Turning Disruption In to Opportunity with the IIoT

PWC | July 20, 2017

article image
Theory meets practice as the Industrial Internet of Things (IIoT) becomes a reality for the second year in a row, PwC hosted the Digital Revolution Summit, a one-day conference held during the Mobile World Congress in Barcelona. This year’s event included a panel designed to provide an end-to-end perspective on the promise and reality of the Industrial Internet of Things (IIoT). Panelists, including Sierra Wireless President and CEO, Jason Cohenour, came from the technology companies that provide the IIoT’s building blocks, the telecom companies that offer the necessary connectivity, and the manufacturing companies looking to benefit as they put the technology into practice. The virtue of this approach lay in teasing out the implications of the IIoT for each kind of player not just the benefits but the challenges and pain points as well. It added up to an impressively full view of the state-of-the-art Industry 4.0.

Spotlight

CONNIT

Rendre nos villes et nos entreprises plus efficaces, plus sûres et plus écologiques grâce à l'IoT.

OTHER ARTICLES

Microsoft acquires ReFirm Labs to enhance IoT security

Article | June 2, 2021

Modern computing devices can be thought of as a collection of discrete microprocessors each with a dedicated function like high-speed networking, graphics, Disk I/O, AI, and everything in between. The emergence of the intelligent edge has accelerated the number of these cloud-connected devices that contain multiple specialized sub-processors each with its own firmware layer and often a custom operating system. Many vulnerability analysis and endpoint detection and response (EDR) tools find it challenging to monitor and protect devices at the firmware level, leading to an attractive security gap for attackers to exploit. At the same time, we have also seen growth in the number of attacks against firmware where sensitive information like credentials and encryption keys are stored in memory. A recent survey commissioned by Microsoft of 1,000 security decision-makers found that 83 percent had experienced some level of firmware security incident, but only 29 percent are allocating resources to protect that critical layer. And according to March 2021 data from the National Vulnerability Database included in a presentation from the Department of Homeland Security’s Cybersecurity and Infrastructure Agency (CISA) at the 2021 RSA, difficult-to-patch firmware attacks are continuing to rise. Microsoft’s Azure Defender for IoT team (formerly CyberX) recently announced alongside the Department of Homeland Security a series of more than 25 critical severity vulnerabilities in IoT and OT devices

Read More

Zigbee vs. Bluetooth: Choosing the Right Protocol for Your IoT Application

Article | June 2, 2021

Both Zigbee® and Bluetooth® wireless protocols are widely used for local communications in Internet of Things (IoT) applications, and there are some trade-offs to review in choosing the right one for your application. Each protocol has unique strengths that guide which solution to implement when designing a new network. In certain situations, one protocol will be a better fit than the other, though sometimes the right solution is to implement both together to take advantage of their combined strengths, as we will discuss in this article. To better understand these IoT protocol options, let's take a look at the advantages and limitations of Zigbee, followed by the same for three different "flavors" of Bluetooth: Classic, BLE, and BT Mesh. This will help explain the trade-offs and show some use cases for each, so that you can choose the optimal protocol for your IoT application - be it a smart city, industrial IoT, digital signage or other connected technology use case.

Read More

How Retail Security Can Welcome IoT Innovations Without Putting Customers at Risk

Article | June 2, 2021

Retail businesses, from mom-and-pop shops to major department stores, are investing heavily in technology to enhance the in-store experience. With the imminent arrival of mainstream 5G, smarter systems are expected to dominate the retail space as the internet of things (IoT) expands. But as we know from connected device deployments in other sectors, such as financial services and healthcare, the IoT is fraught with security vulnerabilities. For retail security, the risks of deploying IoT devices are no less dire. As organizations rely more on the IoT to enable internet connection at every stage of the retail process, protecting IoT infrastructure is critical. Getting on board with the right mindset can go a long way toward achieving a win-win for retail security.

Read More

5 Ways the Internet of Things is Changing the Game for Education and Learning

Article | June 2, 2021

There’s been so much buzz about the Internet of Things (IoT) in the past couple of years. For today’s youngsters, the day will come when a computer is no longer seen as a separate object or device. With technology very much entwined in the basic fabric of everyday living, our children might feel offended if their obedient room lamp doesn’t immediately acknowledge their presence by switching itself on. Over time, IoT will be a mindset rather than a steady stream of technology. Even though every other device in our homes, workplaces, or surrounding environments will be intelligent enough to connect and talk to each other, people will inevitably focus on the transformational possibilities for our world.

Read More

Spotlight

CONNIT

Rendre nos villes et nos entreprises plus efficaces, plus sûres et plus écologiques grâce à l'IoT.

Events