An attack to an Industrial Internet of Things (IIoT) system typically starts with an attack on one or more endpoints.The IIC has recently presented an endpoint protection/security model and policy in its Industrial Internet Security Framework (IISF) document.The key areas of focus include endpoint data protection, physical security, root of trust, endpoint identity, access control, monitoring and analysis, secure configuration and management, and integrity protection. You can download the complete document for free.... Read more →