By Frederick Hirsch, Upham Security Third in a series of blogs from the Industry IoT Consortium Trustworthiness Task Group. For a comprehensive look at trustworthiness foundations in IIoT, download our foundational document. Connected systems introduce risks to each other, so a single system cannot be effectively trusted unless the other... Read more →
09/01/2021
Consequences of Inattention to Trustworthiness: An Automotive Example
Posted at 7:20 am in Uncategorized, | Permalink
Tags: CYBER, IIC, IOT, IOTSECURITY, SECURITY, TRUSTWORTHINESS,
08/10/2021
A Look at Trustworthiness & its Key Characteristics in Context
By Bob Martin, MITRE Second in a series of blogs from the Industrial Internet Consortium Trustworthy Task Group. For a comprehensive look at trustworthiness foundations in IIoT, download our foundational document. Definition Trustworthiness The degree of confidence one has that the system performs as expected. Characteristics include safety, security, privacy... Read more →
Posted at 7:28 am in Uncategorized, | Permalink
Tags: CYBER, IIC, IOT, IOTSECURITY, MITRE, SECURITY, TRUSTWORTHINESS,
07/28/2021
Trustworthiness for Cyber-Physical Systems
By Marcellus Buchheit, Co-founder of WIBU-SYSTEMS AG, President and CEO of WIBU-SYSTEMS USA First in a series of blogs from the Industry IoT Consortium Trustworthiness Task Group. For a comprehensive look at trustworthiness foundations in IIoT, download our foundational document. Trustworthiness, and confidence in that trustworthiness, are essential aspects of... Read more →
Posted at 7:35 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Technology, | Permalink
Tags: CYBER, IIC, IOT, IOTSECURITY, MITRE, SECURITY, TRUSTWORTHINESS, WIBU,
09/08/2020
6 STEPS TOWARDS DIGITAL TRANSFORMATION ADOPTION IN INDUSTRY
Disruptive technologies are transforming all industries into digital industries and repositioning them to reap the benefits of Industry 4.0. In the industrial context, digital transformation (DX) is primarily a business objective.The IIC has captured the many challenges and technological hurdles that accompany this journey along with guidance in their recently published white paper, Digital Transformation in Industry.... Read more →
Posted at 6:36 pm in Uncategorized, | Permalink
Tags: DIGITAL TRANSFORMATION, IIC, IOT INDUSTRIAL INTERNET, SECURITY, TRUSTWORTHINESS, WIBU,
12/05/2019
Trustworthiness in Digital Transformation
Trustworthiness in the Internet of Things and Digital Transformation is a concept that has been pioneered by the Industrial Internet Consortium. It’s a really innovative concept in this context, and is destined to make much of today’s debate about simple ‘Security’ seem out of date.... Read more →
Posted at 6:32 am in Adopting the Industrial Internet,Industrial Internet Consortium,Industrial Internet Innovation,Security, | Permalink
Tags: DIGITAL TRANSFORMATION, IIOT, SECURITY, TRUSTWORTHINESS,
11/12/2019
New IIC White Paper Aims to Demystify Edge Computing
Edge computing, fog computing, mist, cloudlets, thing-to-cloud continuum and fog-to-cloud continuum, elasticity, multi-tenancy, data gravity. When it comes to the state of computing infrastructure and operations for the IoT, these are just the tip of the iceberg of terms that have percolated to the front page of today’s tech lexicon. If you’ve ever wondered what it all means, how it’s all put together and what the benefits are, you’ve come to the right place.... Read more →
Posted at 6:35 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology, | Permalink
Tags: EDGE, IIOT, INTEROPERABILITY, IOT, SECURITY,
11/05/2019
IIoT Micro-segmentation
Industrial and IIoT networks almost always represent engineering risks, as well as conventional “business” risks. Engineering risk is risk to physical operations: plants shutting down, threats to employee safety and equipment damage. Micro-segmentation is an effective security strategy to address these physical/engineering risks in OT and IIoT networks.... Read more →
Posted at 6:38 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Technology, | Permalink
Tags: CYBERSECURITY, ENGINEERING, IIOT, MICRO-SEGMENTATION, RISK, SECURITY,
08/08/2019
New IIC Data Protection Best Practices: Securing Complex IIoT Systems by Design, Not Luck
A new IIC white paper seeks to raise awareness that security is more than just a business problem. Security extends to a range of attributes that comprise what the IIC refers to as “IoT Trustworthiness”, which includes the safety of people directly impacted by these new technologies. The inherent complexity to IIoT security necessitates a team approach to tackling data protection. ... Read more →
Posted at 6:37 am in Adopting the Industrial Internet,Applications,CyberSecurity,Industrial Internet Consortium,Industrial Internet Innovation,Security,Updates From the IIC, | Permalink
Tags: DATA, IIOT, IOT, SECURITY, TRUSTWORTHINESS,
11/28/2018
Trustworthiness in Industrial System Design
Trustworthiness in the context of an industrial system is a relatively new term intended to provide a better understanding of the meaning of trust in such a system and how this trust can be approached by the operational user as well as the planner and designer of the system. While industrial systems vary greatly in their purpose and scope, their stakeholders share an important common element, and that is a deep-rooted trust.... Read more →
Posted at 7:08 am in Adopting the Industrial Internet,Industrial Internet Consortium,Industrial Internet Innovation,Security, | Permalink
Tags: IIC, IIOT, IOT, SECURITY, TRUSTWORTHINESS,
10/10/2018
Trustworthiness and the Permeation of Trust in IIoT Systems
In 2016, the Industrial Internet Consortium gained agreement upon an understanding of the term “trustworthiness” and its effect on design and operation of an industrial system. At the core of that understanding was a definition of trustworthiness and the designation of five characteristics that define trustworthiness.... Read more →
Posted at 7:08 am in Adopting the Industrial Internet,CyberSecurity,Industrial Internet Consortium,Security, | Permalink
Tags: IIC, IIOT, IOT, SECURITY, TRUSTWORTHINESS,