The U.S. technology and manufacturing industries are in serious need of increased rigor for Internet of Things (IoT) device security. Thankfully, the U.S. Senate is starting to pay attention in the form of the recently introduced Internet of Things Cybersecurity Improvement Act. Additionally, there are many industry groups, such as the Industrial Internet Consortium, that are producing robust frameworks for IoT security. The federal government is looking towards these expert groups to contribute to this and other efforts surrounding federal IoT regulations. ... Read more →
08/29/2017
IoT Cybersecurity: Indeed it Must Be Improved
Posted at 8:55 am in Uncategorized, | Permalink
Tags: SECURITY,
08/16/2017
Flying through Fog: Why Fog Computing and Fog Networking is Crucial to Ushering in the Era of Commercial Drones
According to the FAA, last year more than 670,000 drones were registered in the U.S. alone. Drones – also known as unmanned aerial vehicles (UAVs) – are poised to transform key industries by providing cost-effective new services. While drones are really cool, so are all the ground support elements and software algorithms needed to make the operation of a large fleet safe and efficient. Many of these elements require local intelligence. That’s where fog computing and fog networking come in.... Read more →
Posted at 8:55 am in Adopting the Industrial Internet,Applications,Industrial Internet Innovation,OpenFog, | Permalink
Tags: DRONES, FOG, IIOT, IOT, OPENFOG,
08/09/2017
W.I.F.M.? “What’s in it for me (WIFM)?” — Customer Focused Thinking and IIoT Innovation
As vendors and systems integrators, we love to hear when our target buyers are interested. Especially when we think they should be – all the time! However, unless being noticed is the ultimate outcome, “interested” doesn’t pay the bills.With IoT, there are many “interesting” things we can do, but as organizations with finite resources, our intent is to move beyond “interested” and create products our target buyers “want” or maybe “need.”... Read more →
Posted at 8:55 am in Uncategorized, | Permalink
08/01/2017
Taking IIoT Encryption Protections to the Next Level
It seems like every day we hear about damaging and costly cyberattacks resulting from pirated software, theft of digital Intellectual Property, stolen personal, financial and medical data, or malicious tampering of consumer IoT devices and connected industrial machine systems in the IIoT. What’s most alarming about these attacks is that many times hackers were able to exploit a vulnerability in the very protection mechanisms designed to secure them.... Read more →
Posted at 8:55 am in Uncategorized, | Permalink