DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but rather “bolted on” afterwards.
The emergence of next generation technologies, such as the Internet of Things (IoT), artificial intelligence (AI), 5G, and data science, are poised to transform today’s cities into advanced smart cities. Electric utility companies, with their critical infrastructure and essential services,
Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial internet of things (IIoT). Message Queuing
Creating real-time visibility in operations is about delivering the right information at the right time to the right person. In today’s factories, visibility is often limited because of disparate IT and OT systems, reports based on data from last week,
We all know something big is happening “out there” in industrial operations around the globe. Companies are going beyond standard practices in Continuous Improvement (CI) as they seek step change improvement. Among them, programs go by a range of names:
IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network disruption the devices need
People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly get, which is based on
Robert is a recognized pioneer in the industrial security incident response and threat intelligence community. He gained his start in security as a U.S. Air Force Cyber Warfare Operations Officer tasked to the National Security Agency where he built a