Internet of Things in Manufacturing: Driving Revenue and Improving Operations

| March 1, 2016

article image
The hype dial seems to be turned all the way up on the concept of the Internet of Things (IoT). Many of our clients view this chatter with a bemused cynicism. Sensors,"machine to machine" (M2M) communication, and streaming intelligence have been standard operating practices for some time. One client termed IoT as "the overnight sensation that took 20 years to develop." Companies do recognize, however, that advances in technology — both capabilities and cost — open new avenues of investment to deliver significant value.

Spotlight

Cigniti Technologies

Cigniti Technologies Limited (www.cigniti.com), Global Leaders in Independent Software Testing Services, is headquartered at Hyderabad, India. Cigniti’s team of 2,100+ professionals is spread across US, UK, India, Australia, & Canada. Cigniti is the World’s 1st Independent Software Testing Services Company to be appraised at CMMI-SVC v1.3, Maturity Level 5 & is also ISO 9001:2015 & ISO 27001:2013 certified. Cigniti’s test offerings include Quality Engineering, Advisory & Transformation, Digital Assurance, & Quality Assurance solutions.

OTHER ARTICLES

IoT Security: Inherent Risks Require Robust Solutions

Article | February 25, 2020

IoT technologies offer many remarkable benefits. They can make complicated tasks, such as tracking a fleet of thousands of vehicles, monitoring and adjusting manufacturing processes or automating a smart home or office simpler, easier and more cost-effective than ever before. By inviting IoT devices into our homes, workplaces and public spaces, however, we also expose new attack surfaces. When we assign an IoT system to be responsible for a critical task or trust it to monitor sensitive information in our most private spaces, we want to ensure that the system can be trusted. For this reason, it is vital that security best practices are applied at all stages when developing an IoT solution.

Read More

Securing industrial networks: it’s a journey

Article | February 25, 2020

Trying to secure the industrial network in one go is like boiling the ocean. Better to view it as a journey. At each step in the journey, you’ll make incremental changes to people, process, and technology. Minimal security. This is the current state for most manufacturers. If you’re here, you’ve segmented the industrial network from the IT network. Traffic can’t cross from the IT network to the industrial network without clearing the DMZ. You can block malware from entering the industrial network. You can block malware from leaving the industrial network to infect the enterprise network. But if the industrial network is exposed to malicious software, you don’t have a way to contain it. That means the malware might affect multiple manufacturing cells or production lines — even multiple plants.

Read More

OT/IoT Security Superheroes: Tackling the Remote Employee Challenge

Article | February 25, 2020

Organizations around the world are coping with a variety of challenges related to the COVID-19 outbreak. Many companies are struggling to convert their processes from ‘in-office’ to ‘remotely accessible’. And, they’re scrambling to find new ways to “remote” tasks – with “remote” now becoming a verb. For example, we’ve heard from many customers that adding or expanding remote employee access capabilities is a hot topic. One such customer told us that they went from 9% of their workforce working remotely, to 52%. Wow! That’s not only a substantial change to operations and processes – it also directly impacts the company’s security posture. The challenge facing OT security practitioners is daunting. We absolutely must secure the people and systems responsible for saving mankind from an alien super-virus pandemic. But, while the bad guys are lobbing attacks from afar, the good guys are acting behind the scenes like NPCs (non-player characters). They’re bypassing the security systems we developed through years of hard work, like using Gmail or Zoom, or turning off anti-virus, in the name of getting things done.

Read More

5 Ways to Secure Your IoT Devices—Before They Get Hacked

Article | February 25, 2020

Internet of Things (IoT) devices make our lives more efficient and our day-to-day more convenient. They allow us to monitor our homes from afar, control our lights, thermostats, and locks and beef up the security of our homes—among a host of other things. But because smart devices have become so integrated into our lives, they leave us vulnerable to cybercrime too. In general, IoT devices have little to no built-in security, making them top targets for hackers. And since most IoT devices are interconnected, it puts your whole suite of devices at risk if even one gets hacked. Just as you lock your front door before you go to bed, you’ll want to make sure your IoT devices are secure before you start using them.

Read More

Spotlight

Cigniti Technologies

Cigniti Technologies Limited (www.cigniti.com), Global Leaders in Independent Software Testing Services, is headquartered at Hyderabad, India. Cigniti’s team of 2,100+ professionals is spread across US, UK, India, Australia, & Canada. Cigniti is the World’s 1st Independent Software Testing Services Company to be appraised at CMMI-SVC v1.3, Maturity Level 5 & is also ISO 9001:2015 & ISO 27001:2013 certified. Cigniti’s test offerings include Quality Engineering, Advisory & Transformation, Digital Assurance, & Quality Assurance solutions.

Events