Introduction
As medical devices become increasingly connected - sharing data over USB, Ethernet, Bluetooth, or Wi-Fi - device safety and signal integrity are more cri
… View More

Resource Center
Browse Categories
Command & Control for the Modern Military
Sep 20th 2024
In the context of modern militaries, command and control refers to the processes, systems, and structures that enable military leaders to direct and manage their oper
… View More
The Challenges of Deploying AI to the Edge
Jun 17th 2024
Artificial intelligence (AI) is in the midst of rapid, seemingly exponential advancements. However, most of what is seen in the news and read in articles deals with t
… View More
Understanding the IT/OT Relationship
May 2nd 2024
With the increasing number of industrial systems connected to the internet, operational technology (OT) is vulnerable to cyberattacks and stands to benefit from info
… View More
IPMI for Remote Control & Monitoring of Embedded Computers
Posted by Drew Thompson on Nov 15th 2022
Remote device and system management is standard practice for most IT administrators. This management includes monitoring the functionality and status of the system o
… View More
Overheard in Tech Support: Security at Sealevel
Oct 19th 2021
The Difference an “I” Makes: IIoT vs. IoT
Posted by Sara Gates May on Jul 20th 2021
Consumers utilize the Internet of Things (IoT) to automate and simplify everyday tasks while manufacturers use the Industrial Internet of Things (IIoT) to increase o
… View More
Dual – or Greater – Ethernet Ports for Efficiency & Security
Posted by Katherine Elrod on Mar 9th 2021
Consumer computers are often built with at least two Ethernet ports, and industrial computers may contain four or more. Multiple Ethernet ports allow for improve
… View More
IT/OT Convergence: Benefits & Adoption
Posted by Heidi Huff on Mar 4th 2021
Traditionally, Information Technology (IT) and Operational Technology (OT) have been separate operations with unique personnel teams and goals. However, with the inc
… View More
The Convergence of OT & IT Cybersecurity
Posted by Heidi Huff on Feb 25th 2021
Until recent decades, Operational Technology (OT), which involves the monitoring and controlling of physical machinery and equipment, was manually managed by human w
… View More
More, Faster, Safer: The Promise of Wi-Fi 6
Posted by Heidi Huff on Feb 19th 2021
Wi-Fi 6 (or 802.11ax) is the latest generation of Wi-Fi, although Wi-Fi 7 is hot on its heels. Wi-Fi 6 offers faster speeds, increased throughput, multiple device su
… View More
Securing Modbus Communications: Modbus TLS and Beyond
Posted by Heidi Huff on Feb 13th 2021
Modbus is a communications protocol developed in 1979 by Modicon to transmit messages between industrial control and monitoring devices. Modbus is a freely available
… View More
Can Blockchain Combat Increasing Cyberattacks?
Posted by Heidi Huff on Feb 5th 2021
Blockchain has many applications beyond bitcoin. With the recent rise in cyberattacks, eyes have turned to blockchain as a possible cybersecurity solution.What is Bl
… View More
Securing IoT Part V: Artificial Intelligence
Posted by Heidi Huff on Jan 28th 2021
Artificial intelligence is a powerful data analytics tool that unfortunately aids cybercriminals as well as cybersecurity personnel.AI in CyberattacksAI assists cybe
… View More
Securing IoT Part IV: Humans
Posted by Heidi Huff on Jan 26th 2021
Human error is the greatest security risk to IoT, often due to oversight or a lack of knowledge. The shift to remote working due to COVID-19 has left many companies
… View More
Endpoint Security Platforms: EPP and EDR
Posted by Heidi Huff on Jan 22nd 2021
An endpoint is any computing device attached to an Internet-connected network, like computers, mobile devices, printers, routers or sensors. Over 70% of IT securit
… View More
Securing IoT Part III: The Cloud
Posted by Heidi Huff on Jan 19th 2021
While cloud service providers are responsible for infrastructure security, it is the responsibility of individual companies to ensure data protection for stored info
… View More
Securing IoT Part II: Security by Design for Devices
Posted by Heidi Huff on Jan 15th 2021
Security by design for IoT devices means envisioning security vulnerabilities at the concept stage of IoT device manufacturing. This allows for the strategic impleme
… View More