Can blockchain address the Industrial IoT security?
· Cybersecurity

Can blockchain address the Industrial IoT security?

Possible ICS security solution from the sensor to the cloud It seems like nowadays everyone is talking about this new buzzword called “blockchain”. It’s all over the Internet! What is blockchain? What’s it used for? And how can it be helpful with Industrial IoT? In order to understand what blockchain is, let’s first discuss another […]

Read more →
The predictive power of big data analytics in the IIoT era
· Predictive Analytics

The predictive power of big data analytics in the IIoT era

Fatal flaw of predictive IIoT analytics Most predictive analytics suffer from a fatal flaw: they are confined to historical views. Analysts try everything from machine learning (ML) to traditional forecasting to flashy BI dashboards and visualizations in attempts to estimate details about the future of complex business operations: The predictions fail. A wake does not […]

Read more →
15 predictions for ICS cybersecurity in 2018
· Cybersecurity

15 predictions for ICS cybersecurity in 2018

This year was one of the most intense in terms of cybersecurity attacks affecting industrial control systems. For the first time since Stuxnet, a malicious toolset called CrashOverride/Industroyer targeted physical systems. However, the most significant threat to ICS security in 2017 was ransomware attacks. The WannaCry and Petya attacks appear to have changed forever the […]

Read more →
Edge Computing 101: Requirements for IIoT Edge Computing Solutions
· Connected Industry

Edge Computing 101: Requirements for IIoT Edge Computing Solutions

There are many companies out there that promise to deliver “edge computing” for IIoT operations. But what does “edge computing” really mean and what is its underlying value? Why applying edge computing solutions By applying edge computing to streaming data, manufacturers can meet the real-time demands of high-stakes industries and utilities without straining their bottom […]

Read more →
Best Cybersecurity Practices for the IT/OT Environment
· Cybersecurity

Best Cybersecurity Practices for the IT/OT Environment

In the world of IT/OT cybersecurity, there is no silver bullet. What you can do in your organization is to minimize the attack surfaces and threat vectors, and be vigilant and proactive in your defense against adversaries. To that end, we suggest that you implement a multilayered defense-in-depth cybersecurity strategy and stop the cyber threat […]

Read more →
How smart technology is revolutionizing agriculture
· Smart Agriculture

How smart technology is revolutionizing agriculture

The measurement of a civilization can be made in its fields and among its crops. Agricultural technology advancements move nations, and provide a basis for extended growth of every aspect of its existence. Despite the ancient nature of farming, technologies such as 3D mapping, nitrogen fertilizer and genetic modification have pushed the cutting edge of […]

Read more →
Benefits of using wireless industrial IoT sensors
· Connected Industry

Benefits of using wireless industrial IoT sensors

Industrial IoT has developed closely alongside consumer IoT goods and now is here to change the industrial applications as we know. One of the biggest breakthroughs in the last few years for IIoT have been wireless, low power wide area networks (LPWAN) that have fostered the development of wireless industrial sensors and IoT applications overall. […]

Read more →
“To Edge or not the Edge”
· Connected Industry

“To Edge or not the Edge”

The emergence of Edge Computing in the Industrial Internet of Things (IIoT) has become a cost prohibitive, expensive trend. Overall interest in Edge Computing has risen in the IIoT space because of confusion between the exact needs of IIoT vs. Industry 4.0. For simple definitional clarity, Industry 4.0 technology is destined for the industrial factory; […]

Read more →
Key Questions You Should Ask Your Industrial Video Provider
· Connected Industry

Key Questions You Should Ask Your Industrial Video Provider

Frequently, video solutions intended for industrial use are purchased by the organization’s security department. In most organizations, operations and security are different departments.  This often provides budget, control, and integration challenges within the organization. Treating the video system as part of the SCADA system rather than the security system helps to clearly delineate video’s use, […]

Read more →