[New IIC white paper] Data Protection Best Practices
Protecting sensitive data created, stored and consumed by sensor-driven Industrial Internet of Things (IIoT) technology and applications is one of the foundations of trustworthy IIoT systems. Broadly speaking, data protection measures resist internal and external disturbances…
[Research] Securing Smart Factories in the Era of Industry 4.0
Adopting Industry 4.0 means not only interconnecting IT and OT networks to build smart factories; it also means having shared responsibilities between IT administrators and OT engineers. These include accounting for assets such as equipment, underlying…
Main Challenges of Implementing IoT Security Standards
IoT, as we know it today, allows us to make our lives easier — but it is not 100% secure. It can be hard to understand why it’s so difficult to come up with a comprehensive…
Embracing DevSecOps with Automated Software Binary Security
DevOps came about with the understanding that software development and information technology operations work together to improve deployment frequency, while maintaining service stability. In this process, security was not often part of an original build, but…
MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial…
IoT Security: The Visibility of Assets in the Field
IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network…
Two sides of IT vs. OT Security and ICS Security Operations
People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly…
Impact to large-scale implementations: Smart factories and smart cities
In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.M2M technology…
Oversight and Management of Cybersecurity Risks for Board of Directors/Decision Makers
As IoT cybersecurity threats increase in both severity and frequency, every
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with…