In the Fall 2018 issue of the Industry IoT Consortium (IIC)’s Journal of Innovation, I published an article on Trustworthiness in Industrial System Design . The article introduced trustworthiness as a meer
Trustworthiness in the context of an industrial system is a relatively new term intended to provide a better understanding of the meaning of trust in such a system and how this trust can be approached meer
The U.S. Congress recently introduced legislation to address the growing concern for security on IoT devices purchased by the U.S. government. Does the proposal go far enough? Let’s take a further loo meer
Artificial Intelligence is a hot commodity in the technology world these days. But what does it mean in the context of the Industrial IoT? An early definition of artificial intelligence was one of “th meer
Software for embedded systems is based more and more on open system platforms, such as Linux Embedded, VxWorks , Windows Embedded, QNX and many others. In addition to powerful core functionality, one meer
In 2016, the Industrial Internet Consortium gained agreement upon an understanding of the term “trustworthiness” and its effect on design and operation of an industrial system. At the core of that und meer
In our daily lives, how frequently have we heard someone say “let’s make sure we are on the same page”, whether it be during a personal interaction or a business communication? Pretty often I would sa meer
Earlier this year, ARC Advisory Group, in conjunction with Kaspersky Labs, conducted a survey on the State of Cybersecurity of Industrial Control Systems (ICS) as well as the priorities, concerns, and meer
“Advancing progress toward a technology environment where all software products are safe and secure by design is a top priority for the U.S. Cybersecurity & Infrastructure Security Agency (CISA), the meer
All is not well within today’s pharmacist community. Several recent reports have documented the growing pressures brought on by increasing workloads with limited resources, time, and staffing. During meer
During the early 2000's, there was much skepticism about the value and viability of virtualization. Today, however, there is no doubt that companies have embraced the efficiencies and expansion capabi meer
The U.S. Federal Trade Commission recently released an in-depth report entitled, The Internet of Things: Privacy & Security in a Connected World , which included a long list of considerations and reco meer
Former U.S. Vice President Dick Cheney acknowledged that he once feared that terrorists could use the electrical device that had been implanted near his heart to kill him and had his doctor disable it meer
Adobe may have raised some eyebrows last year when they announced they were moving their packaged Creative Suite PC software to the cloud, but most industry analysts predicted this day was coming – it meer
Faced with an increasingly complicated network environment, made only more complex by the addition of virtualization, cloud services and bring your own devices (BYOD), many of your customers are also meer
By now, many of you have heard about the "BadUSB" exploit, where two security researchers at Security Research Labs demonstrated how they could perpetrate an attack on USB devices. By reprogramming th meer
The big news for crypto-wonks this week is that an international group of researchers has cracked a portion of RSA encryption. And it's not like they had to throw supercomputers at the problem; it was meer
We’ve been hearing the term " software monetization " bandied about. What does it mean? We define software monetization as the capability to effectively maximize your software revenue by meeting marke meer
In their book, Embedded Systems Security , David and Michael Kleidermacher point out some all-to-real scenarios about the consequences of malicious threats to embedded systems. Consider that for every meer
Hackers are out there. So you can't take for granted--now or ever--that it won't happen to you. Achieving software security is a complex problem; what's amazing to me is how often the bad guys get in meer