Author: Jakob Premrn
OT networks are rigid and difficult to update. That makes them particularly vulnerable to cyber-attacks. This, however, does not mean that they cannot be made secure. Learn which security mechanisms you have at hand to minimize cyber risks in your ICS environment!
Suzuki Garphyttan is adopting their strategy for “Smart Industry 4.0” towards truly modern manufacturing with IoT – and the focus fell squarely on Conscia DevicePortal in order to keep track of all new devices that need to be connected.
Author: Danijel Grah
Learn more about the key vulnerabilities and cyber-attacks in ICS environments and how to protect your operations with Cisco Cyber Vision.
In the oldest proclaimed nature reserve in Africa, an international team of technology and wildlife experts have come together to disrupt the status quo.
NIL helped the OCP Group, a leading global chemical and mining company, establish a cost-effective and reliable solution based on IoT sensors to improve personnel safety at their industrial sites.
Learn how Cisco Substation Automation solution enables utilities to manage, control, and automate remote grid assets more efficiently by combining business and utility functions, and simplifying grid operations.
Author: Bojan Radulović
Learn how a small municipality in Slovenia embraced IoT and deployed the LORA network, smart sensors and an analytical platform in order to improve water usage utilization and garbage collection.
Author: Matevž Mesojednik
I the previous series, I illustrated a few specific weaknesses of badly reputed networking protocol, namely UPnP. But why not evaluate home router’s security posture from the inside and see how well it performs. See where this lead me.
Author: Marko Tišler
In its conception, a memex is a device, “mechanized so that it may be consulted with exceeding speed and flexibility” that provides “enlarged intimate supplement to one's memory”. Do you recognize this description in any of the new technologies? Do you use it?