Golidlocks problem of mobile device security in organizations
· Cybersecurity

Golidlocks problem of mobile device security in organizations

Usability vs. Security The “Goldilocks and the three bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for organizations. The theme is trade-offs between usability of the device and security for confidential organizational […]

Read more
Chris Churilo, Director of Product Marketing
· Our Contributors

Chris Churilo, Director of Product Marketing

Chris Churilo is responsible for Product Marketing at InfluxData. Prior to joining InfluxData, she defined and designed a SaaS monitoring solution at Centroid, and prior to that she was the VP of product management at iPass and was the LOB for several cloud services that required her to track the business and operational metrics and […]

Read more
Alan Mihalic, Founder & President
· Our Contributors

Alan Mihalic, Founder & President

A senior Cyber Security Advisor and Risk professional with demonstrated expertise and success in cyber security, ICS security, cyber practice development,risk management, security architecture methodologies and principles supporting strategic enterprise security initiatives. Alan is currently President at the IoT Security Institute. Alan has a solid background in defining strategic IT security architectural road-maps and solutions […]

Read more
Trevor Rudolph, VP
· Our Contributors

Trevor Rudolph, VP

Trevor H. Rudolph is Vice President for Global Digital Public Policy at Schneider Electric where he directs Schneider’s technology policy and regulatory affairs strategy in North America, Europe, and Asia.  Prior to joining Schneider, Rudolph served for five years as the first appointed Chief of the Cyber and National Security Division at the White House […]

Read more
Why smart buildings represent a great business opportunity
· Smart Buildings

Why smart buildings represent a great business opportunity

Buildings are an integral part of everyday life. With people spending an estimated 90 percent of their lives indoors, the drive to ensure that those buildings are comfortable, safe, secure and provide the functionality that we want is more important than ever. But how do we take what are essentially inanimate, silent and passive structures and turn them into living […]

Read more
Redefining the Business Case for Industrial IoT
· Connected Industry

Redefining the Business Case for Industrial IoT

Industry 4.0 is rapidly transforming how businesses across the globe are operating in an ever increasingly commercially competitive landscape. According to the Industrial Internet of Things (IIoT) Market Size & Forecast Report, the global market is expected to be valued at USD 933.62 billion by 2025. Whilst IIoT affects many industries, the manufacturing sector is […]

Read more
Navigating the Connectivity Challenge in an IIoT World
· Connected Industry

Navigating the Connectivity Challenge in an IIoT World

What is the Connectivity Challenge for IIoT, and why will it persist? The challenge is pretty straightforward … and fundamental.  Simply stated, computing and connectivity obey different laws.   The law of computing is one of exponential power, Moore’s Law. From the dawn of computing to the present day, it’s the driving force behind Gartner’s recent […]

Read more
Figuring Out the Municipal Internet of Things
· Smart Cities

Figuring Out the Municipal Internet of Things

In order to realize the potential of Smart Cities, we’re going to have to figure out the Municipal Internet-of-Things (IoT). We know “smart communities” (a broader term meant to be inclusive of counties, special districts, and states in addition to cities) will utilize an assortment of devices, networks, data and analytics – what we’ll call […]

Read more
How to Actively Secure Your Industrial Environment In the New Era of Distrust
· Cybersecurity

How to Actively Secure Your Industrial Environment In the New Era of Distrust

Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events. Up until only recently the IT infrastructure played front […]

Read more
The Relationship Between AI and Machine Monitoring
· Connected Industry

The Relationship Between AI and Machine Monitoring

While buzzwords such as predictive maintenance, artificial intelligence, digital twin and augmented reality have promised to enable the fabled digital transformation of manufacturing, when it comes to Industry 4.0, most practical applications start and end with machine connectivity. And when it comes to driving value, look no further than answering these questions; “What’s happening?” and […]

Read more
Brad Parsons, CEO and Founder
· Our Contributors

Brad Parsons, CEO and Founder

Brad Parsons is the CEO and Founder of MOVUS, the developer and provider of FitMachine®, a continuous condition monitoring solution supporting industrial businesses across the globe in several industries, including heavy manufacturing, mining and minerals processing, food and beverage manufacturing, chemicals, rendering, and energy.

Read more
Attack Vectors in the… Trillions?
· Cybersecurity

Attack Vectors in the… Trillions?

The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality few are talking about: the exponential vector problem. Yes, the attack surface is huge and growing. 127 new devices per second are […]

Read more