July 2025 Industrial IoT & ICS Cybersecurity Events
· Connected Industry

July 2025 Industrial IoT & ICS Cybersecurity Events

July 2025 is packed with high-impact events for professionals navigating the rapidly evolving landscapes of Industrial IoT, cybersecurity, and smart manufacturing. From Tokyo to Munich to San Jose, these summits bring together global leaders, engineers, innovators, and decision-makers to explore the latest in AI-powered industrial systems, secure communications, and digital transformation strategies. Whether you’re a […]

Read more →
Innovating at the Edge: Erik Nordmark on IoT, Security, and the Future of Industrial Technology
· Process Manufacturing

Innovating at the Edge: Erik Nordmark on IoT, Security, and the Future of Industrial Technology

Navigating the complexities of legacy systems, security threats, and scalability remains a significant challenge in the fast-evolving world of industrial technology. Erik Nordmark, co-founder of an edge computing company, has spent decades at the forefront of these issues. From his early days working with sensor networks and internet protocols to his current role building scalable, […]

Read more →
An Introductory Guide to Cloud Security for IIoT
· Cybersecurity

An Introductory Guide to Cloud Security for IIoT

The state of industries has come a long way since the Industrial Revolution with new technologies such as smart devices, the internet, and the cloud. The Industrial Internet of Things (IIoT) is a network of industrial components that share and process data to gain insights. But as IIoT involves sensitive data and life-critical operations, this […]

Read more →
Navigating Regulatory and Technological Shifts in IIoT Security
· Cybersecurity

Navigating Regulatory and Technological Shifts in IIoT Security

The Industrial Internet of Things (IIoT) has revolutionized manufacturing, offering unprecedented connectivity and efficiency. However, this connectivity brings significant cybersecurity challenges. As manufacturers integrate IIoT into their operations, understanding and navigating regulatory and technological shifts becomes essential for maintaining robust security.The Impact of Global Regulations on IIoT SecurityGlobal regulations play a pivotal role in shaping […]

Read more →
[Case study] A Global Manufacturer’s Journey to Automating PKI with Keyfactor
· Connected Industry

[Case study] A Global Manufacturer’s Journey to Automating PKI with Keyfactor

In a world where cybersecurity is not just a necessity but a critical competitive edge, a global manufacturer leading in sensing, electrical protection, control, and power management solutions faced significant challenges in securing its operations. Managing over 72,000 certificates, including 18,000 active ones, across many IoT devices presented a complex problem. This scenario demanded a […]

Read more →
Navigating the Complex Terrain of Supply Chain Security in ICS Environments
· Video

Navigating the Complex Terrain of Supply Chain Security in ICS Environments

In the contemporary digital landscape, the security of supply chains has ascended to the forefront of concerns for industrial control systems (ICS). Cassie Crossley, Vice President for Supply Chain Security at Schneider Electric, sheds light on the comprehensive strategies and initiatives deployed to safeguard the supply chain against cyber threats. With an intricate web of […]

Read more →
Dive into the Future: A 5-Day IoT Security Webinar Series
· Connected Industry

Dive into the Future: A 5-Day IoT Security Webinar Series

Embark on a deep exploration of the Internet of Things (IoT) with Keyfactor’s upcoming 5-day webinar series, “IoT Insights Unveiled: A 5-Part Webinar Series”. The series will focus on IoT Security.Event Details:• Series Title: IoT Insights Unveiled: A 5-Part Webinar Series • Dates: February 5-9, 2024 • Time: 10:00 AM ET • Organizer: KeyfactorFeatured Sessions:1. […]

Read more →
[E-book] Eight Steps to IoT Security: A practical guide to implementing security in IoT devices
· Connected Industry

[E-book] Eight Steps to IoT Security: A practical guide to implementing security in IoT devices

Implementing cybersecurity for IoT devices doesn’t have to be complex. Complexity occurs when product teams treat security as an afterthought in the global IoT project, rather than considering and implementing security at the design stage. Sometimes this is due to a lack of expertise by the product team. Other times a new project must leverage […]

Read more →
BMS Security: 3 Tips for OEMs to Better Protect Their Devices
· Cybersecurity

BMS Security: 3 Tips for OEMs to Better Protect Their Devices

Connected Building Management Systems (BMS) definitely make a difference in terms of increasing operational performance, reducing energy and maintenance costs, and improving building health and safety. None of this could happen if it weren’t for Original Equipment Manufacturers (OEMs) like you who supply building owners and facilities managers with IIoT and Cloud-enabled devices that, together […]

Read more →
[IoT Security White paper] Five Guiding Tenets for IoT Security
· Connected Industry

[IoT Security White paper] Five Guiding Tenets for IoT Security

The rise of the Internet of Things (IoT) is like the advent of the Internet all over again. From the perspective of new business models and process transformation, IoT applications are perhaps even greater than what the Information Superhighway brought us a few decades ago. The universal connectivity of devices and ongoing innovation borne from […]

Read more →
How Product and Manufacturing Leaders Rate IoT Device Security in 2022
· Connected Industry

How Product and Manufacturing Leaders Rate IoT Device Security in 2022

Plus a look at what they’re doing to strengthen security going forward The Internet of Things (IoT) hasn’t just arrived – it’s exploding before our eyes. Every “thing” is now connected: think watches, doorbells, medical devices, vehicles, the list goes on. And all of these things are deeply ingrained in our everyday lives. So much […]

Read more →
3 Protocol Trends You Should Know About
· Cybersecurity

3 Protocol Trends You Should Know About

Since the introduction of Modbus in the late 1970s, network protocols for critical infrastructure and industrial automation have continually evolved. It’s only been in the past few years, though, that we’ve seen things go from slow evolution to seismic shift. As the IIoT (Industrial Internet of Things) continues to explode – the IIoT market is […]

Read more →