Golidlocks problem of mobile device security in organizations
Usability vs. Security The “Goldilocks and the three bears” story begins with a girl tasting porridge. The first bowl is too hot, the second is too cold, and the third is “just right.” This article considers mobile device security for organizations. The
Chris Churilo, Director of Product Marketing
Chris Churilo is responsible for Product Marketing at InfluxData. Prior to joining InfluxData, she defined and designed a SaaS monitoring solution at Centroid, and prior to that she was the VP of product management at iPass and was the LOB
Alan Mihalic, Founder & President
A senior Cyber Security Advisor and Risk professional with demonstrated expertise and success in cyber security, ICS security, cyber practice development,risk management, security architecture methodologies and principles supporting strategic enterprise security initiatives. Alan is currently President at the IoT Security
Trevor Rudolph, VP
Trevor H. Rudolph is Vice President for Global Digital Public Policy at Schneider Electric where he directs Schneider’s technology policy and regulatory affairs strategy in North America, Europe, and Asia. Prior to joining Schneider, Rudolph served for five years as
Why smart buildings represent a great business opportunity
Buildings are an integral part of everyday life. With people spending an estimated 90 percent of their lives indoors, the drive to ensure that those buildings are comfortable, safe, secure and provide the functionality that we want is more important than ever. But
Redefining the Business Case for Industrial IoT
Industry 4.0 is rapidly transforming how businesses across the globe are operating in an ever increasingly commercially competitive landscape. According to the Industrial Internet of Things (IIoT) Market Size & Forecast Report, the global market is expected to be valued
Navigating the Connectivity Challenge in an IIoT World
What is the Connectivity Challenge for IIoT, and why will it persist? The challenge is pretty straightforward … and fundamental. Simply stated, computing and connectivity obey different laws. The law of computing is one of exponential power, Moore’s Law. From the dawn
Figuring Out the Municipal Internet of Things
In order to realize the potential of Smart Cities, we’re going to have to figure out the Municipal Internet-of-Things (IoT). We know “smart communities” (a broader term meant to be inclusive of counties, special districts, and states in addition to
How to Actively Secure Your Industrial Environment In the New Era of Distrust
Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention
The Relationship Between AI and Machine Monitoring
While buzzwords such as predictive maintenance, artificial intelligence, digital twin and augmented reality have promised to enable the fabled digital transformation of manufacturing, when it comes to Industry 4.0, most practical applications start and end with machine connectivity. And when
Brad Parsons, CEO and Founder
Brad Parsons is the CEO and Founder of MOVUS, the developer and provider of FitMachine®, a continuous condition monitoring solution supporting industrial businesses across the globe in several industries, including heavy manufacturing, mining and minerals processing, food and beverage manufacturing,
Attack Vectors in the… Trillions?
The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality few are talking about: the