TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2016-09-02

Internet of Things Will Turn Hacks Into Disasters

The next US President will probably be forced to deal with a large-scale internet disaster that kills multiple people.

2016-07-19

A Strategic Company: The Internet of Things & How ARM Fits In

ARM Holdings designs mobile and low-power chips found in many IoT devices, the servers that connect them & the devices used to control them.

2016-07-04

How Will IOT Change Banking?

The banking industry is now starting to see the various potential ways in which IoT can help to take it to the next level.

2016-03-01

Mobile And IOT Technologies Are Inside The Curve Of Human Time.

The leap from human time to computer time has relevance in business today. Opinion By Kevin Benedict

2016-02-08

Security & Privacy Are Critical To Connected Cars

The automotive industry is rapidly evolving to transform the car from a simple mode of transport to a personalized information hub.

2016-02-06

The Internet of Things Needs Another 10 Years

The IoT is an exciting growth opportunity. The problem is that it is really many different opportunities, each growing at its own pace.

2015-12-09

Insurance Tech Faces the Internet of Things Arms Race

As business intelligence and analytics technologies improve, insurers are developing strategies around easily accessible external data sources.

2015-12-08

Hackers Can Use Holes In The Internet of Things

Vulnerabilities in IOT devices such as fitness bands, smart-watches, drones and connected appliances could all be exploited by Hackers

2015-12-06

IoT Turns Cities Into Cyber Battlegrounds

The Internet of Things is racing ahead of the current state of the art in cyber security, leaving many devices vulnerable to attack.

2015-12-01

IoT Attacks and Evasion Will Characterize 2016

The Internet of Things along with predictions of new malicious tactics & strategies will create unique challenges in 2016.

2015-11-21

Internet of Things will drive the Digital Revolution of Industry

Increased connectivity is going to change the way we communicate and do business.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

WEBINAR: How To Build And Implement An Effective Endpoint Detection And Response Strategy

Join this webinar to learn how the cloud threat landscape is evolving and organizations are deploying more advanced and capable security controls at scale.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Hodgson Russ

Hodgson Russ

Hodgson Russ is a US business law firm. Practice areas include Privacy, Data Breach & Cybersecurity.

PRESENSE Technologies

PRESENSE Technologies

PRESENSE Technologies specializes in monitoring and enforcing IT security policies at critical points in the network and on end systems.

Business Continuity

Business Continuity

Business Continuity delivers integrated IT solutions for cybersecurity, virtualization, cloud platforms and operational security solutions.

Digi International

Digi International

Digi is a leading global provider of mission-critical and business-critical machine-to-machine (M2M) and Internet of Things (IoT) connectivity products and services.

Crypto Quantique

Crypto Quantique

Crypto Quantique's ground-breaking technology radically simplifies the process of generating a hardware root of trust in an IoT device.

TROOPERS

TROOPERS

TROOPERS InfoSec event consists of two days of high-end training, followed by a two-day, three-track conference, culminating in Roundtables on the final day.

ComoNExT Innovation Hub

ComoNExT Innovation Hub

ComoNExT is a Digital Innovation Hub and a startup incubator with a focus on the issues of digital transformation and Industry 4.0.

HackHunter

HackHunter

HackHunter’s passive sensor network continuously monitors, detects and alerts when a malicious WiFi network and/or hacking behaviour is identified.

Security Management Partners (SMP)

Security Management Partners (SMP)

Security Management Partners (SMP) is a trusted partner to financial services, healthcare and businesses that need to manage their information, securely.

Kainos

Kainos

Kainos is a leading provider of Digital Services and Platforms. Our services include Digital Transformation, Cyber Security, Cloud, AI, IoT and more.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Cymptom

Cymptom

At Cymptom our purpose is to enable security managers to see at a glance all urgently risky gaps  in their organizations’ security posture at any given moment.

Oxford Internet Institute - University of Oxford

Oxford Internet Institute - University of Oxford

The Oxford Internet Institute is a multidisciplinary research and teaching department of the University of Oxford, dedicated to the social science of the Internet.

PacketViper

PacketViper

PacketViper’s Deception360 actively defends networks with deception-based threat detection and automated response to both external and internal cyber threats.

SoLVBL Solutions

SoLVBL Solutions

SoLVBL Solutions Inc. is a solutions engineering company specialized in applications that address critical data integrity and authentication problems.

TrustCloud

TrustCloud

TrustCloud is a global company specializing in the orchestration and custody of secure digital transactions including identification, signature, payments, and electronic custody.