TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2018-10-12

IoT Poses Special Cyber Risks

Internet-connected devices pose special risks for federal agencies and NIST is developing guidance to meet the need.

2018-10-10

Blockchain Tech Promises Better Security For IoT

IBM has won a patent for the autonomous self-servicing of networked devices that form part of its ADEPT environment.

2018-09-27

Security Flaws In Smart City Technology

The “smart city” sounds like a digital utopia, but like the rest of the Internet of Things (IoT) ecosystem, security is always a concern.

2018-09-05

How Blockchain Can Protect IoT Devices

IoT devices which are online all the time are especially vulnerable to cyberattack and could even be part of one. Blockchain can mitigate that.

2018-08-17

Internet of Things For Healthcare

Healthcare providers and device makers are all looking to the IoT to revolutionise the gathering of healthcare data and the delivery of care itself.

2018-07-24

Mitigating IoT Cyber Risks: Training Is The First Step

It is vital to educate everyone in the risks involved with adopting increased IoT connectivity and how it can be mitigated.

2018-06-27

A Guide To Addressing Corporate IoT Security

What can enterprises do to strengthen the security of their IoT environments? Here are some suggested best practices from industry experts.

2017-10-31

A New IoT Botnet Storm Is Coming

The cyber storm clouds are gathering. A new Botnet is recruiting IoT devices at a far greater pace and with more potential damage than Mirai.

2017-11-07

Three Ways The IoT Can Drive Business Value

It’s not always clear exactly how businesses & customers are supposed to actually benefit from IoT. The experts at Forrester think they know how.

2017-09-19

The IoT Will Bring Cyberwar Close To Home

Industrial & military control systems are considered the targets in cyberwarfare, but a consequence of IoT will be to bring the battle into our homes.

2017-09-12

IoT For Business & Creating 'Digital Twins'

If your organisation is planning to leverage the Internet of Things it needs to become familiar with the concept of the “digital twin.”

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Steptoe & Johnson

Steptoe & Johnson

Steptoe is an international law firm with offices in the USA, Europe and China. Practice areas include Cybersecurity, Privacy & National Security.

Global Information Assurance Certification (GIAC)

Global Information Assurance Certification (GIAC)

GIAC provides certification in the knowledge and skills necessary for a practitioner in key areas of computer, information and software security.

Stealthbits Technologies

Stealthbits Technologies

Stealthbits Technologies is a cybersecurity software company focused on protecting an organization's sensitive data and the credentials attackers use to steal that data.

J2 Software

J2 Software

J2 Software is a leading African Information Security and ICT business providing information security, governance, risk and compliance solutions.

Corelight

Corelight

Corelight is the most powerful network visibility solution for information security professionals.

Ziroh Labs

Ziroh Labs

Ziroh Labs leverages advanced cryptography to keep your highly sensitive, private data safe throughout the lifecycle of data.

S2T

S2T

S2T builds cyber intelligence solutions based on deep expertise in diverse domains such as intelligence, machine learning and AI, big data processing, statistics and linguistics.

Patriot Cyber Defense

Patriot Cyber Defense

Patriot Cyber Defense is a Cyber Security and Management Consulting professional services firm.

VLATACOM Institute

VLATACOM Institute

Vlatacom Institute is privately owned accredited research and development institute, system integrator and turn-key solution provider. Areas of expertise include encryption and authentication.

KanREN

KanREN

KanREN is a member based consortium offering custom, world-class network services and support for researchers, educators, and public service institutions in the state of Kansas.

InferSight

InferSight

InferSight can help you design an architecture that takes into account security, performance, availability, functionality, resiliency and future capacity to avoid technological lock in and limitations

MorganFranklin Consulting

MorganFranklin Consulting

MorganFranklin Consulting is a management advisory firm that works with businesses and government to address complex and transformational technology and business objectives including cybersecurity.

NXTsoft

NXTsoft

NXTsoft’s solutions help businesses secure, connect and optimize their data to maximize revenue opportunities, enhance profitability, and mitigate cybersecurity risk.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

ARGOS Cloud Security

ARGOS Cloud Security

ARGOS aims to simplify and strengthen cloud security, by creating a visual map of security vulnerabilities, to your priceless information stored in any cloud provider environment.

CloudBees

CloudBees

CloudBees is building the world’s first end-to-end automated software delivery system, enabling companies to balance governance and developer freedom.