By Marcellus Buchheit, Co-founder of WIBU-SYSTEMS AG, President and CEO of WIBU-SYSTEMS USA First in a series of blogs from the Industry IoT Consortium Trustworthiness Task Group. For a comprehensive look at trustworthiness foundations in IIoT, download our foundational document. Trustworthiness, and confidence in that trustworthiness, are essential aspects of... Read more →
07/28/2021
Trustworthiness for Cyber-Physical Systems
Posted at 7:35 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Technology, | Permalink
Tags: CYBER, IIC, IOT, IOTSECURITY, MITRE, SECURITY, TRUSTWORTHINESS, WIBU,
12/01/2020
Decentralized Identity for Edge Computing
In an increasingly connected world, managing device and user identities as well as the relationships among various entities faces significant challenges due to the lack of IAM standards for IoT... Read more →
Posted at 6:27 pm in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium, | Permalink
Tags: EDGE COMPUTING, IIC, IIOT, INDUSTRIAL INTERNET CONSORTIUM, IOT,
10/14/2020
How the Pandemic Accelerated Digital Transformation
Organizations can either adopt change willingly and proactively, or forcibly by market demand. Any choice in the matter faced an unlikely dictator this year in the form of a worldwide pandemic. One that some organizations had no choice but to scale in ways they had only previously envisaged, within the context of a long-term strategy.... Read more →
Posted at 6:33 pm in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation, | Permalink
Tags: IIC, IIOT, INDUSTRIAL INTERNET CONSORTIUM, IOT, TEST DRIVE, TESTBED,
04/09/2020
Software Trustworthiness in the IIoT
Software trustworthiness – what does it mean for developers, owner-operators and decision makers in Industrial Internet of Things (IIoT) systems? The Industrial Internet Consortium (IIC) recently published a white paper, Software Trustworthiness Best Practices, that delved into the complete software lifecycle process, including such practical issues as software updates and end-of-life strategies, as well as among many other issues, considering vulnerabilities in the system environment and the consequences of failure in such environments. The overall objective of the white paper was to take a comprehensive look at all of the elements involved in achieving the ultimate goal of trustworthy software and protection mechanisms that produce predictable and desirable business and operational outcomes in the IIoT.... Read more →
Posted at 6:23 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology,Web/Tech, | Permalink
Tags: IIOT, IOT, SOFTWARE, TRUSTWORTHINESS,
01/28/2020
Launching the IIC Community Forum – A new way to connect within the IIoT industry
We are excited to announce the official launch of the IIC Community Forum for you, the IIoT community. We invite you all to be part of this initiative and to spread the word to your colleagues, peers and customers.... Read more →
Posted at 6:24 am in Adopting the Industrial Internet,Applications,Current Affairs,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Industrial Internet Standards,Manufacturing,Points of View,Security,Technology,Updates From the IIC, | Permalink
Tags: COMMUNITY, CONNECT, IIOT, IOT,
01/21/2020
2019 Year in Review for the Industrial Internet Consortium
Since it was founded in March 2014, the Industrial Internet Consortium (IIC) has been tested and proven to bring together organizations and technologies necessary to accelerate the growth of the industrial internet. The organization has become the largest IIoT consortium in the world and proven to be a thought leader repeatedly through identifying, assembling, testing and promoting best practices. 2019 was indubitably one of the most transformative, influential years so far.... Read more →
Posted at 6:26 am in Adopting the Industrial Internet,Applications,CyberSecurity,Events,Industrial Internet Consortium,Industrial Internet Innovation,Industrial Internet Standards,Manufacturing,OpenFog,Security,Technology,Updates From the IIC, | Permalink
Tags: DIGITAL TRANSFORMATION, IIOT, IOT, TEST DRIVES, TESTBEDS,
12/17/2019
What Would Privacy-Preserving Machine Learning Look Like?
Artificial intelligence (AI) and machine learning (ML) have made huge gains over the last few years, thanks to the vast amount of data available and to the gains made in raw hardware processing power. The success of AI and ML also comes with certain risks, however – in particular the risks around privacy of the collected data... Read more →
Posted at 6:27 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Security,Technology, | Permalink
Tags: ARTIFICIAL INTELLIGENCE, CYBERSECURITY, IIOT, MACHINE LEARNING, PRIVACY,
11/12/2019
New IIC White Paper Aims to Demystify Edge Computing
Edge computing, fog computing, mist, cloudlets, thing-to-cloud continuum and fog-to-cloud continuum, elasticity, multi-tenancy, data gravity. When it comes to the state of computing infrastructure and operations for the IoT, these are just the tip of the iceberg of terms that have percolated to the front page of today’s tech lexicon. If you’ve ever wondered what it all means, how it’s all put together and what the benefits are, you’ve come to the right place.... Read more →
Posted at 6:35 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology, | Permalink
Tags: EDGE, IIOT, INTEROPERABILITY, IOT, SECURITY,
11/05/2019
IIoT Micro-segmentation
Industrial and IIoT networks almost always represent engineering risks, as well as conventional “business” risks. Engineering risk is risk to physical operations: plants shutting down, threats to employee safety and equipment damage. Micro-segmentation is an effective security strategy to address these physical/engineering risks in OT and IIoT networks.... Read more →
Posted at 6:38 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology, | Permalink
Tags: CYBERSECURITY, ENGINEERING, IIOT, MICRO-SEGMENTATION, RISK, SECURITY,
08/20/2019
Industrial Cybersecurity in 2019: There’s Still a Long Distance to Maturity
Reading the recent State of Industrial Cybersecurity Report 2019, one may think the situation with ICS cybersecurity has improved since last year: more organizations name OT cybersecurity a top priority, implement or plan to implement measures accordingly and suffer less from incidents or breaches. But let’s look at the report from the Industrial Internet Consortium IoT Security Maturity Model point of view, keeping in mind that maturity is about effectiveness and not the arbitrary use of measures.... Read more →
Posted at 6:37 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Standards,Security, | Permalink
Tags: CYBERSECURITY, ICS, IIOT, IOT, IT/OT,