Top 5 predictions for the IIoT in 2018

Top 5 predictions for the IIoT in 2018

Sastry Malladi, CTO of FogHorn Systems and IoT Business News contributor shares his top five predictions for the IIoT in 2018 including how edge analytics and edge intelligence in the IIoT will accelerate and IIoT standards will be driven by success of customers and patterns of scalable IIoT solutions

Nine tips to protect against ransomware

Nine tips to protect against ransomware

Ashley Wearne, General Manager for ANZ Sophos and CSO contributor offers readers nine helpful tips in this article, ensured to protect users' data from attempted cyber attacks like last year’s WannaCry, NotPetya and Bad Rabbit malware.

Renewable Energy Is Surging. The G.O.P. Tax Bill Could Curtail That

Renewable Energy Is Surging. The G.O.P. Tax Bill Could Curtail That

The New York Times’ Brad Plumer and Jim Tankersley explain how the GOP tax bills moving through Congress could significantly trouble the United States’ renewable energy industry because of a series of provisions scaling back incentives for wind and solar power while bolstering older energy sources like oil and gas production.

Costa Rica breaks own record, runs entirely on renewable energy for 300 days

Costa Rica breaks own record, runs entirely on renewable energy for 300 days

GrindTV’s environmental reporter, Hayley Helms, pens an article describing how Costa Rica has impressively accomplished running on 100% natural power generation from renewable sources for 300 days, breaking its previous record of 299 days — the article also showcases their plan of becoming the world’s first country to achieve a comprehensive national strategy to eliminate single-use plastics by 2021.

Vote-Hacking Fears Help State Officials Get Security Clearances

Vote-Hacking Fears Help State Officials Get Security Clearances

Nafeesa Syeed from Bloomberg explains how the Department of Homeland Security has begun to offer security clearances to state officials to better share classified information as the threat of cyberattacks starts to make its way into next year’s polls.

Protecting oil and gas critical infrastructure against cyber threats

Protecting oil and gas critical infrastructure against cyber threats

This article from Oil Review Africa gives an in depth look on former Bank of England head of security and chief information security officer, Don Randall’s keynote address regarding strategies to combat complex cyber and critical infrastructure security threats.

The Pentagon opened up to hackers – and fixed thousands of bugs

The Pentagon opened up to hackers – and fixed thousands of bugs

Wired’s cybersecurity reporter, Lil Hay Newman, discusses the new Department of Defense project called "Hack the Pentagon”, used in the last 18 months — offered real glimmers of hope to mitigate and stop potential threats from hackers.

NYC's infrastructure woes run deeper than the subway

NYC's infrastructure woes run deeper than the subway

Matt A.V. Chaban from Crain’s New York Business explores the dangers of NY’s neglecting infrastructure and what must be done to update the city’s vast networks of critical infrastructure — though this will most likely come with a high price to the city’s budget.

The Internet of Things: Why it matters

The Internet of Things: Why it matters

 CNBC's reporter Anmar Frangoul takes a look at the internet of things (IoT): what it actually means, how it is changing our homes, and its potential to change the world in the years ahead.

Protecting critical infrastructure from cyber threats

Protecting critical infrastructure from cyber threats

The Daily Nonpareil’s Cybersecurity editor, Keelan T. Stewart, explains the best practices for securing companies’ critical infrastructure, from a national security perspective to what everyday-citizens can to protect their organizations and country.

Everything You Need to Know About IIoT Analytics

Everything You Need to Know About IIoT Analytics

Engineering.com's IoT reporter, Michael Alba, explains the ins and outs on IIoT Analytics, including the latest technical document on the Industrial Internet of Things (IIoT) published by the Internet Consortium (IIC) dubbed the Industrial Internet of Things Analytics Framework (IIAF), a comprehensive document for IIoT system architects and businesses looking to deploy IIoT analytics systems.

Hackers are attacking power companies, stealing critical data

Hackers are attacking power companies, stealing critical data

ZDNet’s cybersecurity reporter, Steve Ranger, discusses some of the target points that attackers are particularly interested in industrial control systems of nuclear power companies and others involved with critical national infrastructure, raising concerns about cyber-espionage and sabotage.

US warns of ongoing attacks on energy firms and critical infrastructure

US warns of ongoing attacks on energy firms and critical infrastructure

Graham Cluley from We Live Security explains the ins and outs of the alert issued by the United States Department of Homeland Security (DHS) and the Federal Bureau of Investigation (FBI), warning of malicious hackers that are actively targeting government departments, and firms working in the energy, nuclear, water, aviation, and critical manufacturing sectors.

Government cuts cost of network infrastructure roll-out

Government cuts cost of network infrastructure roll-out

Networking editor, Alex Scroxton of Computer Weekly, explains how some aspects of the Electronic Communications Code have been updated in order to assist communications providers to deploy new infrastructure more quickly and securely.