Paul Viorel
[IIC Whitepaper] Industrial Networking Enabling IIoT Communication
· Connected Industry

[IIC Whitepaper] Industrial Networking Enabling IIoT Communication

The internet is now redefining industries like energy, manufacturing, transportation and healthcare. This new wave is the Industrial Internet of Things (IIoT): an internet of things, machines, computers and people, enabling intelligent industrial operations using advanced data analytics for transformational business outcomes, according to Industrial Internet Consortium Industrial Internet Vocabulary, Version 1.0, May 7, 2015. The […]

Read more →
In the Digital Transformation era, speed and scale are of the top essence
· Connected Industry

In the Digital Transformation era, speed and scale are of the top essence

What do the likes of Mercedes-Benz, GE, Ford, Humana, Philips, LockheedMartin and Indian Railways have in common? Irrespective of the diverse domains they are posited, each of them is in a phase of transformation…Digital Transformation. As the convergence of algorithms, cloud, things, and data drives tectonic shifts across industries, bellwether companies are forced to break […]

Read more →
Daniel Ehrenreich, Consultant & Trainer
· Our Contributors

Daniel Ehrenreich, Consultant & Trainer

Formal Education:  B.Sc. Electronics: Graduated 1975  Business Administration: Study 2008  CISSP Course: Study 2014  ISO 27001- 2013 Certified Lead Auditor: Study 2017 Languages:  English, Hebrew, Hungarian Current Activity: Consultant & Trainer, SCCE-Secure Communications and Control Experts LinkedIn: Click here. Personal Qualifications:  Over 25 years of experience with Supervisory Control […]

Read more →
Commercial Availability of Self-Service Cyberhardening Technology
· Cybersecurity

Commercial Availability of Self-Service Cyberhardening Technology

RunSafe Security, the pioneer of a patented cyberhardening process for vulnerable embedded systems, devices and industrial control systems (ICS), has announced the commercial availability of Alkemist, a proprietary self-service technology built to reduce vulnerabilities and deny malware the uniformity needed to execute. Previously known as Software Guardian, Alkemist uses remotely deployable software binary runtime application self-protection […]

Read more →
US Intelligence says Cyber Threat Warning Lights are Blinking Red
· Cybersecurity

US Intelligence says Cyber Threat Warning Lights are Blinking Red

Why Industrial Operations are not Immune Recently, US intelligence chief Dan Coats remarked in a talk at the Hudson Institute that ‘the warning lights are blinking red again’ on cyber attacks, as they were before the Sept 11 attacks in 2001. While Coats addressed most of his comments to the country’s digital infrastructure, he mentioned […]

Read more →
Use of IoT and OEE for improving the performance of production
· Connected Industry

Use of IoT and OEE for improving the performance of production

Overall Equipment Effectiveness (OEE) is the most reliable practices metric for measuring manufacturing productivity. OEE is used as a baseline and benchmark to measure the utilization of a manufacturing operation or piece of equipment. Many uses OEE numbers to trace the progress of the company’s production quality over time. Benchmarks for OEE An OEE score […]

Read more →
Is Malware hiding in your ICS Network?
· Cybersecurity

Is Malware hiding in your ICS Network?

Most industrial organizations still consider their ICS networks to be safe from common cyber threats that mainly target IT networks. However, two recent cryptocurrency mining incidents demonstrate that  ICS networks are not “sterile” from unwanted software. Moreover, the fact that these cyber incidents took place at critical infrastructure facilities in Europe and Russia shatters the myth that […]

Read more →
4.0 Reasons Why Edge Computing is Relevant for Industry 4.0
· Connected Industry

4.0 Reasons Why Edge Computing is Relevant for Industry 4.0

Adopting Industry 4.0 practices could be critical for your business. And edge computing could be critical for your Industry 4.0 adoption plans. What is Industrial Edge Computing? Industrial edge computing means connecting all the benefits used in manufacturing, like energy and transportation. This allows companies to save, process and analyze data locally, in real time, […]

Read more →
Critical infrastructure cyberattack risk: from emerging concept to harsh reality
· Cybersecurity

Critical infrastructure cyberattack risk: from emerging concept to harsh reality

The current landscape  Cyberattacks targeting power grids and manufacturing plants in Europe over the past two years led me to believe that we would see the first major cyberattack on U.S. critical infrastructure in 2018. At the mid-year mark my prediction has already become a reality. The recent cyberattack in Atlanta destabilized municipal operations and […]

Read more →
Adi Dar, Chief Executive Officer
· Our Contributors

Adi Dar, Chief Executive Officer

Adi Dar, CEO and founder, is an experienced cybersecurity leader and chief executive who has repeatedly lead the development and launch of successful products and services in highly competitive markets. Previously, as CEO of ELOP (Israel’s largest Electro Optics company), Dar led the company’s growth to over $500M annual revenues. During this 6 year period, Dar […]

Read more →
How Adaptive Cyber Security Can Enable Digital Health Adoption
· Smart Cities, Buildings & Infrastructure

How Adaptive Cyber Security Can Enable Digital Health Adoption

Digital health focuses on connecting the systems, tools, medical devices, and services together that deliver needed healthcare to each of us and gives critical data insights to each player across the healthcare delivery landscape that weren’t available before.  According to the recent 8th Annual Industry Pulse Report from Change Healthcare, security and privacy concerns are […]

Read more →