MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
· Cybersecurity

MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols

Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial internet of things (IIoT).Message Queuing Telemetry Transport (MQTT) is a communication protocol widely used in both IoT and IIoT deployments. […]

Read more
How IIoT Creates Real-Time Visibility for Manufacturing – IIoT webinar and Q&A
· Connected Industry

How IIoT Creates Real-Time Visibility for Manufacturing – IIoT webinar and Q&A

Recorded version of “How IIoT Creates Real-Time Visibility for Manufacturing” webinar and Q&A Creating real-time visibility in operations is about delivering the right information at the right time to the right person. In today’s factories, manufacturing visibility is often limited because of disparate IT and OT systems, reports based on data from last week, and […]

Read more
Would you like to fly like Pan? Now you can!
· Digital Disruption

Would you like to fly like Pan? Now you can!

To soar like Pan, Peter Pan that is, represents a childhood fantasy that has captivated the minds and desires of countless girls and boys (and I am quite sure a few adults).   Whether it was the appeal of Neverland, Captain Marvel, Superman, Falcon, Ironman, Buzz Lightyear, or even Icarus; that inner desire of humans to […]

Read more
Industrial IoT Vision & Investment Guidelines
· Connected Industry

Industrial IoT Vision & Investment Guidelines

A connected factory, a robotic arm, and a power drill walk into a bar. The bartender asks them for data. All three start yelling at the same time. The bartender walks out. The next day, his body is found in a trough of disillusionment outside the old Gartner place. The data wars had begun… Today, the […]

Read more
[New report] Digital Readiness for Industrial Transformation
· Connected Industry

[New report] Digital Readiness for Industrial Transformation

We all know something big is happening “out there” in industrial operations around the globe. Companies are going beyond standard practices in Continuous Improvement (CI) as they seek step change improvement. Among them, programs go by a range of names: Digital or Industrial Transformation, Industrie 4.0, Smart Manufacturing, and many others. Whatever your company calls […]

Read more
IoT Security: The Visibility of Assets in the Field
· Cybersecurity

IoT Security: The Visibility of Assets in the Field

IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network disruption the devices need to know how to protect themselves on an individual basis. At Litmus we’ve seen three […]

Read more
Two sides of IT vs. OT Security and ICS Security Operations
· Cybersecurity

Two sides of IT vs. OT Security and ICS Security Operations

People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly get, which is based on a need to identify the proper structure, governance, staffing, tooling, training, etc., of personnel […]

Read more
Robert M. Lee, CEO
· Our Contributors

Robert M. Lee, CEO

Robert is a recognized pioneer in the industrial security incident response and threat intelligence community. He gained his start in security as a U.S. Air Force Cyber Warfare Operations Officer tasked to the National Security Agency where he built a first-of-its-kind mission identifying and analyzing national threats to industrial infrastructure. He went on to build […]

Read more
Vernon Turner, Executive Analyst
· Our Contributors

Vernon Turner, Executive Analyst

Vernon Turner, Executive Analyst at Ecosystm as well as Principal and Chief Strategist at Causeway Connections is a globally recognized expert in the traditional ICT market research. More recently, Mr. Turner extended that capability to include emerging technologies and new business models basing their roots off the Internet of Things (IoT) and sensor-based data. Mr. […]

Read more
IoT is driving the next industrial revolution
· Connected Industry

IoT is driving the next industrial revolution

IoT is driving the next industrial revolution. But hackers now see the supply chain as an easy target. The challenge: to mitigate the risk and drive more efficient, connected production, but without neglecting to invest in security and training – a topic very much in focus on the agenda at Internet of Things World in […]

Read more
Impact to large-scale implementations: Smart factories and smart cities
· Cybersecurity

Impact to large-scale implementations: Smart factories and smart cities

In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.M2M technology forms the core of IIoT systems for maintaining smart factories and building smart cities. As more of these connected […]

Read more