· Connected Industry

The OEM IIoT Blind Spot – The Advantage OEMs Often Miss

An IIoT Scotoma If you’re familiar with the term, you know that scotoma is typically referred to as a blind spot. Interesting to note about a scotoma is the idea that if you don’t believe it, you won’t see it. It’s the believing that enables the seeing. We can build scotomas based on our belief […]

Read more
Vasanth Krishnan, Senior Analyst
· Our Contributors

Vasanth Krishnan, Senior Analyst

Vasanth is a Senior Analyst for Frost & Sullivan’s Global Industrial and Energy practice. Based in Chennai, India, Vasanth’s consulting experience covers a wide range of topics including power generation, transmission and distribution, retail and e-mobility. In addition Vasanth also covers digital topics in the energy and power sector. His consulting expertise includes mergers and […]

Read more
[New Report] The Top IIoT Influencers and Brands by Onalytica
· Connected Industry

[New Report] The Top IIoT Influencers and Brands by Onalytica

Onalytica has been creating Top 100 Influencer lists for the past ten years, connecting brands with influencer communities. The marketplace is now looking to understand who is influential beyond Twitter social amplifiers. Today’s Who’s Who report ranks top IIoT Influencers & Social Amplifiers, Brand Employees, Analysts, Journalists, Academics & Researchers. Also, the report ranks Key Opinion […]

Read more
Are We Doing Enough to Secure the US Power Grid?
· Cybersecurity

Are We Doing Enough to Secure the US Power Grid?

An Executive Order from US President Donald Trump in May this year overhauled the backbone of the nation’s electricity infrastructure, highlighting gaps and vulnerabilities in the operations of power systems and bulk power equipment, to attacks by hackers, terrorists and other state adversaries. So, what can be done to secure the US power grid? The […]

Read more
Remote Monitoring Can Help Speed Re-Opening
· Connected Industry

Remote Monitoring Can Help Speed Re-Opening

Everyone is asking some form of the same question: “When will we reopen?” When will schools reopen? When will we eat inside restaurants again? When can I go back to the office safely? Is it ok to go to the dentist? Should I go to the doctor to get a physical? These are all valid […]

Read more
Bryan Owen, PE
· Our Contributors

Bryan Owen, PE

Bryan Owen is Security Architect at OSIsoft LLC, makers of the PI System and LF Edge Foundation member fostering IIOT innovation. Bryan is an ambassador for advancing state of the art practices for industrial software security and critical infrastructure protection.  He is also active in public/private partnerships through collaboration with DHS CISA, DoE National Laboratories and […]

Read more
IIoT World Days Track: ICS Security – Risks, Strategies and Solutions
· Augmented Reality

IIoT World Days Track: ICS Security – Risks, Strategies and Solutions

Track Sponsored by aDolus This track, originally presented at IIoT World Days on June 30, 2020, covers 4 presentations from industry leaders in ICS Security: Five Blind Men and the Elephant called ICS Supply Chain Security The Road to Industrial IoT Security Automated ICS Vulnerability Assessment Identifying Compromises Through Device Profiling Using Open Source Tools […]

Read more
Securing your ICS Supply Chain – How to Thwart Attackers and Satisfy Regulators
· Past

Securing your ICS Supply Chain – How to Thwart Attackers and Satisfy Regulators

Securing ICS software supply chains is becoming increasingly urgent. Attackers, including criminal and state-sponsored groups, are turning their attention to the ICS supply chain as fertile ground for exploitation. And it is not going unnoticed. Not only are critical industries starting to devote serious resources towards the problem, but regulators are stepping in, like in […]

Read more
Rogue Automation: Vulnerable and Malicious Code in Industrial Programming
· Cybersecurity

Rogue Automation: Vulnerable and Malicious Code in Industrial Programming

In this White Paper, previously unknown design flaws that malicious actors could exploit to hide malicious functionalities in industrial programming for robots and other automated manufacturing machines are revealed. Since these flaws are difficult to fix, enterprises that deploy vulnerable machines could face serious consequences. An attacker could exploit them to become persistent within a […]

Read more