[New IIC white paper] Data Protection Best Practices

[New IIC white paper] Data Protection Best Practices

Protecting sensitive data created, stored and consumed by sensor-driven Industrial Internet of Things (IIoT) technology and applications is one of the foundations of trustworthy IIoT systems. Broadly speaking, data protection measures resist internal and external disturbances…

[Research] Securing Smart Factories in the Era of Industry 4.0

[Research] Securing Smart Factories in the Era of Industry 4.0

Adopting Industry 4.0 means not only interconnecting IT and OT networks to build smart factories; it also means having shared responsibilities between IT administrators and OT engineers. These include accounting for assets such as equipment, underlying…

Embracing DevSecOps with Automated Software Binary Security

Embracing DevSecOps with Automated Software Binary Security

DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but…

IoT Security: The Visibility of Assets in the Field

IoT Security: The Visibility of Assets in the Field

IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network…