TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2017-09-12

IoT For Business & Creating 'Digital Twins'

If your organisation is planning to leverage the Internet of Things it needs to become familiar with the concept of the “digital twin.”

2017-07-31

IoT Is Becoming A Nightmare For IT

The Internet of Things, at its simplest level, is about connecting smart devices but it is far from a simple challenge for IT departments.

2017-07-10

Fraud And The Internet of Things

Cyber criminals have the funding and resources to infect millions of IoT gadgets with disruptive and potentially hazardous mechanisms.

2017-06-27

IoT Will Change (Almost) Everything In Cybersecurity

An over reliance on AI technology could easily result in complacency - which is exactly what the cybercriminals want in prospective targets.

2017-06-16

Guidance For Connected Vehicle Security

The Future Of Motoring: New forms of connectivity and relationships to cloud-based services, smart homes, even smart cites.

2017-06-19

Internet of Things Brings Threats To Security

Why has the US escaped most digital damage from the global WannaCry ransomware attack and will this continue beyond the next attack?

2017-06-05

The Internet of Things Will Be Even More Vulnerable to Cyber Attacks

As more smart devices become connected, the world will become more exposed to attacks like the one that hit UK’s NHS. Opinion By Hannah Bryce

2017-05-23

Data Breaches & The Internet of Things

The IoT opens up new pathways for hackers. Are new laws needed to protect consumers and to govern disclosure of data breaches?

2017-04-07

Internet of Things Is The Next Big Security Risk

The Internet of Things (IoT) has been the target of many recent high profile cyber-attacks, but the full scale of its vulnerability is yet to be seen.

2017-02-21

Guide To The Internet of Things

You’ve likely heard the phrase Internet of Things, or IoT, at some point if you have been following any tech news in the last several years.

2017-02-14

Police Using IoT To Detect Crime

Just the Beginning: A local US Police force is trying to access the records of an Amazon Echo device as evidence in a murder investigation.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Perimeter 81 / How to Select the Right ZTNA Solution

Perimeter 81 / How to Select the Right ZTNA Solution

Gartner insights into How to Select the Right ZTNA offering. Download this FREE report for a limited time only.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Biscom

Biscom

Biscom offers solutions for secure file transfer, synchronization, file translation, and mobile devices, designed to deliver mission-critical reliability, streamline workflows and reduce costs.

Bittium

Bittium

Bittium provides proven information security solutions for mobile devices and portable computers.

Exida

Exida

Exida is a leading product certification and knowledge company specializing in industrial automation system safety, security, and availability.

IAC

IAC

IAC is a specialist Irecruitment consultancy covering Internal Audit, Risk, Controls, Governance, IT Audit, and Cyber Security roles.

Resilience First

Resilience First

Resilience First is a not-for-profit organisation, led and funded by business to strengthen collective business resilience in all areas, including cyber security.

redGuardian

redGuardian

redGuardian is a DDoS mitigation solution available both as a BGP-based service and as an on-premise platform.

Accredia

Accredia

Accredia is the national accreditation body for Italy. The directory of members provides details of organisations offering certification services for ISO 27001.

Red Snapper Recruitment

Red Snapper Recruitment

Red Snapper Recruitment is a market leading staffing services provider to the law enforcement, cyber security, offender supervision and regulatory services markets.

Concentric

Concentric

Concentric Data Risk Monitoring and Protection. Deep Learning to discover, monitor and remediate risks to sensitive data on-premises and in the cloud.

Risk Ledger

Risk Ledger

Risk Ledger is improving the security of the global supply chain ecosystem, reducing the number of data breaches experienced through supply chain attacks by companies and consumers alike.

Guidehouse

Guidehouse

Guidehouse is a leading global provider of consulting services to the public and commercial markets with broad capabilities in management, technology, and risk consulting.

Integrity

Integrity

Integrity is a PCI QSA and ISO 27001 certified company specialized in Information Security and IT Consulting.

Quzara

Quzara

Quzara provides trusted advisory services and highly adaptive cybersecurity services to federal, commercial and Defense Industrial Base customers to meet their security compliance and cyber needs.

Federal Bureau of Investigation (FBI)

Federal Bureau of Investigation (FBI)

The mission of the FBI is to protect and defend against intelligence threats, uphold and enforce criminal laws, and provide criminal justice services.

Dexian

Dexian

Dexian is a leading provider of staffing, IT, and workforce solutions with nearly 12,000 employees and 70 locations worldwide.

Sentar

Sentar

Sentar is a cyber intelligence company, applying advanced analytics and systems engineering expertise to protect our national security by securing mission-critical assets.