Menu

IoT FEATURE NEWS

Uniquely IoT Concerns: Securing the Difficult to Secure

By

The developing IoT industry is creating security concerns that are unique and different than have been faced by the information technology folks before. This is true throughout the IoT ecosystem, but especially in the Industrial IoT (IIoT).

Industrial systems across all industries are connecting devices and components that have historically not been connected. Adding connectivity creates enormous opportunity from telematics and predictive maintenance to enable more intelligent operations, but more connectivity means more exposure to network-based attacks. Industrial systems share common connection requirements of reliability, scalability, and now, security.

In an upcoming webinar, entitled “IoT: Securing the Difficult to Secure,” taking place Tuesday, October 30, 2018 at 1pm ET/10am PT, the host will ask attendees to answer several questions for themselves: How are your software components connected? Do you connectivity protocols meet your reliability, scalability, and security requirements?

Click here to Register now.  

This presentation takes an in-depth look at Industrial Internet of Things (IIoT) applications using the Data Distribution Service (DDS) standardized connectivity protocol from the Object Management Group (OMG), with a focus on secure data communications. DDS is a proven, mature protocol, with over 10 years of implementation history across military, industrial, medical, power, automotive, and IIoT industries. The DDS Security specification includes state-of-the art technologies for end-to-end secure data communications.

What attendees will learn:

  • Methods for securing connected devices
  • Benefits and Risks associated with connected systems
  • Benefits of using standardized middleware to connect systems
  • Features of the Data Distribution Service DDS standards

Who should attend:

  • Solutions Architects developing connected industrial devices and systems
  • Software and Systems Engineers building sophisticated distributed systems
  • Device manufacturers concerned with keeping connected devices secure

PRESENTER:

Nina Tucker
co-founder and VP of Technology Twin Oaks Computing

MODERATOR:

Ken Briodagh
Editorial Director, IoT Evolution World

Register now.


Ken Briodagh is a writer and editor with more than a decade of experience under his belt. He is in love with technology and if he had his druthers would beta test everything from shoe phones to flying cars.

Edited by Ken Briodagh

Editorial Director

SHARE THIS ARTICLE
Related Articles

CEVA Opens New Research and Development Center in the UK

By: Ken Briodagh    1/17/2019

CEVA recently announced the opening of a new research and development facility in Bristol, United Kingdom.

Read More

JMA Wireless Partner INWIT Deploys XRAN in Dacia Arena

By: Ken Briodagh    1/17/2019

Stadium venue achieves significant network efficiencies with virtualized RAN

Read More

Making a City Smarter Through Digital Transformation: The Smart City Event

By: Ken Briodagh    1/17/2019

Here, we spoke to Mayor Eugene W. Grant, Mayor of City of Seat Pleasant, MD, who will be speaking at the Smart City Event about his city's digital tra…

Read More

IoT Time Podcast S.4 Ep.2 Cloud Constellation

By: Ken Briodagh    1/15/2019

On this episode of IoT Time Podcast, Season 4, Ken Briodagh sits down with Dennis Gatens of Cloud Constellation, to talk about IoT Security through of…

Read More

Neosen Energy and Senet Expand LoRa Networks for Education, Medical and Business Institutions

By: Special Guest    1/14/2019

A recent announcement from Senet and Neosen Energy kicks off the year with examples of IoT, including the use of new technology to address an existing…

Read More