The Industrial Internet of Things (IIoT) promises to transform manufacturing, transportation, power generation, and a host of other industries with greater automation, new services, and more efficient allocation of resources. These advancements depend on data generated by a host of new IIoT devices now being built and deployed. But the potential cannot be realized if the data produced by the devices cannot be trusted, and that requires much stronger security than what is currently being deployed. The data is only as good as the device that generates it.
The Internet of Things (IoT) has become a ubiquitous term to describe the tens of billions of devices that have sensing or actuation capabilities, and are connected to each other via the internet.
Floodgate Defender Mark III provides protection from cyber-attacks for legacy industrial, medical, military, and critical infrastructure equipment
Secure Platform for Embedded Devices Simplifies IoT Solution Design with a Built-In Defense Against Cyber Attack
Feb. 23, 2016 Embedded World Conference, Nuremberg, Germany
Icon Labs, a provider of embedded networking and security technology, has released its Floodgate Modbus Protocol Filtering product.
This extension to its Floodgate Security Framework reportedly adds critical protection capabilities for Industrial IoT and RTOS-based devices.
New cybersecurity announcements highlight the move beyond traditional IT-oriented security toward systems designed specifically for the industrial control environment.
“IoT doorbell gave up Wi-Fi passwords to anybody with a screwdriver” read the headline from the January 27, 2016 posting on Naked Security by Sophos. Many people will look at that and question the reliability of the article, wondering how it’s possible that something as simple as a doorbell could lead to such an invasion of privacy. There’s an assumption of safety that comes with technological devices that creates a sense of false security for most consumers.
Mentor Graphics recently announced a customizable edge-to-cloud IoT solution that simplifies the "get to market" process for IoT device vendors. Mentor clais that the solution will reduce risk, cost, and development cycles.
By now, most engineers know that embedded applications are vulnerable to cyber attack. That knowledge, however, hasn’t necessarily translated into action.
Today's IoT is full of security flaws. We must do better