IIoT World Recognized as Third Fastest Growing Company in Upstart Category at Weatherhead 100 Ceremony
· Connected Industry

IIoT World Recognized as Third Fastest Growing Company in Upstart Category at Weatherhead 100 Ceremony

IIoT World LLC, a woman-owned digital media outlet focused on Industrial Internet of Things (IIoT) content, has recently been recognized as the third-fastest growing company in the Upstart category at the annual Weatherhead 100 ceremony. Hosted by the Weatherhead School of Management at Case Western Reserve University, the ceremony celebrates the top 100 fastest-growing companies […]

Read more →
[Research] Risks of the Industrial IoT in Compromised Campus Networks
· Connected Industry

[Research] Risks of the Industrial IoT in Compromised Campus Networks

5G, along with its role in industries, is a popular topic. An important part of this conversation is the campus network, which serves as one of the key implementations of 4G/LTE and 5G technologies in an industrial setting. In particular, campus networks were implemented to fulfill the growing requirement for higher availability and lower latency, […]

Read more →
Why Cyber Change Outpaces Boardroom Engagement
· Cybersecurity

Why Cyber Change Outpaces Boardroom Engagement

Humans are addicted to stories. But sometimes the stories we tell are overly simplistic. In cybersecurity, a recurring narrative is one of C-suite executives perpetually at odds with IT leaders. They’re disinterested in what the security team does, and release funds begrudgingly and often reactively once a serious incident has occurred. This leads to mounting […]

Read more →
[Report] ICS cybersecurity for the Electric Utilities Industry
· Connected Industry

[Report] ICS cybersecurity for the Electric Utilities Industry

The risk of security incidents is rapidly increasing in the electric industry, which plays a crucial role in critical infrastructure. This is due to the increasing vulnerability of the system caused by the modernization of the electricity generation, transmission, and distribution systems (i.e. digitalization, network connectivity, and the use of generic software and IT). There […]

Read more →
Cybersecurity for Industrial Control Systems: Part 1
· Cybersecurity

Cybersecurity for Industrial Control Systems: Part 1

In this two-part series, we look into various cybersecurity threats that affected industrial control systems endpoints. We also discuss several insights and recommendations to mitigate such threats. The ever-changing technological landscape has made it possible for the business process on the IT side of an enterprise to be interconnected with the physical process on the […]

Read more →
When Industrial Protocol Translation Goes Wrong
· Cybersecurity

When Industrial Protocol Translation Goes Wrong

A recent research paper delves into the vital role of protocol translation in industrial facilities by looking at the protocol gateway. It is a small device that translates the different protocols used by machinery, sensors, actuators, and computers that operate smart factories, dams, power plants, and other industrial facilities. If protocol gateways fail, then the […]

Read more →
Cybersecurity for Cloud Migration
· ICS Security

Cybersecurity for Cloud Migration

In an interview with Merritt Baer (AWS Office of the CISO), Aaron Ansari VP, Cloud Security at Trend Micro discusses how fundamental information security is to business functions in today’s world. Cybersecurity is Job Zero It’s everyone’s job to ensure they are working to help secure the organization – from the frontline workers to the […]

Read more →
Cybersecurity Threats to ICS Endpoints
· ICS Security

Cybersecurity Threats to ICS Endpoints

As the interconnection between IT (information technology) and OT (operational technology) continues to grow, cybersecurity for Industrial Control Systems (ICS) is becoming more important. Trend Micro shares their findings on both old and new threats that hound industrial endpoints in their “2020 Report on Threats Affecting ICS Endpoints.” Cybersecurity and Malware To validate ICS security […]

Read more →
Cybersecurity Risks for Open Source Code
· ICS Security

Cybersecurity Risks for Open Source Code

The adoption of open source code has increased exponentially over the past decade, with a large percentage of commercial software now containing it. Developers are constantly sharing common features and code functionality across the internet and globe. The speed and demand placed upon application teams is high – business used to run via application releases a handful […]

Read more →
Cybersecurity Tips to Avoid Ransomware Attacks
· ICS Security

Cybersecurity Tips to Avoid Ransomware Attacks

This latest ransomware attack on Colonial Pipeline is another call to action for all organizations to increase their cybersecurity efforts, harden their networks against attacks, and improve visibility to malicious actors in your network. Ransomware attacks have gone through many iterations and we’re now seeing phase 4 of these types of attacks. The majority of […]

Read more →
Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity
· ICS Security

Industry Feedback from Executive Order on Improving the Nation’s Cybersecurity

The recent signing of the Executive Order on Improving the Nation’s Cybersecurity has spurred much discussion among the industry.  IIoT World asked for input from leading cybersecurity experts and organizations regarding the EO, and we’re sharing the discussion with our community. Here are some excerpts from our exchanges on LinkedIn:   “Having the EO emphasize […]

Read more →