Five Guiding Principles for Industrial IoT Security
· Connected Industry

Five Guiding Principles for Industrial IoT Security

The rise of the Internet of Things (IoT) is like the advent of the Internet all over again. From the perspec- tive of new business models and process transformation, IoT applications are perhaps even greater than what the Information Superhighway brought us a few decades ago. The universal connectivity of devices and ongoing innovation borne […]

Read more →
Challenges and Solutions for IIoT Security
· Connected Industry

Challenges and Solutions for IIoT Security

The exponential growth of IIoT is on track with recent predictions.  And as we head toward a world with over 75 billion connected devices by 2025, almost a third will be utilized in industrial applications within manufacturing.  But as the opportunities within this market- particularly in cloud-based, third-party service providers – continue to expand, one […]

Read more →
IoT Security: Tips on How to Make Your Smart Devices Really Secure
· Cybersecurity

IoT Security: Tips on How to Make Your Smart Devices Really Secure

5G is going to change the game for industrial operations. We’ll be able to access more data than before, faster than ever before. For manufacturers, though, one of the primary advantages will come in the form of IoT devices. IoT devices like industrial smart sensors on a 5G network will operate thanks to the improved […]

Read more →
Cybersecurity and Data Concerns in 5G
· Cybersecurity

Cybersecurity and Data Concerns in 5G

For the advantages of 5G to be unlocked, ample preparation and planning are necessary. Looking at the changes 5G networks might bring about on an enterprise and its security is a good place to start. One of the first areas of 5G security concerns is the amount of data collected and how it is interpreted. […]

Read more →
Protecting Smart Buildings from Cyber Attacks
· Cybersecurity

Protecting Smart Buildings from Cyber Attacks

It was an attack on a hospital like no other, reported the news in February 2016. The Hollywood Presbyterian Medical Center had been hacked. Its services were crippled. As emergency patients were diverted to other area hospitals, hospital administrators received an ominous message. Pay a ransom to get your hospital systems back. The hospital ultimately […]

Read more →
In Security, Process is as Reliable as Luck
· Cybersecurity

In Security, Process is as Reliable as Luck

Lately, I have seen two common themes whenever IoT security is brought up; 1) complete acceptance that IoTs pose unique security challenges, and 2) how they have an IT/OT collaboration process to address them. Everybody knows what IT is, but as a reminder, OT, or operationalized technologies, are network/Internet-connected technologies whose primary function is not […]

Read more →
[New IIC white paper] Data Protection Best Practices
· Cybersecurity

[New IIC white paper] Data Protection Best Practices

Protecting sensitive data created, stored and consumed by sensor-driven Industrial Internet of Things (IIoT) technology and applications is one of the foundations of trustworthy IIoT systems. Broadly speaking, data protection measures resist internal and external disturbances and attacks on critical data and IIoT systems at large. These measures are applied over the entire lifecycle of […]

Read more →
Main Challenges of Implementing IoT Security Standards
· Cybersecurity

Main Challenges of Implementing IoT Security Standards

IoT, as we know it today, allows us to make our lives easier — but it is not 100% secure. It can be hard to understand why it’s so difficult to come up with a comprehensive cybersecurity standard for IoT. After all, if we can create this technology, we should be able to keep it […]

Read more →
IoT Security – Game of Trust
· Cybersecurity

IoT Security – Game of Trust

When it comes to prominent technologies that are certain to rule the world and our everyday lives in the future, IoT is one of those that have a profound impact. We use this technology daily, and there are now more connected devices than there are people in the world. However, there’s more to IoT than smart home […]

Read more →
Two key capabilities in the advancement of IoT network security and cyber defense
· Cybersecurity

Two key capabilities in the advancement of IoT network security and cyber defense

Nowadays, cyber-attacks are automated but still under human direction and control, and therefore cyber defenses must also be automated to have any chance of protecting cyber and digital assets from both the automated attacks and the human element behind those attacks. Detecting and thwarting attacks and cleaning up the aftermath is a difficult task. Most […]

Read more →
An overview of the IoT Security Market Report 2017-2022
· Reports

An overview of the IoT Security Market Report 2017-2022

This year was one of the most intense in terms of cybersecurity attacks affecting industrial control systems. For the first time since Stuxnet, a malicious toolset called CrashOverride/Industroyer targeted physical systems. The WannaCry and Petya attacks appear to have changed forever the attitude of industrial enterprises to the problem of protecting essential production systems. IoT […]

Read more →