TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2017-02-18

Old IT Networks Stop New IoT Innovation

The Internet of Things (IoT) isn’t all brand-new, cutting-edge technology. In fact, some of it’s already suffering through painful upgrade cycles.

2017-02-14

Non-Secure IoT Devices Are Powerful Weapons

The experts at ICIT think the future of IoT devices needs to be secured by designing in and embedding security features from the bottom up.

2016-11-24

The Internet of Things Must Not Be Allowed To Turn Into The Internet of Trouble

The lack of consumer awareness combined with a dearth of regulation over web connected devices is a recipe for IoT disaster.

2016-11-29

Internet of Things – For Smart and Secure Cities

The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities.

2016-11-16

Internet of Things: 2017 Predictions

Experts are beginning to recognise that the IoT's potential to fuel business growth is accompanied by multifaceted complexity.

2016-11-21

Cisco says It Will Make The IoT Safe

Cisco Systems is making a play for the fundamental process of putting IoT devices online, promising businesses greater security.

2016-11-08

IoT Is A Cyberwar Nightmare

The world got a glimpse of the future when a large-scale cyberattack prevented access to many key websites, exposing big concerns about the IoT.

2016-11-04

New IoT Chips See, Think & Act Autonomously

The new generation of chips powering the Internet of Things have some quite remarkable capabilities.

2016-10-10

IoT 2.0: The Internet of Things-to-Things

Once just basic sensors collecting business data for operational tasks, now, the IoT is making connections across the value chain.

2016-09-21

How Will Terrorists Use The Internet of Things?

What is the future for the IoT, when smart refrigerators can be used in DDOS attacks and LED lightbulbs can communicate?

2016-09-07

Rio 2016 Olympic Games: IoT Technologies Win

The Rio 2016 games have brought a new aspect of technology to sports for live stadium audiences as well as television viewers internationally.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Team Cymru Research NFP

Team Cymru Research NFP

Team Cymru Research is a group of technologists passionate about making the Internet more secure and dedicated to that goal.

Truth Technologies Inc (TTI)

Truth Technologies Inc (TTI)

TTI is a premier provider of worldwide anti-money laundering, anti-fraud, customer identification, and compliance products and services.

Cellebrite

Cellebrite

Cellebrite delivers comprehensive solutions for mobile data forensics and mobile lifecycle management.

Keyfactor

Keyfactor

Keyfactor is a leader in cloud-first PKI as-a-Service and crypto-agility solutions. Our Crypto-Agility Platform seamlessly orchestrates every key and certificate across the enterprise.

DG Technology

DG Technology

DG Technology focuses on delivering a comprehensive security strategy, solutions and protection across all platforms from desktop to mainframe.

Silverskin Information Security

Silverskin Information Security

Silverskin is a cyber attack company that specializes in having knowledge of the attacker's mindset to identify vulnerabilities and build effective and persistent defences.

Platin Bilişim

Platin Bilişim

Platin Bilisim is an IT Security company providing consultancy, solutions and operational support services.

Armorblox

Armorblox

Armorblox stops targeted email attacks such as 0-day credential phishing, payroll fraud, vendor fraud, and other threats that get past legacy security controls.

SmartContractAudits.com

SmartContractAudits.com

SmartContractAudits.com is the leading platform for finding companies providing smart contract auditing services.

Citalid

Citalid

The Citalid cyber risk management platform combines threat and business intelligence to identify the risks scenarios you face.

JM Search

JM Search

JM Search’s Information Technology Executives Practice sources the most sought-after technology roles including CIO, CTO, CISO, CDO and other senior posts.

Qrator Labs

Qrator Labs

Qrator Labs is a leader in DDoS attack mitigation, helping organizations protect their websites from the most harmful, sophisticated DDoS attacks.

Ridge Global

Ridge Global

Ridge Global works with C-suite executives and corporate directors to build more resilient organizations through innovative preparedness, protection, response and education capabilities.

Tetra Defense

Tetra Defense

Tetra Defense is a leading incident response, cyber risk management and digital forensics firm.

HiddenLayer

HiddenLayer

HiddenLayer is a provider of security solutions for machine learning algorithms, models and the data that power them.

iManage

iManage

iManage's intelligent, cloud-enabled, secure knowledge work platform enables organizations to uncover and activate the knowledge that exists inside their business.