Much has been written lately about IIoT endpoints and their many potential security vulnerabilities. As defined by the Industrial Internet Consortium (IIC), endpoints are devices that employ both computation and communications resources and expose functional capabilities. A thorough understanding of these vulnerabilities in relation to the IIoT system is crucial in addressing the architectural considerations required to protect endpoints.... Read more →