Trustworthiness in the Internet of Things and Digital Transformation is a concept that has been pioneered by the Industrial Internet Consortium. It’s a really innovative concept in this context, and is destined to make much of today’s debate about simple ‘Security’ seem out of date.... Read more →
12/05/2019
Trustworthiness in Digital Transformation
Posted at 6:32 am in Adopting the Industrial Internet,Industrial Internet Consortium,Industrial Internet Innovation,Security, | Permalink
Tags: DIGITAL TRANSFORMATION, IIOT, SECURITY, TRUSTWORTHINESS,
11/21/2019
Standards for AI on the Agenda at IoT Solutions World Congress
The IoT Solutions World Congress 2019 held in Barcelona in October attracted over 16,000 attendees and 300 expert speakers who explored the latest Industrial IoT innovations, delving into six themes: connected transport, manufacturing, energy, healthcare, buildings & infrastructure and open industry--as well as two forums: AI & Cognitive Systems and Blockchain.... Read more →
Posted at 6:33 am in Adopting the Industrial Internet,Events,Industrial Internet Consortium,Industrial Internet Innovation,Industrial Internet Standards,Technology, | Permalink
Tags: AI, DIGITAL TRANSFORMATION, IIOT, IOT, IOTSWC,
11/12/2019
New IIC White Paper Aims to Demystify Edge Computing
Edge computing, fog computing, mist, cloudlets, thing-to-cloud continuum and fog-to-cloud continuum, elasticity, multi-tenancy, data gravity. When it comes to the state of computing infrastructure and operations for the IoT, these are just the tip of the iceberg of terms that have percolated to the front page of today’s tech lexicon. If you’ve ever wondered what it all means, how it’s all put together and what the benefits are, you’ve come to the right place.... Read more →
Posted at 6:35 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology, | Permalink
Tags: EDGE, IIOT, INTEROPERABILITY, IOT, SECURITY,
11/05/2019
IIoT Micro-segmentation
Industrial and IIoT networks almost always represent engineering risks, as well as conventional “business” risks. Engineering risk is risk to physical operations: plants shutting down, threats to employee safety and equipment damage. Micro-segmentation is an effective security strategy to address these physical/engineering risks in OT and IIoT networks.... Read more →
Posted at 6:38 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology, | Permalink
Tags: CYBERSECURITY, ENGINEERING, IIOT, MICRO-SEGMENTATION, RISK, SECURITY,
10/11/2019
The Intelligent Edge: Real Benefits from the Continuum Between Cloud and Things
As the IoT expands into every corner of the world, there is no question that intelligent edge architecture is critical to ensure the viability of the enterprise. And not just critical, but unavoidable.... Read more →
Posted at 6:37 am in Adopting the Industrial Internet,Applications,Industrial Internet Consortium,Industrial Internet Innovation,Technology, | Permalink
Tags: CLOUD, EDGE, IIOT, IOT,
09/25/2019
What is IIoT? The Industrial Internet of Things Primer
Five-plus years after the Industrial Internet of Things (IIoT) burst into corporate consciousness – and the Industrial Internet Consortium (IIC) was launched - much has been discussed and written about this powerful new era of connected, intelligent machines and devices. Thanks to the collaborative efforts of IIC members, solid groundwork has been made on recommendations on the IIoT reference architecture, IIoT security, IIoT connectivity framework and more. Still, much of the information on IIoT is scattered across the digital landscape. This blog takes a consolidated look the ‘what,’ ‘why,’ ‘how,’ and ‘where’ of the IIoT.... Read more →
Posted at 6:37 am in Adopting the Industrial Internet,Applications,Industrial Internet Consortium,Industrial Internet Innovation,Technology, | Permalink
Tags: CONNECTIVITY, IIOT, INDUSTRIE 4.0, IOT,
08/20/2019
Industrial Cybersecurity in 2019: There’s Still a Long Distance to Maturity
Reading the recent State of Industrial Cybersecurity Report 2019, one may think the situation with ICS cybersecurity has improved since last year: more organizations name OT cybersecurity a top priority, implement or plan to implement measures accordingly and suffer less from incidents or breaches. But let’s look at the report from the Industrial Internet Consortium IoT Security Maturity Model point of view, keeping in mind that maturity is about effectiveness and not the arbitrary use of measures.... Read more →
Posted at 6:37 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Standards,Security, | Permalink
Tags: CYBERSECURITY, ICS, IIOT, IOT, IT/OT,
08/08/2019
New IIC Data Protection Best Practices: Securing Complex IIoT Systems by Design, Not Luck
A new IIC white paper seeks to raise awareness that security is more than just a business problem. Security extends to a range of attributes that comprise what the IIC refers to as “IoT Trustworthiness”, which includes the safety of people directly impacted by these new technologies. The inherent complexity to IIoT security necessitates a team approach to tackling data protection. ... Read more →
Posted at 6:37 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Updates From the IIC, | Permalink
Tags: DATA, IIOT, IOT, SECURITY, TRUSTWORTHINESS,
07/19/2019
Artificial Intelligence in the IIoT is a Matter of Trust
An early definition of artificial intelligence was one of “thinking machines” that could make decisions like humans, and with some people, elicited a fear that these thinking machines could actually replace humans in the manufacturing world. Today’s perception of AI, however, is geared more towards machines that exhibit human reasoning as a “guide to provide better services or create better products rather than trying to achieve a perfect replica of the human mind.”... Read more →
Posted at 6:48 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Manufacturing,Security,Technology, | Permalink
Tags: AI, IIOT, IOT, TRUSTWORTHINESS,
07/10/2019
Industry 4.0: How cybersecurity threats are everyone’s business
A big part of Industry 4.0 requires the successful integration of the supply chain into the manufacturing process. In the ideal vision, a close cooperation, with rapid information sharing, is established between suppliers, the manufacturer and end customers. But this vision demands a major paradigm shift from traditional manufacturing infrastructure.... Read more →
Posted at 6:48 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Manufacturing,Security, | Permalink
Tags: CYBERSECURITY, IIOT, INDUSTRY 4.0, IOT, MANUFACTURING,