Why MQTT Has Become the De Facto Standard for the Connected Car
The automotive industry is seeing increasing demands to offer connectivity solutions to consumers. Digitalization and connectivity have been top priorities for automotive executives for the last several years. In fact,…
Using Security Monitoring to Address Cybersecurity Threats
Joe Saunders, CEO of RunSafe Security, recently hosted a panel discussion on Monitoring Open Source Software in SAAS Infrastructure. His panel included business leaders in the software, technology, and security sectors:…
Three Ways to Help Improve the Nation’s Cybersecurity
By now, you’ve heard about Executive Order 14028 on “Improving the Nation’s Cybersecurity” which President Biden signed in May, 2021. It begins by stating, “The United States faces persistent and increasingly…
Virtualization in the Factory
Virtualization, which in recent years has taken increasingly important steps, has become the model of integration and management of systems with the most promising evolution. Virtualization also means rationalizing the…
From Centralized to Hybrid Edge and Cloud Architectures
It is already clear that centralized cloud-based architectures cannot exclusively manage the billions of IoT devices predicted to exist in the coming years. Edge computing is now accepted as a…
Enabling a New Era of Industrial IoT with Free-Use Wireless Spectrum
Flexibility, ingrained security and centralized management are the touchstone of successful network deployments in just about any setting, especially as devices and services proliferate whether it be over wired or…
Cybersecurity for Shared Cloud Environments
In its recent Cloud Workload Protection Platform (CWPP) research note, Gartner identified memory exploit protection as an essential component of any organization’s CWP strategy (Gartner, Cloud Workload Protection Platforms, 2020): …
[White Paper]Protecting the Embedded and IoT Software Build Environment with Software Composition Analysis
Ensuring the quality, reliability and safety of software requires navigating a complex supply chain made up of engineers, operations managers, contractors, and independent software vendors (ISVs), along with open source…
IIoT World Days Track: ICS Security – Risks, Strategies and Solutions
Track Sponsored by aDolus This track, originally presented at IIoT World Days on June 30, 2020, covers 4 presentations from industry leaders in ICS Security: Five Blind Men and the…
Accelerating Innovation and new product introductions with Platform Standardization
When you are managing multiple products or product lines, each may have their own custom operating system (OS). And small software differences between products can evolve and result in significant…