MQTT and CoAP: Security and Privacy Issues in IoT and IIoT Communication Protocols
Machine-to-machine (M2M) communication protocols, which enable machines to “talk” with one another so that commands are communicated and data is transmitted, are indispensable to applications and systems that make use of the internet of things (IoT) and the industrial internet of things (IIoT). Message Queuing
How IIoT Creates Real-Time Visibility for Manufacturing – IIoT webinar and Q&A
Recorded version of "How IIoT Creates Real-Time Visibility for Manufacturing" webinar and Q&A Creating real-time visibility in operations is about delivering the right information at the right time to the right person. In today’s factories, manufacturing visibility is often limited because
Would you like to fly like Pan? Now you can!
To soar like Pan, Peter Pan that is, represents a childhood fantasy that has captivated the minds and desires of countless girls and boys (and I am quite sure a few adults). Whether it was the appeal of Neverland, Captain
Industrial IoT Vision & Investment Guidelines
A connected factory, a robotic arm, and a power drill walk into a bar. The bartender asks them for data. All three start yelling at the same time. The bartender walks out. The next day, his body is found in
[New report] Digital Readiness for Industrial Transformation
We all know something big is happening “out there” in industrial operations around the globe. Companies are going beyond standard practices in Continuous Improvement (CI) as they seek step change improvement. Among them, programs go by a range of names:
IoT Security: The Visibility of Assets in the Field
IoT security is a complex issue, especially in projects involving hundreds of edge devices in the field. Cloud security and edge security are two very different issues. Edge systems are isolated, and if there is a network disruption the devices need
Two sides of IT vs. OT Security and ICS Security Operations
People, Process, & Technology on Two sides of the Same Coin Who should perform the security of the operations technology (OT) and industrial control system (ICS) in any given company? This is a question I commonly get, which is based on
Robert M. Lee, CEO
Robert is a recognized pioneer in the industrial security incident response and threat intelligence community. He gained his start in security as a U.S. Air Force Cyber Warfare Operations Officer tasked to the National Security Agency where he built a
Vernon Turner, Executive Analyst
Vernon Turner, Executive Analyst at Ecosystm as well as Principal and Chief Strategist at Causeway Connections is a globally recognized expert in the traditional ICT market research. More recently, Mr. Turner extended that capability to include emerging technologies and new
IoT is driving the next industrial revolution
IoT is driving the next industrial revolution. But hackers now see the supply chain as an easy target. The challenge: to mitigate the risk and drive more efficient, connected production, but without neglecting to invest in security and training –
Avoiding the ‘watermelon’ effect in the process industry
The major accidents in 2005 at Texas City and Buncefield marked a watershed for the
Impact to large-scale implementations: Smart factories and smart cities
In this article we discuss how insecure deployments and the lack of well-defined security in M2M technology can be abused to turn into unforeseen problems in critical and large-scale environments like smart factories and cities. M2M technology forms the core of