Internet of Things – For Smart and Secure Cities

The Internet of Things (IoT) merges software and hardware with network connectivity, for the benefit of creating smart cities and safe cities.

IoT devices, from smart home appliances to smart vehicles, cameras, smart traffic lights and various sensors embedded in municipal infrastructures, can help bring about better municipal functioning. IoT connectivity also enables us to improve our personal and public security.

The deployment of cameras and sensors and the ability to analyse the vast visual information they collect, the ability to monitor data and statistics that were not available in the past, and the systems’ ability to automatically react to alerts, all these bring about an effective use of the IoT network.

The analysis of big data collected by IoT devices can widen our understanding regarding the management of cities and their environment, from the perspectives of efficient transportation or smart management of garbage collection etc.

A “smart city” networked with connected devices enhances the anti-terror and anti-crime capabilities, the control over city centers, as well as over remote vital installations, to reduce traffic congestion, detect potholes on routes via sensors, and more. These are achieved through the data flowing from the city’s systems to the municipal command and control centers.

Yet the growth in the IoT field also involves a growth in the market for IoT security products, as connectivity and the large number of connected devices become target to Hackers attacks, such as the one that paralysed major websites last October.

Worldwide IoT security spending is expected to reach $348 Million in 2016, a 24% percent increase from 2015 spending, according to a Gartner research.

I-HLS:       IoT Turns Cities Into Cyber Battlegrounds:

 

 

« Snowden 2.0: Its Déjà Vu All Over Again At The NSA
Wise After The Event, Or Why Big Data Failed To Predict President-Elect Trump »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

Syxsense

Syxsense

Syxsense brings together endpoint management and security for greater efficiency and collaboration between IT management and security teams.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

BackupVault

BackupVault

BackupVault is a leading provider of completely automatic, fully encrypted online, cloud backup.

RoboForm

RoboForm

RoboForm's industry-leading encryption technology securely stores your passwords, with one Master Password serving as your encryption key.

Cienaga Systems

Cienaga Systems

Cienaga Systems is a leader in autonomous cyber threat hunting technology.

OneWelcome

OneWelcome

Onegini and iWelcome have merged to become OneWelcome, the largest European Identity Access Management Saas Vendor.

Securicon

Securicon

Securicon provides expert consulting for application, system and network security.

Repulsa

Repulsa

Repulsa provides state-of-the-art, patented, fast filtering with over 700 million malicious IP addresses and over 30 million categorized site listings updated daily.

Gradiant

Gradiant

Gradiant’s mission is to contribute to the growth and competitive improvement of Galician businesses through technology development and innovation using ICT.

InFyra

InFyra

InFyra is an IoT & Telecoms specialist consultancy, with extensive global and local experience in business and technology strategy, networks and solutions development.

Corax

Corax

Corax is the world’s leading and largest source of cyber exposure data and loss analytics for insurance.

Peraton

Peraton

Peraton provides innovative solutions for the most sensitive and critical programs in government today, developed and executed by scientists, engineers, and other experts.

ScienceSoft

ScienceSoft

ScienceSoft is a provider of software development and IT consulting services including Information Security.

Turnkey Consulting

Turnkey Consulting

Turnkey Consulting is a leading provider of Integrated Risk Management (IRM), Identity Access Management (IAM), and Cyber and Application Security.

Reliance ACSN

Reliance ACSN

Reliance ACSN managed security and consultancy services support organisations throughout the challenges of assurance, awareness, detection, response and prevention.

SAM Seamless Network

SAM Seamless Network

SAM Seamless Network is a cybersecurity technology platform that protects the connected home, by tackling cyber security threats at the source.

SafeStack Academy

SafeStack Academy

SafeStack Academy is an online cyber security and privacy education platform. Our content is designed by experts to suit small businesses, growing companies, and development teams.

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

Global Cybersecurity Institute - Rochester Institute of Technology (RIT)

At RIT’s Global Cybersecurity Institute, we educate and train cybersecurity professionals; develop new cybersecurity and AI-based knowledge for industry, academia, and government.

MedSec

MedSec

MedSec is the only company of its type focused solely on cybersecurity for hospitals and medical device manufacturers, offering both a cybersecurity software solution and consulting services.