Hobsons Information Security Program

Hobsons developed this Information Security Program to protect Personal Information, as that term is defined below, found on records and in systems owned by Hobsons. This Program is intended as a comprehensive set of guidelines and policies that have been implemented in compliance with regulations issued by the Information Commissioners Office (ICO). This Program will be periodically reviewed and amended as necessary to protect Personal Information.

Spotlight

Boulder Technologies

BoulderTech is an IT Solutions and Services provider within the niche area of cybersecurity and cyberwarfare domain. Our expertise covers Vulnerability and Penetration test, Digital and Cyber Forensics, Threat Intelligence, End Point Protection. Our malware research experts have decades of solid experience working for AntiVirus companies such as Trend Micro, Symantec, CA and Microsoft.

OTHER WHITEPAPERS
news image

IoT Cybersecurity vision 2018-2019

whitePaper | November 6, 2019

The emergence of IoT – the networked connection of people, process, data and things – is expected to significantly grow the number of connected devices worldwide, from billions of units we have today, to tens of billions of units expected to be deployed in the coming years as stated by several analysts.

Read More
news image

Cybersecurity Considerations in Autonomous Ships

whitePaper | October 18, 2022

The NATO Cooperative Cyber Defence Centre of Excellence (CCDCOE) is a NATO-accredited knowledge hub offering a unique interdisciplinary approach to the most relevant issues in cyber defence.

Read More
news image

AWS Best Practices for DDoS Resiliency

whitePaper | December 5, 2019

You work to protect your business from the impact of Distributed Denial of Service (DDoS) attacks, as well as other cyberattacks. You want to keep your customers’ trust in your service by maintaining the availability and responsiveness of your application. And you want to avoid unnecessary direct costs when your infrastructure must scale in response to an attack.

Read More
news image

2020 Cyber Security Predictions

whitePaper | January 28, 2020

This year there are some common themes that endure, so we’ll highlight these as “work in progress”. Transformations often take longer than 12 months to be identifi ed as necessary, to be executed and to become established. However, there are other themes emerging through a combination of drivers from audit, compliance security and governance that are now showing signs of infl uencing the way that cyber risks are managed in a much shorter timescale.

Read More
news image

Security Challenges for the Energy Industry on the Industrial Internet of Things

whitePaper | November 4, 2022

The Industrial Internet of Things (IIoT) is a relatively new computing paradigm that combines machine learning (ML), artificial intelligence (AI), remote sensors, and device-control applications (or “apps”) to help businesses and industry achieve more efficient and reliable operations. In the oil and gas field, IIoT is used for a variety of purposes—from fully autonomous pump and valve control to remote sensing of security breaches at isolated wellsites.

Read More
news image

Asana Security and Privacy

whitePaper | October 26, 2022

Customers trust Asana with their data so that they can focus on the work that matters most to their businesses. That’s why we’re focused not only on creating an easy to-use collaborative work management solution, but also on keeping our customers’ data safe.

Read More

Spotlight

Boulder Technologies

BoulderTech is an IT Solutions and Services provider within the niche area of cybersecurity and cyberwarfare domain. Our expertise covers Vulnerability and Penetration test, Digital and Cyber Forensics, Threat Intelligence, End Point Protection. Our malware research experts have decades of solid experience working for AntiVirus companies such as Trend Micro, Symantec, CA and Microsoft.

Events