MQTT Principals to Mitigate IoT Cyberattack
· Cybersecurity

MQTT Principals to Mitigate IoT Cyberattack

In September 2016, the Mirai malware cyberattack shook the IoT world with a DDoS attack model that infected over 600,000 IoT devices. Such attacks on network-attached devices and IoT devices continue to increase exponentially. With the IDC predicting that there will be 41.6 billion connected IoT devices, generating 79.4 zettabytes (ZB) of data by 2025, the […]

Read more →
Cybersecurity Nightmare = Ransomware + Software Supply Chain Attack
· ICS Security

Cybersecurity Nightmare = Ransomware + Software Supply Chain Attack

Recently, the Russia-based hacking group REvil, attacked the Florida-based software company Kaseya Ltd. If you’re not familiar with Kaseya, they provide network and security management services for small to medium-sized businesses (SMBs), not unlike what SolarWinds offers for large businesses. So this is yet another attack taking advantage of poor software security at companies that […]

Read more →
IoT Platform Requirements to Consider
· Connected Industry

IoT Platform Requirements to Consider

When organizations are contemplating bringing a new IoT product to market, the questions typically asked are: “Do we build our own platform and then develop our IoT product? Or, do we develop our IoT product on a platform that already exists?” Considerations for Building an IoT Platform Here are some common requirements to consider when developing an […]

Read more →
[New report] The State of OT Security and the Cyber Supply Chain
· Cybersecurity

[New report] The State of OT Security and the Cyber Supply Chain

In March 2021, the Enterprise Strategy Group completed a research survey of 150 senior information technology (IT), cybersecurity, and operational technology (OT) professionals directly knowledgeable about their organization’s OT security practices. Organizations represented were from verticals in the retail supply chain, from manufacturers, to transportation (and AR in transportation) and logistics companies, all the way […]

Read more →
Cybersecurity Tactics to Prevent Jackware Attacks on Embedded Devices
· ICS Security

Cybersecurity Tactics to Prevent Jackware Attacks on Embedded Devices

Ransomware is a serious cybersecurity challenge that is growing at uncontrollable rates. Every 11 seconds, a new organization falls victim to a ransomware attack. And by the end of this year, the cost of ransomware to businesses is expected to surpass $20 billion. In this article we present some cybersecurity tactics to prevent jackware attacks […]

Read more →
Cybersecurity Threats to ICS Endpoints
· ICS Security

Cybersecurity Threats to ICS Endpoints

As the interconnection between IT (information technology) and OT (operational technology) continues to grow, cybersecurity for Industrial Control Systems (ICS) is becoming more important. Trend Micro shares their findings on both old and new threats that hound industrial endpoints in their “2020 Report on Threats Affecting ICS Endpoints.” Cybersecurity and Malware To validate ICS security […]

Read more →
Manufacturing Metrics Identified – A Case Study
· Smart Manufacturing

Manufacturing Metrics Identified – A Case Study

Mayville Engineering Company (MEC) is a leading U.S.-based contract manufacturer that provides a broad range of prototyping and tooling, production fabrication, coating, assembly and aftermarket services, with a total of 20 facilities across seven states. MEC’s mission to create as much value for customers as possible has led to tremendous growth for the organization. Despite […]

Read more →
Increasing Efficiencies with Returnable Asset Tracking
· Connected Industry

Increasing Efficiencies with Returnable Asset Tracking

Boosting profitability, the sustainable way using Returnable Asset Tracking Perhaps the most impactful way to optimize workflow and increase efficiencies in large-scale manufacturing is to ensure that your machines are producing at full capacity and never experience unplanned downtime. Today, modern manufacturing enterprises express their progress towards maximum productivity as Overall Equipment Efficiency (OEE). OEE […]

Read more →
2021 State of Operational Technology and Cybersecurity Report
· Cybersecurity

2021 State of Operational Technology and Cybersecurity Report

The 2021 State of Operational Technology and Cybersecurity Report from Fortinet finds that operational technology (OT) leaders continue to face cybersecurity challenges, some of which were exacerbated by the shift to work from home due to the pandemic. The pandemic also accelerated IT-OT network convergence for most organizations, which correlates to other CEO reports that […]

Read more →
[Report] Uniper Energy & Power Generation Report: Focus on Asia
· Energy

[Report] Uniper Energy & Power Generation Report: Focus on Asia

This energy report from Uniper takes a comprehensive look at Asia’s new energy future, including the key trends driving Asia’s energy transition and the integration challenge. Lastly, digitalization and building a digital business case are covered, along with real use cases to inspire your digital transformation.  Following are a few excerpts, the full report can […]

Read more →
How you can accelerate hyperautomation through the adoption of industrial IoT
· Connected Industry

How you can accelerate hyperautomation through the adoption of industrial IoT

An investment in industrial IoT can power hyperautomationIndustrial organizations have embraced automation to improve operational efficiency and reduce human error. By and large, however, industrial automation is siloed – it is applied to individual aspects of the business, but not used holistically across the organization. The key to extending automation throughout your business is hyperautomation.What […]

Read more →
Three Ways to Help Improve the Nation’s Cybersecurity
· ICS Security

Three Ways to Help Improve the Nation’s Cybersecurity

By now, you’ve heard about Executive Order 14028 on “Improving the Nation’s Cybersecurity” which President Biden signed in May, 2021. It begins by stating, “The United States faces persistent and increasingly sophisticated malicious cyber campaigns that threaten the public sector, the private sector, and ultimately the American people’s security and privacy.  The Federal Government must improve […]

Read more →