How will ICS cybersecurity standards be impacted by IIoT?
· Cybersecurity

How will ICS cybersecurity standards be impacted by IIoT?

There has been quite a bit of discussion and speculation about the potential impact of the Industrial Internet of Things (IIoT) on the development, deployment, and operation of industrial control systems (ICS). Predictions have ranged from “Nothing changes” to “It will turn everything that we do on its head.” As is usual in situations like […]

Read more →
Securing Industrial IoT: There is no simple answer
· Cybersecurity

Securing Industrial IoT: There is no simple answer

There are lots of terms thrown around these days, such as: Internet of Things (IoT), Industrial Controls Systems (ICS), Operational Technology (OT). What this means is that there are billions of interconnected consumer devices and industrial systems, not running a traditional computer operating system. This number dwarfs the number of traditional computer systems and it […]

Read more →
The right representation of Digital Twins for Data Analytics
· Digital Disruption

The right representation of Digital Twins for Data Analytics

What are digital twins? Digital twins are digital representations of physical objects. In simple cases, sensors for example, the digital representations may be trivial (e.g., current values for temperature, RPMs, etc.). More interesting cases involve complex, and usually expensive, capital assets such as diesel engines, turbines, and heavy duty mining and construction equipment. In these […]

Read more →
Five cybersecurity experts about CrashOverride malware: main dangers and lessons for IIoT
· Cybersecurity

Five cybersecurity experts about CrashOverride malware: main dangers and lessons for IIoT

The National Cybersecurity and Communications Integration Center (NCCIC) is aware of public reports from ESET and Dragos outlining a new, highly capable Industrial Controls Systems (ICS) attack platform that was reportedly used in 2016 against critical infrastructure in Ukraine. As reported by ESET and Dragos, the CrashOverride malware is an extensible platform that could be […]

Read more →
Industrial IoT Law – IIoT Legal and Regulatory Aspects
· Connected Industry

Industrial IoT Law – IIoT Legal and Regulatory Aspects

As we are moving towards autonomous world – the lines have started blurring between machines and human. As more and more machines are taking control of the real-life situations, the topic related to Industrial IoT law, legal and regulatory aspects in the new initiative rollout is becoming very significant day by day. Industrial IoT is […]

Read more →
CEO Insights: the best way to prevent an ICS/SCADA cyber incident
· CEO Insights

CEO Insights: the best way to prevent an ICS/SCADA cyber incident

As part of the CEO Insights Series, IIoT World’s Managing Editor, Lucian Fogoros, interviews the CEO of Waterfall Security Solutions, Lior Frenkel, about ICS security, IT/OT divide and the solutions to prevent an ICS cyber incident. Lucian Fogoros: What is Waterfall Security’s focus within the Industrial IoT? Lior Frenkel: Since 2007, Waterfall Security has been protecting […]

Read more →
Is there a Human Machine Interface for Predictive Maintenance?
· Connected Industry

Is there a Human Machine Interface for Predictive Maintenance?

Today, companies in many heavy industries such as manufacturing, power generation, oil & gas, renewables, metals, chemicals, and mining are applying predictive maintenance (PdM) techniques to their multi-million dollar global operations to reduce the costs and downtime associated with unexpected critical machine failure and damage.In many ways, a doctor-patient relationship is a good analogy to […]

Read more →
The Industrial Internet of Things & Network Security Standards
· Cybersecurity

The Industrial Internet of Things & Network Security Standards

Just about everything is connected: from cell phones and wearable devices to cars, refrigerators and industrial equipment. IT experts have long recognized this global connectivity will only continue to skyrocket. Connectivity adds convenience to our jobs. It is almost expected that employees will use BYOD devices such as laptops, smart phones and tablets to communicate. […]

Read more →
Five main reasons why IIoT Projects fail at the Proof of Concept stage
· Connected Industry

Five main reasons why IIoT Projects fail at the Proof of Concept stage

Nearly 70% of IoT and implicitly IIoT initiatives fail at the Proof of Concept (PoC) stage, according to a recent study by Cisco. Though the number looks high, it resembles the past records of other new initiatives such as cloud computing, agile initiatives or likewise. What are the main reasons for such high failure rate of […]

Read more →
CEO Insights: Four major challenges in protecting ICS from cyber attacks
· CEO Insights

CEO Insights: Four major challenges in protecting ICS from cyber attacks

As part of the CEO Insights Series, IIoT World’s Managing Editor, Lucian Fogoros, interviews Indegy’s CEO, Barak Perelman, about the major challenges in protecting ICS from cyber attacks and the best defenses against cyber threats in Industrial Internet of Things era.Lucian Fogoros: What are the major challenges in protecting ICS from cyber attacks?Barak Perelman: Unlike IT […]

Read more →