
Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity
Since the mid-1990s, many industrial companies have interconnected their industrial control systems (ICSs) to improve productivity, maintenance, and safety in the operational environment. Some of this interconnectivity was to the Internet. While, this connectivity helped to…

Medical Device Safety and Security: Obvious but not easy to achieve
With accelerating technology innovation, medical devices are becoming more sophisticated and more connected. Consequently, as in most mission-critical systems, safety and security are two increasingly vital requirements in medical device design. In April 2018, the U.S.…

Control system cybersecurity is being discussed but still with misunderstandings
I attended a number of sessions at the February 24-27, 2020 RSA 2020 Cybersecurity Conference in San Francisco. One of the sessions really struck me as getting it right. The session I found most compelling was with…

Linux vs QNX: 6 Considerations When Safety Certifying Embedded
Safety-certification of an embedded device can take a year or more and cost millions of dollars. Yet as many as 60% of products that companies attempt to safety certify fail to receive the desired stamp of…

Supply Chain Economics and Cybersecurity
Let’s face it, supply chains are complex and distributed. Operations matter, and for some it is truly a miracle how many coordinated parts come together into a seamless operation. In fact, some manufacturers have tens of…

Cybersecurity and Data Concerns in 5G
For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One…

Extend the Lifecycle of Embedded Systems with a Hypervisor
Multiple embedded systems are at the heart of medical devices, transportation systems, automobiles, heavy equipment, and industrial robotics. In complex systems like these, a hypervisor provides the supervision to safely and reliably allowing separate functional software…

IoT: Three Types of Security
IoT security will never be confused with Fort Knox. It is very important that IoT to be secure in a way that is both technically and economically appropriate. But an IoT strategy that does not incorporate…

Identifying Compromises Through Device Profiling
The Internet and our local networks have the ability to handle an amazing quantity of connections simultaneously. That strength leads to a problem when we’re trying to detect malicious traffic: how can we tell when one…
![[New Report] Cybersecurity for smart factories](https://www.iiot-world.com/wp-content/uploads/2020/02/manager-industrial-engineer-using-tablet-check-control-automation-robot-arms-machine-1024x446.jpg)
[New Report] Cybersecurity for smart factories
Almost half (40%) of manufacturers surveyed recently by Deloitte and the Manufacturers Alliance for Productivity & Innovation (MAPI) said their operations were impacted by a cyber incident in the past 12 months, and yet one in four have not performed…