Coche Conectado AECC.JPG

Automotive Edge Computing Consortium shifts connected car market into high gear

AT&T, DENSO, Ericsson, Intel, KDDI, NTT, NTT DOCOMO, Sumitomo Electric, Toyota, and Toyota InfoTechnology Center form alliance to drive ecosystem toward a Big Data future

Alex Sinclair GSMA.jpg

GSMA: multiple mobile operators launch live commercial Low Power Wide Area networks in licensed spectrum Worldwide

41 mobile IoT networks now available Worldwide, supported by IoT labs and growing mobile innovator community more
Banda Ancha Davos.jpg

UN Broadband Commission sets in Davos global broadband targets to bring online the world’s 3.8 billion not connected to Internet

Broadband Commission for Sustainable Development launches 2025 targets to support “Connecting the Other Half” more
more news


John N Stewart with Noboru Nakatani.jpg

Cisco and INTERPOL collaborate to combat cybercrime

Cisco, the worldwide technology leader, and INTERPOL, the world’s largest international police organization, have announced an agreement to share threat intelligence as the first step in jointly fighting cybercrime

Things Mobile.jpg

Things Mobile: the first global mobile operator dedicated to the Internet of Things (IoT) is born

Things Mobile to connect millions of devices around the world - even without Wi-Fi more
Greg Fitzgerald Javelin.JPG

Javelin Networks announces $5M Series-A funding to fuel its next-generation active directory protection platform

The company appoints key industry veterans as executives to lead sales and board more
more products


Brian Lord OBE.JPG

The Mind of the Hacker - Insights from GCHQ, MI6 and Israeli Intelligence

It used to be the trickery of the disinterested joker – bright youngsters pulling the data strings just to see what would happen. Then came criminals, adapting old con-trickery and thieving skills to the new cyber environment. Then it escalated to international gangs and now we are faced with political interest and rival shaping a post-truth world. Where are we heading? What is already happening? Vital questions must be addressed in this opening session before we turn to the technologies, solutions and strategies for securing the Cloud and Internet of Things. Brian Lord, OBE – former GCHQ Deputy Director for Intelligence and Cyber Operations – begins by describing the big picture, how it is evolving and where we could be heading. How is the balance of knowledge and power changing? And how will this affect our industry, business and society?

Special Guest Speaker Greg Fitzgerald Cylance.jpg

New technology approaches to today’s threat environment

Too often the bad guys are winning. Every day we learn about more cyber attacks – that is to say, more successful examples where hackers manage to penetrate vital business or government systems, steal data, steal money, steal intellectual property, and insert secret back doors for continuous surveillance, espionage, and sabotage

Copia de Nir_Zuk.jpg

Thinking Secure? Or Just Feeling Secure? The need to accelerate creative innovation on this side of the law

Nir Zuk, serial entrepreneur & founder, Palo Alto Networks, at NetEvents EMEA Press Summit Barcelona 2011 more
more interviews



Gartner survey reveals nearly half of organizations implementing IoT are using or plan to use digital twin initiatives in 2018

Forty-eight percent of organizations that are implementing the Internet of Things (IoT) said they are already using, or plan to use digital twins in 2018, according to a recent IoT implementation survey by Gartner, Inc. In addition, the number of participating organizations (202 respondents across China, U.S., Germany and Japan) using digital twins will triple by 2022

Robert Haim ACG and Panel.JPG

We must secure the Internet of Things before someone gets hurt

Dick Cheney, the former vice president of the United States, famously disabled wireless access to his heart pacemaker because he was afraid that terrorists could induce a heart attack. In the 2007 movie “Live Free or Die Hard,” criminals blocked traffic and caused accidents by turning all of Washington, D.C.’s traffic signals to green more
John N Stewart Cisco.jpg

Cisco Annual Cybersecurity Report reveals security leaders rely on and invest in automation, ML and AI to defend against threats

Findings show 39 percent of organizations are reliant on automation, 34 percent are reliant on machine learning, 32 percent are highly reliant on AI more
more articles