While industry sectors are starting to automate their processes to help increase productivity and efficiency and this requires greater connectivity, which also can expose systems to attack.
Two leading methods exist for establishing mobile human-machine interface (HMI) connectivity; one providing more cybersecurity. See table comparison of remote access HMI connections.
In order for a robot to be safe, it should be protected against cyberattacks and possible security breaches and there are several ways this can happen.
The IIC accelerator program is designed to stimulate Industrial Internet of Things (IIoT) adoption to help information technology (IT) and operations technology (OT) users solve real problems they face in their businesses.
New capabilities in mobile-responsive design make human-machine interfaces (HMIs) and supervisory control and data acquisition (SCADA) applications more valuable on the plant floor.
The National Institute of Standards and Technology (NIST) has published a report to help organizations better understand and manage the cybersecurity and privacy risks associated with IoT devices throughout the devices’ lifecycles.
Articles about model-following control, industrial controller cybersecurity, machine learning, improving engineer retention, and IIoT platforms were Control Engineering’s five most clicked articles from September 2-8. Miss something? You can catch up here.
The Industrial Internet Consortium (IIC) has developed a white paper designed to bolster best practices related to the Industrial Internet of Things (IIoT) and data security.
Protecting industrial automation systems is easier when controllers offer built-in cybersecurity features.
Cybersecurity researchers at Georgia Tech and Ohio State have discovered vulnerabilities in the backend systems that feed content and advertising to smartphone applications through a network of cloud-based servers that most users probably don’t even know exists.