Saturday, March 30, 2019
To make it clear, any significant progress in computer science and commercial use is based on the vast increase in speed of (parallel) computing, memory capacity and communication capabilities as well as in the availability of those assets to a broad number of experts and individuals. This is true for the Internet, for robotics, gaming, IoT, and any other domain.
Monday, February 25, 2019
Secure and Trust in IoT and IIoT
#Security for hashtag#IIoT: Network access control is essential for process networks in Industrial hashtag#Automation and Power Systems / hashtag#Substation Automation. We see more and more end-points attached to these networks - hashtag#sensors, hashtag#actuators, engineering devices in order to implement relevant use cases and enable new applications. BUT: We cannot trust a device unless we know what it does and how it works. Network access control based on policy-driven identification, authentication, and authorization mechanisms including context is a core requirement and precondition for robust network security in automation and control networks.
#Security for hashtag#IIoT: Network access control is essential for process networks in Industrial hashtag#Automation and Power Systems / hashtag#Substation Automation. We see more and more end-points attached to these networks - hashtag#sensors, hashtag#actuators, engineering devices in order to implement relevant use cases and enable new applications. BUT: We cannot trust a device unless we know what it does and how it works. Network access control based on policy-driven identification, authentication, and authorization mechanisms including context is a core requirement and precondition for robust network security in automation and control networks.
Subscribe to:
Posts (Atom)