IoT Security: The Visibility of Assets in the Field
· Cybersecurity

IoT Security: The Visibility of Assets in the Field

IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network disruption the devices need to know how to protect themselves on an individual basis. At Litmus we’ve seen three […]

Read more →
Impact to large-scale implementations: Smart factories and smart cities
· Cybersecurity

Impact to large-scale implementations: Smart factories and smart cities

In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities.M2M technology forms the core of IIoT systems for maintaining smart factories and building smart cities. As more of these connected […]

Read more →
The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking
· Cybersecurity

The Cyber Risk to a Critical Part of Our Economy and Supply Chain: Commercial Trucking

12 million trucks, or about 5% of vehicles on U.S. roads, are aggregated into fleets for government or commercial use. About 42% of these are connected with telematics Fleet Management System (FMS) for efficiency and compliance with government Electronic Logging Data (ELD) requirements. Typical FMS data captured includes miles driven, time of day, Global Positioning System […]

Read more →
Finding Security in an IIoT Driven World
· Cybersecurity

Finding Security in an IIoT Driven World

It wasn’t that long ago that IIoT sounded out of reach. Who would have imagined we could control our home’s thermostat or turn on the sprinklers from anywhere in the world? The truth is, while it may seem we are living in a highly connected world, this is just the tip of the iceberg. In […]

Read more →
A new partnership for ICS Cybersecurity and security of Smart Cities
· Cybersecurity

A new partnership for ICS Cybersecurity and security of Smart Cities

The IoT Security Institute (IoTSI) announced this week that it has established a collaborative partnership with MEASC and Quill Security Technology. “This partnership acknowledges the increasing importance of a “time to act” approach to cybersecurity in smart cities and critical infrastructure design, operation and ongoing compliance services. Smart Cities are a must have in a smart digital age. They make […]

Read more →
DDoS Attacks on IoT. Doesn’t remind you of something… ?
· Cybersecurity

DDoS Attacks on IoT. Doesn’t remind you of something… ?

It’s unfortunate that cybercriminals have many different ways of exploiting network vulnerabilities and weak spots in our cyber defenses. Considering that the number of devices we use on a daily basis is growing, more avenues of exploitation will be open to cybercriminals — unless we close those pathways. Among the types of attacks that have […]

Read more →
Vulnerabilities in Smart Alarms Can Let Hackers Hijack Cars
· Cybersecurity

Vulnerabilities in Smart Alarms Can Let Hackers Hijack Cars

Vulnerabilities in third-party car alarms managed via their mobile applications were uncovered by security researchers at Pen Test Partners. The security flaws reportedly affect around 3 million cars that use these “smart” internet-of-things (IoT) devices. Here’s what you need to know about these vulnerabilities. [RELATED NEWS: Vulnerability in Key Fob Can Let Hackers Open Subaru Cars] What are the […]

Read more →
Securing IoT Medical Devices
· Cybersecurity

Securing IoT Medical Devices

With the expansion of the Internet of Things come increased cybersecurity concerns. The technology is finding its way into every industry, elevating connectivity and making our lives easier. However, there are downsides to this, and ever-growing connectivity is becoming more of a problem as cybercriminals seek to exploit it. Perhaps this is most visible in […]

Read more →
Security Threats and Risks in Smart Factories
· Cybersecurity

Security Threats and Risks in Smart Factories

Smart factories are manifestations of how the industrial internet of things (IIoT) is changing traditional manufacturing. Organizations in the manufacturing sector already have a basic understanding of what smart factories are as well as their capabilities and the advantages and challenges of building them. A pivotal change to adapt to technological advances like smart factories requires a huge […]

Read more →
IoT Trustworthiness States
· Connected Industry

IoT Trustworthiness States

Confidence that an IoT system will operate in conformance with requirements results from assurance that several characteristics of the system are compliant with these requirements despite environmental disturbances, human errors, system faults and attacks. These characteristics – security, safety, reliability, resilience and privacy – have been identified by ISO/IEC (JTC SC41), National Institute of Standards […]

Read more →
Pick solutions, not platforms: How to choose an Industrial IoT platform
· Connected Industry

Pick solutions, not platforms: How to choose an Industrial IoT platform

“If it ain’t broke, don’t fix it.” That common phrase once defined manufacturing’s approach to optimization. But today, enterprises are painfully aware that smarter production lines and more efficient processes can save them millions in downtime and lost yield. So, plant managers- people in what traditionally is one of the more conservative roles –  are […]

Read more →