Machine Learning and Data Engineering Applications in Agriculture
“In God we trust, all others bring data.” William Edwards Deming In this article, we show the importance of interference between Machine Learning, Data Engineering, and Agriculture. The main problems…
June 2023 Industrial IoT & ICS Cybersecurity Events
Welcome to June 2023, the midpoint of the year! This month, we have compiled a comprehensive list of events happening worldwide, in-person and online, specifically tailored to the Industrial IoT…
DevOps for IIoT: Principles, Challenges & Requirements
Over the past 5 years ‘DevOps’ has taken a hold of software development. ‘DevOps’ is an intent and set of practices to bring system operations and application development closer together.…
Exploring SBOMs and Software Escrow: Strategies for Securing OT Supply Chains
“Timely and secure information sharing can bridge the gap between vulnerability and security.” This was a key message from a webinar on ICS & OT Supply Chain Risk Management presented by Information…
IIoT-World / UniversalAutomation.Org Q&A
1. In one of your blogs published last year, you mentioned that “it’s time for universal automation.” What is holding us back? What is universal automation? It is basically the…
A Flurry of Regulatory Action and the Need for SBOMs
Executive Order 14028 on Improving the Nation’s Cybersecurity was issued in May of 2021 and provided a roadmap for a series of regulatory initiatives that government agencies (and anyone doing…
MQTT Vs. HTTP for IoT
MQTT was designed for the Internet of Things (although it wasn’t called that at the time) whereas HTTP was created to make documents available across the internet. They both run…
The Inventors of Things
Introduction Inventors live forever. They must be given credit for their obedience to science and lifetime dedication to aiming for discoveries that serve to improve human life on planet Earth.…
How to better manage your digital attack surface risk
As organizations shift to the cloud in droves, their digital attack surface continues to rapidly expand. And with the number of threats rapidly increasing, security leaders need to enhance their…
Cybersecurity Trends to Prepare for in 2022
Recap of Cybersecurity and Cyber Attacks in 2021 Dare I say that the past year has been…drumroll…unprecedented…in the realm of cybersecurity and cyber attacks? Here are some statistics to showcase…
The virtualization in the factory
Virtualization, which in recent years has taken increasingly important steps, has become the model of integration and management of systems with the most promising evolution. Virtualization also means rationalizing the…
Addressing cybersecurity vulnerabilities in the changing LINUX landscape
Linux is a prevalent component of nearly every workload: more than 90% of cloud workloads and 70% of web servers run on it. Like all technology solutions, Linux has continued to evolve…