TECHNOLOGY > Key Areas > Internet of Things


« Back to News

2015-10-13

Who Will Step Up To Secure The Internet Of Things?

As everything in our Internet-enabled world becomes increasingly connected, everything is becoming accessible and potentially vulnerable.

2015-10-07

DARPA - Tech to Protect the Internet of Things

The Pentagon's emerging technology agency wants to know what a device's thermal output shows about potential cyber-intrusions.

2015-09-11

IoT Will Change Your Relationship With Insurance

You + IoT + Provider = A New Dialogue

2015-09-07

NSA Gives $300,000 for a Safer Internet of Things

The NSA is funding development for architecture for a "safer" Internet of Things (IoT) to 'design in' better security.

2015-08-24

Defusing The Internet Of Things Time Bomb

The IoT offerings present a unique challenge because of the balance between functionality and connectivity.

2015-08-07

Internet of Things Unlocks Revenue Opportunities

Business is just beginning to see the potential of IoT & Big Data to create value.

2015-08-05

How Analytics Will Influence Connected Cars

Connected services like in-car Wi-Fi are driving the adoption of cloud-based vehicle platforms enabled by embedded 4G broadband.

2015-07-27

Internet of Things: A Mass Surveillance Infrastructure

‘The most powerful political tool ever created’

2015-07-15

Unlocking the Potential of the Internet of Things

McKinsey think that the IoT has a total potential economic impact of $3.9 trillion to $11.1 trillion a year by 2025.

2015-06-01

Will Open Source Save the Internet of Things?

Cloud apps that collect and analyze data are heavily dependent on open source software & standards.

2015-05-12

Will the Internet of Things Save us from Traffic Jams?

Experts have given the green light to a traffic light revolution.

Quartz Conference
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

ZenGRC

ZenGRC

ZenGRC - the first, easy-to-use, enterprise-grade information security solution for compliance and risk management - offers businesses efficient control tracking, testing, and enforcement.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

Virtustream

Virtustream

The Virtustream Enterprise Class Cloud provides a secure, highly available, Infrastructure as a Service (IaaS) to enterprises and government customers.

MENTIS Software

MENTIS Software

MENTIS provides a comprehensive enterprise data security and breach prevention platform to protect sensitive information assets.

Mixed Mode

Mixed Mode

Mixed Mode is a specialist in embedded and software engineering for applications including IoT and secure embedded systems.

RiskCentric

RiskCentric

RiskCentric is a consultancy specializing in risk management and compliance.

VivoSecurity

VivoSecurity

VivoSecurity is a pioneer in cyber risk quantification based on data science. Our products and services help organizations achieve optimal information security and GRC programs.

TI Safe

TI Safe

TI Safe provide cybersecurity solutions for industrial networks of main critical infrastructures in Latin America.

Information Systems Security Partners (ISSP)

Information Systems Security Partners (ISSP)

ISSP is a specialized system integrator focused on the information security needs of its corporate clients and providing best in class products and services for securing organizational information.

HumanFirewall

HumanFirewall

Your secuirty is dorectly proportional to the awareness of your employees. Use Phishing simulation across your organization to train & profile user behavior.

Recovery Point Systems

Recovery Point Systems

Recovery Point is a leading national provider of IT secure and compliant infrastructure and business resilience services.

Trustonic

Trustonic

Trustonic is a leader in the device security market. Our mission is to protect apps, secure devices & enable trust.

Sixgill

Sixgill

Sixgill, an IoT sensor platform company, builds the universal data service and smart process automation software allowing any organization to effectively govern its IoE assets.

Cambridge Cybercrime Centre

Cambridge Cybercrime Centre

The Cambridge Cybercrime Centre is a multi-disciplinary initiative combining expertise from the Department of Computer Science and Technology, Institute of Criminology and Faculty of Law.

MassMutual Ventures

MassMutual Ventures

Mass Mutual ventures backs companies building category-defining businesses in markets including enterprise software, digital health, cybersecurity, and fintech.

Deduce

Deduce

Deduce use a combination of aggregate historical user data, identity risk intelligence, and proactive alerting to deliver a robust identity and authentication solution.

CyberGuard Technologies

CyberGuard Technologies

CyberGuard Technologies provides a suite of fully managed end-to-end security services from its 24/7 UK security operations centre.

AdEPT Technology Group

AdEPT Technology Group

AdEPT are a managed services and telecommunications provider offering award-winning, proven and uncomplicated technical solutions for over 12,000 organisations across the UK.