The push for some form of liability for vendors who sell faulty or insecure software has been the subject of debate for many years with little or no clear agreement on its legality or how to enforce it.
Industrie 4.0, a.k.a. the fourth industrial revolution, is representative of the global strategic initiative to revolutionize industry by integrating digital automation, interoperability and advanced data exchange into manufacturing technologies.
The tone of the many well-meaning discussions about the Industrial Internet of Things (IIoT) varies widely from one viewpoint of unbridled optimism about the seemingly endless possibilities to another filled with apocalyptic doom and gloom about the safety of the planet and everyone on it.
More than 81% of organizations believe successful adoption of the Industrial Internet of Things (IIoT) is critical to their future success, yet ironically, only 25% of these organizations have a clear IIoT strategy in place and only 24% of those organizations are happy with its execution.
The Trusted Computing Group (TCG) is a not-for-profit organization formed to develop, define and promote open, vendor-neutral, global industry standards, supportive of a hardware- based root of trusted computing platforms.
When I recently watched a report about Tofaş, with its impressive one-million square meter operation and its leading position in the Fiat-Chrysler world in terms of World Class Manufacturing (WCM), I seriously wondered what else Smart Factories could offer in the near future.
Security and the IoT are terms becoming intrinsically linked in the grand discussion of connected devices and their envisioned applications in virtually every aspect of our ecosystem, whether it be consumer wearables, medical devices, or industrial systems.
The close of a year and the anticipation of what’s to come in the New Year always brings about some interesting reviews of the past 12 months and predictions for the future by industry analysts, company executives and the trade press.
It has been several years since Kevin Ashton introduced the concept of the Internet of Things, based on RFID and sensor technology that enable computers to observe, identify and understand the world—without the limitations of human-entered data.
Aside from the widespread attention and hype surrounding the prolific growth expectations of the Internet of Things (IoT), industry focus has been on potential (IoT) device vulnerabilities and cybersecurity.
A recent report released by the Economist Intelligence Unit entitled Long-term Macroeconomic Forecasts: Key trends to 2050 highlighted some of the emerging economic issues expected to shape global business in the coming decades.
Attackers — in ever greater numbers and with increasing sophistication — see, in the growing promise of our tech-connected world, opportunities to steal or cause major disruption or destruction by exploiting vulnerabilities.
Former U.S. Vice President Dick Cheney acknowledged that he once feared that terrorists could use the electrical device that had been implanted near his heart to kill him and had his doctor disable its wireless function.