10

Fraud And The Internet of Things

Cyber criminals have the funding and resources to infect millions of IoT gadgets with disruptive and potentially hazardous mechanisms.

2017-06-27

IoT Will Change (Almost) Everything In Cybersecurity

An over reliance on AI technology could easily result in complacency - which is exactly what the cybercriminals want in prospective targets.

2017-06-16

Guidance For Connected Vehicle Security

The Future Of Motoring: New forms of connectivity and relationships to cloud-based services, smart homes, even smart cites.

2017-06-19

Internet of Things Brings Threats To Security

Why has the US escaped most digital damage from the global WannaCry ransomware attack and will this continue beyond the next attack?

2017-06-05

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As more smart devices become connected, the world will become more exposed to attacks like the one that hit UK’s NHS. Opinion By Hannah Bryce

2017-05-23

Data Breaches & The Internet of Things

The IoT opens up new pathways for hackers. Are new laws needed to protect consumers and to govern disclosure of data breaches?

2017-04-07

Internet of Things Is The Next Big Security Risk

The Internet of Things (IoT) has been the target of many recent high profile cyber-attacks, but the full scale of its vulnerability is yet to be seen.

2017-02-21

Guide To The Internet of Things

You’ve likely heard the phrase Internet of Things, or IoT, at some point if you have been following any tech news in the last several years.

2017-02-14

Police Using IoT To Detect Crime

Just the Beginning: A local US Police force is trying to access the records of an Amazon Echo device as evidence in a murder investigation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CyTech Services

CyTech Services

CyTech provides Forensics Incident Response, Cyber Security and Training services.

Cigniti Technologies

Cigniti Technologies

Cigniti Technologies provides Independent Software Testing (IST) Services including software security testing.

VADO Security Technologies

VADO Security Technologies

VADO Security enables the safe transfer of data between low & high security networks.

Cybersecurity Collaborative

Cybersecurity Collaborative

CyberSecurity Collaborative is a forum for CISOs to share information that will collectively make us stronger, and better equipped to protect our enterprises from those seeking to damage them.

Cybertonica

Cybertonica

Cybertonica is a FinTech company which detects and prevents fraudulent transactions and reduces risk for financial services organisations.

CHEQ

CHEQ

CHEQ provides fully autonomous, preemptive technology for brand safety and ad-fraud prevention.

Cloudburst Security

Cloudburst Security

Cloudburst Security specialize in providing a full spectrum of high-quality, innovative cybersecurity services to both government and commercial organizations.

Deepnet Security

Deepnet Security

Deepnet Security is a leading vendor in Multi-Factor Authentication (MFA) and Identity & Access Management (IAM).

InfoLock

InfoLock

Infolock are experts in data governance, providing consulting and advisory services that help organizations effectively secure, manage, and optimize their data.

Quintillion Consulting

Quintillion Consulting

Quintillion Consulting is a strategic risk based consulting firm. We help companies safeguard the core business and IT capabilities that deliver competitive advantage.

RealCISO

RealCISO

RealCISO is a CISO grade cloud platform to help companies understand, manage, and mitigate their cyber risk.

Anthony Timbers LLC

Anthony Timbers LLC

Anthony Timbers is a cybersecurity consulting and penetration testing firm providing services to the Federal and Commercial sectors nationwide.

Outsource Group

Outsource Group

Outsource Group is an award winning Cyber Security and IT Managed Services group working with a range of SME/Enterprise customers across the UK, Ireland and internationally.

HKR Trainings

HKR Trainings

HKR Trainings provide you the best online classes with high quality facilities at a low price without any compromise on quality. Certifications cover a wide range of areas including cybersecurity.

Celebrus

Celebrus

Celebrus Fraud Data Platform, by D4t4 Solutions, works with existing fraud structures to augment functionality and turn fraud management into true fraud prevention.

Harbor Networks

Harbor Networks

Harbor Networks is a communications systems integrator and managed services provider. We provide business consultation services for voice and data communication technology.