Software trustworthiness – what does it mean for developers, owner-operators and decision makers in Industrial Internet of Things (IIoT) systems? The Industrial Internet Consortium (IIC) recently published a white paper, Software Trustworthiness Best Practices, that delved into the complete software lifecycle process, including such practical issues as software updates and end-of-life strategies, as well as among many other issues, considering vulnerabilities in the system environment and the consequences of failure in such environments. The overall objective of the white paper was to take a comprehensive look at all of the elements involved in achieving the ultimate goal of trustworthy software and protection mechanisms that produce predictable and desirable business and operational outcomes in the IIoT.... Read more →
04/09/2020
Software Trustworthiness in the IIoT
Posted at 6:23 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology,Web/Tech, | Permalink
Tags: IIOT, IOT, SOFTWARE, TRUSTWORTHINESS,
01/28/2020
Launching the IIC Community Forum – A new way to connect within the IIoT industry
We are excited to announce the official launch of the IIC Community Forum for you, the IIoT community. We invite you all to be part of this initiative and to spread the word to your colleagues, peers and customers.... Read more →
Posted at 6:24 am in Adopting the Industrial Internet,Applications,Current Affairs,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Industrial Internet Standards,Manufacturing,Points of View,Security,Technology,Updates From the IIC, | Permalink
Tags: COMMUNITY, CONNECT, IIOT, IOT,
01/21/2020
2019 Year in Review for the Industrial Internet Consortium
Since it was founded in March 2014, the Industrial Internet Consortium (IIC) has been tested and proven to bring together organizations and technologies necessary to accelerate the growth of the industrial internet. The organization has become the largest IIoT consortium in the world and proven to be a thought leader repeatedly through identifying, assembling, testing and promoting best practices. 2019 was indubitably one of the most transformative, influential years so far.... Read more →
Posted at 6:26 am in Adopting the Industrial Internet,Applications,CyberSecurity,Events,Industrial Internet Consortium,Industrial Internet Innovation,Industrial Internet Standards,Manufacturing,OpenFog,Security,Technology,Updates From the IIC, | Permalink
Tags: DIGITAL TRANSFORMATION, IIOT, IOT, TEST DRIVES, TESTBEDS,
12/17/2019
What Would Privacy-Preserving Machine Learning Look Like?
Artificial intelligence (AI) and machine learning (ML) have made huge gains over the last few years, thanks to the vast amount of data available and to the gains made in raw hardware processing power. The success of AI and ML also comes with certain risks, however – in particular the risks around privacy of the collected data... Read more →
Posted at 6:27 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Security,Technology, | Permalink
Tags: ARTIFICIAL INTELLIGENCE, CYBERSECURITY, IIOT, MACHINE LEARNING, PRIVACY,
12/05/2019
Trustworthiness in Digital Transformation
Trustworthiness in the Internet of Things and Digital Transformation is a concept that has been pioneered by the Industrial Internet Consortium. It’s a really innovative concept in this context, and is destined to make much of today’s debate about simple ‘Security’ seem out of date.... Read more →
Posted at 6:32 am in Adopting the Industrial Internet,Industrial Internet Consortium,Industrial Internet Innovation,Security, | Permalink
Tags: DIGITAL TRANSFORMATION, IIOT, SECURITY, TRUSTWORTHINESS,
11/12/2019
New IIC White Paper Aims to Demystify Edge Computing
Edge computing, fog computing, mist, cloudlets, thing-to-cloud continuum and fog-to-cloud continuum, elasticity, multi-tenancy, data gravity. When it comes to the state of computing infrastructure and operations for the IoT, these are just the tip of the iceberg of terms that have percolated to the front page of today’s tech lexicon. If you’ve ever wondered what it all means, how it’s all put together and what the benefits are, you’ve come to the right place.... Read more →
Posted at 6:35 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology, | Permalink
Tags: EDGE, IIOT, INTEROPERABILITY, IOT, SECURITY,
11/05/2019
IIoT Micro-segmentation
Industrial and IIoT networks almost always represent engineering risks, as well as conventional “business” risks. Engineering risk is risk to physical operations: plants shutting down, threats to employee safety and equipment damage. Micro-segmentation is an effective security strategy to address these physical/engineering risks in OT and IIoT networks.... Read more →
Posted at 6:38 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology, | Permalink
Tags: CYBERSECURITY, ENGINEERING, IIOT, MICRO-SEGMENTATION, RISK, SECURITY,
08/20/2019
Industrial Cybersecurity in 2019: There’s Still a Long Distance to Maturity
Reading the recent State of Industrial Cybersecurity Report 2019, one may think the situation with ICS cybersecurity has improved since last year: more organizations name OT cybersecurity a top priority, implement or plan to implement measures accordingly and suffer less from incidents or breaches. But let’s look at the report from the Industrial Internet Consortium IoT Security Maturity Model point of view, keeping in mind that maturity is about effectiveness and not the arbitrary use of measures.... Read more →
Posted at 6:37 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Standards,Security, | Permalink
Tags: CYBERSECURITY, ICS, IIOT, IOT, IT/OT,
08/08/2019
New IIC Data Protection Best Practices: Securing Complex IIoT Systems by Design, Not Luck
A new IIC white paper seeks to raise awareness that security is more than just a business problem. Security extends to a range of attributes that comprise what the IIC refers to as “IoT Trustworthiness”, which includes the safety of people directly impacted by these new technologies. The inherent complexity to IIoT security necessitates a team approach to tackling data protection. ... Read more →
Posted at 6:37 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Updates From the IIC, | Permalink
Tags: DATA, IIOT, IOT, SECURITY, TRUSTWORTHINESS,
07/19/2019
Artificial Intelligence in the IIoT is a Matter of Trust
An early definition of artificial intelligence was one of “thinking machines” that could make decisions like humans, and with some people, elicited a fear that these thinking machines could actually replace humans in the manufacturing world. Today’s perception of AI, however, is geared more towards machines that exhibit human reasoning as a “guide to provide better services or create better products rather than trying to achieve a perfect replica of the human mind.”... Read more →
Posted at 6:48 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Manufacturing,Security,Technology, | Permalink
Tags: AI, IIOT, IOT, TRUSTWORTHINESS,