TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2016-07-19

A Strategic Company: The Internet of Things & How ARM Fits In

ARM Holdings designs mobile and low-power chips found in many IoT devices, the servers that connect them & the devices used to control them.

2016-07-04

How Will IOT Change Banking?

The banking industry is now starting to see the various potential ways in which IoT can help to take it to the next level.

2016-03-01

Mobile And IOT Technologies Are Inside The Curve Of Human Time.

The leap from human time to computer time has relevance in business today. Opinion By Kevin Benedict

2016-02-08

Security & Privacy Are Critical To Connected Cars

The automotive industry is rapidly evolving to transform the car from a simple mode of transport to a personalized information hub.

2016-02-06

The Internet of Things Needs Another 10 Years

The IoT is an exciting growth opportunity. The problem is that it is really many different opportunities, each growing at its own pace.

2015-12-09

Insurance Tech Faces the Internet of Things Arms Race

As business intelligence and analytics technologies improve, insurers are developing strategies around easily accessible external data sources.

2015-12-08

Hackers Can Use Holes In The Internet of Things

Vulnerabilities in IOT devices such as fitness bands, smart-watches, drones and connected appliances could all be exploited by Hackers

2015-12-06

IoT Turns Cities Into Cyber Battlegrounds

The Internet of Things is racing ahead of the current state of the art in cyber security, leaving many devices vulnerable to attack.

2015-12-01

IoT Attacks and Evasion Will Characterize 2016

The Internet of Things along with predictions of new malicious tactics & strategies will create unique challenges in 2016.

2015-11-21

Internet of Things will drive the Digital Revolution of Industry

Increased connectivity is going to change the way we communicate and do business.

2015-10-13

Who Will Step Up To Secure The Internet Of Things?

As everything in our Internet-enabled world becomes increasingly connected, everything is becoming accessible and potentially vulnerable.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Directory of Cyber Security Suppliers

Directory of Cyber Security Suppliers

Our Supplier Directory lists 8,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

PROMIA

PROMIA

PROMIA is in the business of providing solutions that are designed to support highly secure, reliable, scalable and interoperable business applications.

LSEC

LSEC

LSEC is a global innovator and facilitator for the Cybersecurity industry. It is a non-profit membership organisation supporting further maturing the industry through its end users.

NITA Uganda (NITA-U)

NITA Uganda (NITA-U)

NITA-U has put in place the Information security framework to provide Uganda with the necessary process, policies, standards and guideline to help in Information Assurance.

Applied Science and Technology Research Institute Company Limited (ASTRI)

Applied Science and Technology Research Institute Company Limited (ASTRI)

ASTRI's mission is to enhance Hong Kong’s competitiveness in technology-based industries through applied research in areas including Security & Data Sciences which encompasses cybersecurity.

C2A Security

C2A Security

C2A Security offers a comprehensive suite of cyber security solutions for the automotive industry, providing in-vehicle end-to-end protection.

Westminster Insight - Cyber Security Conference

Westminster Insight - Cyber Security Conference

Join colleagues this December for Westminster Insight’s Cyber Security Conference, as you’ll assess how new technologies such as AI can secure your organisation against future threats.

White & Black

White & Black

White & Black are specialist corporate & technology lawyers based in London & Oxford.

RackTop Systems

RackTop Systems

RackTop Systems is the pioneer of CyberConverged data security, a new market that fuses data storage with advanced security and compliance into a single platform.

NeuShield

NeuShield

NeuShield is the only anti-ransomware technology that can recover your damaged data from malicious software attacks without a backup.

OpSec Security

OpSec Security

OpSec Online is the only brand protection solution that spans all channels so your brands are protected no matter what digital venue the criminals target.

Tapestry Technologies

Tapestry Technologies

Tapestry Technologies supports the Department of Defense in shaping its approach to cybersecurity.

Qohash

Qohash

With a focus on data security, Qohash supports security, compliance and optimization use cases enhancing your risk management process.

Upfront Security

Upfront Security

Upfront Security helps companies with innovative products & services to prevent, recognise and recover from (identity) fraud.

Novacoast

Novacoast

Novacoast helps organizations find, create & implement solutions for a powerful security posture through advisory, engineering, development & managed services.

Cylab - Carnegie Mellon University

Cylab - Carnegie Mellon University

Carnegie Mellon University CyLab is the University's security and privacy research institute.

Muscope Cybersecurity

Muscope Cybersecurity

Muscope CYSR platform performs a risk assessment and offers a comprehensive overview of the potential cyber attack risks.