Five cybersecurity experts about CrashOverride malware: main dangers and lessons for IIoT
· Cybersecurity

Five cybersecurity experts about CrashOverride malware: main dangers and lessons for IIoT

The National Cybersecurity and Communications Integration Center (NCCIC) is aware of public reports from ESET and Dragos outlining a new, highly capable Industrial Controls Systems (ICS) attack platform that was reportedly used in 2016 against critical infrastructure in Ukraine. As reported by ESET and Dragos, the CrashOverride malware is an extensible platform that could be […]

Read more →
Industrial IoT Law – IIoT Legal and Regulatory Aspects
· Connected Industry

Industrial IoT Law – IIoT Legal and Regulatory Aspects

As we are moving towards autonomous world – the lines have started blurring between machines and human. As more and more machines are taking control of the real-life situations, the topic related to Industrial IoT law, legal and regulatory aspects in the new initiative rollout is becoming very significant day by day. Industrial IoT is […]

Read more →
CEO Insights: the best way to prevent an ICS/SCADA cyber incident
· CEO Insights

CEO Insights: the best way to prevent an ICS/SCADA cyber incident

As part of the CEO Insights Series, IIoT World’s Managing Editor, Lucian Fogoros, interviews the CEO of Waterfall Security Solutions, Lior Frenkel, about ICS security, IT/OT divide and the solutions to prevent an ICS cyber incident. Lucian Fogoros: What is Waterfall Security’s focus within the Industrial IoT? Lior Frenkel: Since 2007, Waterfall Security has been protecting […]

Read more →
Is there a Human Machine Interface for Predictive Maintenance?
· Connected Industry

Is there a Human Machine Interface for Predictive Maintenance?

Today, companies in many heavy industries such as manufacturing, power generation, oil & gas, renewables, metals, chemicals, and mining are applying predictive maintenance (PdM) techniques to their multi-million dollar global operations to reduce the costs and downtime associated with unexpected critical machine failure and damage.In many ways, a doctor-patient relationship is a good analogy to […]

Read more →
The Industrial Internet of Things & Network Security Standards
· Cybersecurity

The Industrial Internet of Things & Network Security Standards

Just about everything is connected: from cell phones and wearable devices to cars, refrigerators and industrial equipment. IT experts have long recognized this global connectivity will only continue to skyrocket. Connectivity adds convenience to our jobs. It is almost expected that employees will use BYOD devices such as laptops, smart phones and tablets to communicate. […]

Read more →
Five main reasons why IIoT Projects fail at the Proof of Concept stage
· Connected Industry

Five main reasons why IIoT Projects fail at the Proof of Concept stage

Nearly 70% of IoT and implicitly IIoT initiatives fail at the Proof of Concept (PoC) stage, according to a recent study by Cisco. Though the number looks high, it resembles the past records of other new initiatives such as cloud computing, agile initiatives or likewise. What are the main reasons for such high failure rate of […]

Read more →
CEO Insights: Four major challenges in protecting ICS from cyber attacks
· CEO Insights

CEO Insights: Four major challenges in protecting ICS from cyber attacks

As part of the CEO Insights Series, IIoT World’s Managing Editor, Lucian Fogoros, interviews Indegy’s CEO, Barak Perelman, about the major challenges in protecting ICS from cyber attacks and the best defenses against cyber threats in Industrial Internet of Things era. Lucian Fogoros: What are the major challenges in protecting ICS from cyber attacks? Barak […]

Read more →
Values and Challenges of SCADA Systems for Outside-the-Fence Applications
· Smart Manufacturing

Values and Challenges of SCADA Systems for Outside-the-Fence Applications

Implementing supervisory control and data acquisition (SCADA) systems for outside-the-fence applications is gaining popularity among industries where assets are sprawled across a large geographic area. SCADA systems, however, were initially developed and optimized for inside-the-fence applications. In such setups, machinery and infrastructure are typically co-located or within short reach of a field office or central […]

Read more →
CEO Insights with Dr. Ulrich Lang: Customers are not aware yet of ICS security risks that IIoT Apps bring
· CEO Insights

CEO Insights with Dr. Ulrich Lang: Customers are not aware yet of ICS security risks that IIoT Apps bring

IIoT applications bring many ICS security risks to critical industries like manufacturing, energy, oil and gas, chemical, transportation. As a part of CEO Insights, Dr. Ulrich Lang, Co-founder and CEO of ObjectSecurity, explains what are the most critical cybersecurity risks, how to address them, and also what are the challenges and opportunities in this market. […]

Read more →
WEF Whitepaper: Five disruptive technologies shaping production
· Connected Industry

WEF Whitepaper: Five disruptive technologies shaping production

Technologies of the Fourth Industrial Revolution are blurring the lines between the physical, digital and biological spheres of global production systems. The current pace of technological development is exerting profound changes on the way people live and work. Production activities, defined as the full chain to “source-make-deliver-consume-reintegrate” products and services, will be altered and extended […]

Read more →