Five Guiding Principles for Industrial IoT Security
· Connected Industry

Five Guiding Principles for Industrial IoT Security

The rise of the Internet of Things (IoT) is like the advent of the Internet all over again. From the perspec- tive of new business models and process transformation, IoT applications are perhaps even greater than what the Information Superhighway brought us a few decades ago. The universal connectivity of devices and ongoing innovation borne […]

Read more →
Five new ways to monetize the Industrial IoT
· Connected Industry

Five new ways to monetize the Industrial IoT

The Industrial IoT is helping original equipment manufacturers (OEMs) and machine builders gain full transparency of their machines and operations, on a local and global scale. With this capability, these organizations are beginning to implement digital business models that create revenue and deliver new value to customers. The goal of this guide is to help […]

Read more →
Top five largest cyber-attacks in the past year and lessons learnt
· Cybersecurity

Top five largest cyber-attacks in the past year and lessons learnt

Sponsored by RunSafe Security Cyberattacks are becoming far too common, especially after the COVID-19 pandemic, as companies are changing how they’re doing business. Large cyber-attacks on enterprises’ software, in particular, have already affected millions of users. Unfortunately, these will continue to impact more people unless organizations take proper precautions to prevent cybercriminals from exploiting vulnerabilities. […]

Read more →
How IIoT can help manufacturers better prepare for disruptions
· Connected Industry

How IIoT can help manufacturers better prepare for disruptions

Use the industrial IoT to prepare for disruptions Disruptions can be entirely unpredictable, leaving manufacturers and their supply chain at risk – resources may become sparse, teams may be unable to work, or operations may not be safe to resume. Moving forward, organizations need to find ways to establish continuity plans that allow them to […]

Read more →
[E-Book] The State of OT Cyber Security
· Cybersecurity

[E-Book] The State of OT Cyber Security

Many predictions from ten years ago about a rapid rise in cyber-physical attacks did not come true. Certainly, there has been significant financial damage to many firms resulting from powerful intrusions and attacks. However, relative to the IT world, OT has remained relatively unscathed. The real question is what the patterns of historical attacks, emerging […]

Read more →
Minimum Components of an SBOM Published by NTIA
· ICS Security

Minimum Components of an SBOM Published by NTIA

The NTIA (National Telecommunications and Information Administration) recently published the minimum elements for a Software Bill of Materials (more commonly known as SBOM). The document can be viewed HERE. What is an SBOM? – Definition of an SBOM An SBOM (Software Bill of Materials) is a formal record containing the details and supply chain relationships of […]

Read more →
Using Security Monitoring to Address Cybersecurity Threats
· ICS Security

Using Security Monitoring to Address Cybersecurity Threats

Joe Saunders, CEO of RunSafe Security, recently hosted a panel discussion on Monitoring Open Source Software in SAAS Infrastructure. His panel included business leaders in the software, technology, and security sectors: Jonathan B Fishbeck, Founder and CEO of EstateSpace, LLC, a Managed Security Services Provider (MSSP) that helps people reduce risk, retain property assets, and protect […]

Read more →
MQTT and Sparkplug: Delivering Plug-and-Play Interoperability for IIoT
· Smart Manufacturing

MQTT and Sparkplug: Delivering Plug-and-Play Interoperability for IIoT

The manufacturing industry is rapidly changing as leading companies invest in new technologies to modernize their manufacturing infrastructures, improve overall efficiencies, and develop more flexible manufacturing processes. The introduction of IIoT technologies, combined with machine learning, artificial intelligence, and cloud computing, create significant opportunities for all manufacturing companies. Overview of MQTT A key protocol in […]

Read more →
Plant Optimization with Artificial Intelligence (AI enabled Plant Optimization)
· Energy

Plant Optimization with Artificial Intelligence (AI enabled Plant Optimization)

Operating waste-to-energy power plants have a lot of day-to-day challenges. Volatile combustion, unstable steam, staff issues, and CO-peaks are common problems. In addition, there are problems that are unique to a single power plant. Often, these problems persist even with fire control systems. Artificial Intelligence in Power Plant Operations (AI enabled Plant Optimization) Uniper has […]

Read more →
Cybersecurity for Cloud Migration
· ICS Security

Cybersecurity for Cloud Migration

In an interview with Merritt Baer (AWS Office of the CISO), Aaron Ansari VP, Cloud Security at Trend Micro discusses how fundamental information security is to business functions in today’s world. Cybersecurity is Job Zero It’s everyone’s job to ensure they are working to help secure the organization – from the frontline workers to the […]

Read more →
Smart Manufacturing: Performing a Manufacturing Analysis
· Smart Manufacturing

Smart Manufacturing: Performing a Manufacturing Analysis

Manufacturing managers maximize the tools they have at their disposal by understanding their shop’s capacity. What is Manufacturing Analytics? Manufacturing analysis is critical for companies to drive efficient production and capture the highest profitability by better use of space, materials, labor, and optimized equipment performance. A capacity analysis can be an excellent solution for auditing […]

Read more →