A big part of Industry 4.0 requires the successful integration of the supply chain into the manufacturing process. In the ideal vision, a close cooperation, with rapid information sharing, is established between suppliers, the manufacturer and end customers. But this vision demands a major paradigm shift from traditional manufacturing infrastructure.... Read more →
07/10/2019
Industry 4.0: How cybersecurity threats are everyone’s business
Posted at 6:48 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Manufacturing,Security, | Permalink
Tags: CYBERSECURITY, IIOT, INDUSTRY 4.0, IOT, MANUFACTURING,
11/28/2018
Trustworthiness in Industrial System Design
Trustworthiness in the context of an industrial system is a relatively new term intended to provide a better understanding of the meaning of trust in such a system and how this trust can be approached by the operational user as well as the planner and designer of the system. While industrial systems vary greatly in their purpose and scope, their stakeholders share an important common element, and that is a deep-rooted trust.... Read more →
Posted at 7:08 am in Adopting the Industrial Internet,Industrial Internet Consortium,Industrial Internet Innovation,Security, | Permalink
Tags: IIC, IIOT, IOT, SECURITY, TRUSTWORTHINESS,
10/10/2018
Trustworthiness and the Permeation of Trust in IIoT Systems
In 2016, the Industrial Internet Consortium gained agreement upon an understanding of the term “trustworthiness” and its effect on design and operation of an industrial system. At the core of that understanding was a definition of trustworthiness and the designation of five characteristics that define trustworthiness.... Read more →
Posted at 7:08 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Security, | Permalink
Tags: IIC, IIOT, IOT, SECURITY, TRUSTWORTHINESS,
05/01/2018
Securing the Internet of Things: Energy and Utilities
As new technologies and innovative solutions enter the picture, companies are working to modernize existing power infrastructures and deliver secure, reliable and affordable energy to end consumers. One significant driver of this transformation is the Internet of Things (IoT). IoT-connected devices have the potential to not only deliver cost savings to energy and utility enterprises, but also provide more value-added services to consumers.... Read more →
Posted at 7:56 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Industrial Internet Standards,Security, | Permalink
Tags: IOT IOTRUST ENERGY UTILITIES INDUSTRIAL,
04/30/2018
Redesigning Security for Fog Computing with Blockchain
As more connected devices come into use across the industrial IoT (IIoT), traditional cloud computing architectures are no longer sufficient. Current centralized systems simply don’t hold up to the scale and security requirements of so many billions of IoT devices, including the secure storage, availability over intermittent network connections, access control, authentication, and real-time analysis of a near-constant data stream. The traditional approach involves moving data from the edge to a central server for processing, which increases latency and reduces available bandwidth across the network. Most importantly, however, the transfer of massive amounts of data from devices at the edge to a central system greatly increases the chance for a security breach, resulting in lost and compromised information.... Read more →
Posted at 8:04 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Innovation,OpenFog,Security, | Permalink
Tags: BLOCKCHAIN, FOG, IIOT, IOT, OPENFOG, SECURITY,
12/02/2016
Protecting Industrial Internet of Things Endpoints
An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints.The IIC has recently presented an endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document.The key areas of focus include endpoint data protection, physical security, root of trust, endpoint identity, access control, monitoring and analysis, secure configuration and management, and integrity protection. You can download the complete document for free.... Read more →
09/30/2016
The Industrial Internet Security Framework: A security framework built on cooperation
Attacks to industrial sites will not be a local affair in the industrial internet, but an international one. Global cooperation is essential to protect the industrial internet, and developing the Industrial Internet Security Framework (IISF) required intense collaboration from many contributors around the world... Read more →
09/15/2016
The Business Viewpoint of Securing the Industrial Internet
The tone of the many well-meaning discussions about the Industrial Internet of Things (IIoT) varies widely from one viewpoint of unbridled optimism about the seemingly endless possibilities to another filled with apocalyptic doom and gloom about the safety of the planet and everyone on it. Two extreme views perhaps, but there is no denying the fact that security is an issue that needs to be carefully addressed before any of those endless possibilities can become a reality in the industrial internet.... Read more →
11/09/2015
Recap of the Industrial Internet Security Forum
By Evan Birkhead, VP Marketing and Business Development, Bayshore Networks At the first Industrial Internet Security Forum, held Tuesday at IBM headquarters in New York City, attendees were privileged to hear from leading cybersecurity technologists. Here are three take-aways from the event: 1. The best minds in security are turning... Read more →
11/03/2015
IIC Security TweetChat: Thoughts on Protecting Industrial Internet Systems, IIoT
By David Bisson, Associate Editor of "The State of Security" blog, Tripwire The Industrial Internet is currently one of the most exciting prospects for our web-connected world. This phenomenon, as Belden Inc explains, involves combining industrial machines with data-driven analytics to better understand business processes, reduce unplanned downtime, and increase... Read more →