The OEM IIoT Blind Spot – The Advantage OEMs Often Miss
An IIoT Scotoma If you’re familiar with the term, you know that scotoma is typically referred to as a blind spot. Interesting to note about a scotoma is the idea that if you don’t believe it, you won’t see it. It’s
Vasanth Krishnan, Senior Analyst
Vasanth is a Senior Analyst for Frost & Sullivan’s Global Industrial and Energy practice. Based in Chennai, India, Vasanth’s consulting experience covers a wide range of topics including power generation, transmission and distribution, retail and e-mobility. In addition Vasanth also
[New Report] The Top IIoT Influencers and Brands by Onalytica
Onalytica has been creating Top 100 Influencer lists for the past ten years, connecting brands with influencer communities. The marketplace is now looking to understand who is influential beyond Twitter social amplifiers. Today’s Who’s Who report ranks top IIoT Influencers &
Are We Doing Enough to Secure the US Power Grid?
An Executive Order from US President Donald Trump in May this year overhauled the backbone of the nation’s electricity infrastructure, highlighting gaps and vulnerabilities in the operations of power systems and bulk power equipment, to attacks by hackers, terrorists and
Remote Monitoring Can Help Speed Re-Opening
Everyone is asking some form of the same question: “When will we reopen?” When will schools reopen? When will we eat inside restaurants again? When can I go back to the office safely? Is it ok to go to the dentist? Should I go to
Bryan Owen, PE
Bryan Owen is Security Architect at OSIsoft LLC, makers of the PI System and LF Edge Foundation member fostering IIOT innovation. Bryan is an ambassador for advancing state of the art practices for industrial software security and critical infrastructure protection. He
IIoT World Days Track: ICS Security – Risks, Strategies and Solutions | SPONSORED
Track Sponsored by aDolus This track, originally presented at IIoT World Days on June 30, 2020, covers 4 presentations from industry leaders in ICS Security: Five Blind Men and the Elephant called ICS Supply Chain Security The Road to Industrial IoT
Securing your ICS Supply Chain – How to Thwart Attackers and Satisfy Regulators
Securing ICS software supply chains is becoming increasingly urgent. Attackers, including criminal and state-sponsored groups, are turning their attention to the ICS supply chain as fertile ground for exploitation. And it is not going unnoticed. Not only are critical industries
Rogue Automation: Vulnerable and Malicious Code in Industrial Programming | SPONSORED
In this White Paper, previously unknown design flaws that malicious actors could exploit to hide malicious functionalities in industrial programming for robots and other automated manufacturing machines are revealed. Since these flaws are difficult to fix, enterprises that deploy vulnerable