Paul Viorel
IoT is driving the next industrial revolution
· Connected Industry

IoT is driving the next industrial revolution

IoT is driving the next industrial revolution. But hackers now see the supply chain as an easy target. The challenge: to mitigate the risk and drive more efficient, connected production, but without neglecting to invest in security and training – a topic very much in focus on the agenda at Internet of Things World in […]

Read more →
Impact to large-scale implementations: Smart factories and smart cities
· Cybersecurity

Impact to large-scale implementations: Smart factories and smart cities

In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.M2M technology forms the core of IIoT systems for maintaining smart factories and building smart cities. As more of these connected […]

Read more →
AI – Putting the “Smart” in Smart Lighting Solutions
· Smart Cities

AI – Putting the “Smart” in Smart Lighting Solutions

In the realm of IoT, smart lighting seems so last year – people tend to think that the only feature of a smart light is the ability to remotely turn on and off the light, which is something that people just expect now in a smart device.  However, remotely controlling a light is just the beginning of possibilities […]

Read more →
Siemens Board Level Perspectives on IIoT & Blockchain
· Connected Industry

Siemens Board Level Perspectives on IIoT & Blockchain

Recently, Lucian Fogoros, Co-founder and Managing Director of IIoT World, interviewed Klaus Helmrich, Member of the Managing Board of Siemens AG and CEO Digital Industries. Some of the questions we asked were crowdsourced. Lucian Fogoros: Industry 4.0 is today mostly about customization of products – how does Siemens see customization opportunities in Industry 4.0 without a […]

Read more →
Cultivating Security in the Food Production Industry
· Cybersecurity

Cultivating Security in the Food Production Industry

In the food production industry, high-tech tools and systems are being used to optimize production conditions. But new technology brings new challenges and risks. The world population is expected to reach 9.8 billion in 2050, according to a study published in 2017 by the United Nations Department of Economic and Social Affairs. The same study also shows […]

Read more →
A new partnership for ICS Cybersecurity and security of Smart Cities
· Cybersecurity

A new partnership for ICS Cybersecurity and security of Smart Cities

The IoT Security Institute (IoTSI) announced this week that it has established a collaborative partnership with MEASC and Quill Security Technology. “This partnership acknowledges the increasing importance of a “time to act” approach to cybersecurity in smart cities and critical infrastructure design, operation and ongoing compliance services. Smart Cities are a must have in a smart digital age. They make […]

Read more →
Peter Herweck, EVP Industrial Automation Business
· Our Contributors

Peter Herweck, EVP Industrial Automation Business

Peter began his career at Mitsubishi where he served as Software Development Engineer. In 1993, he joined Siemens in the Motion Control for Machine Tools unit where he led various R&D projects. He later moved to the US to take the responsibility for Motion Control for Machine Tools, equipping American Machine Tool builders, subsequently took […]

Read more →
How to Capture the Right Type of Data
· Analytics

How to Capture the Right Type of Data

When it comes to collecting data with industrial IoT within the world of manufacturing, it isn’t just about quantity. It’s also about the quality of the information that you are gathering from various machines; manufacturing data analytics that enables you to analyze it and make decisions now, and for the long term. What is Deep Data […]

Read more →
DDoS Attacks on IoT. Doesn’t remind you of something… ?
· Cybersecurity

DDoS Attacks on IoT. Doesn’t remind you of something… ?

It’s unfortunate that cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on a daily basis is growing, more avenues of exploitation will be open to cybercriminals — unless we close those pathways. Among the types of attacks that have […]

Read more →