search.noResults

search.searching

saml.title
dataCollection.invalidEmail
note.createNoteMessage

search.noResults

search.searching

orderForm.title

orderForm.productCode
orderForm.description
orderForm.quantity
orderForm.itemPrice
orderForm.price
orderForm.totalPrice
orderForm.deliveryDetails.billingAddress
orderForm.deliveryDetails.deliveryAddress
orderForm.noItems
FEATURE Smart factories and AI 


Feature sponsored by


Ensuring cyber resilience in the Industrial Internet of Things


[Image: Ricardo Gomez Angel for Unsplash] T


he remarkable growth of the Industrial Internet of Things (IIoT), alongside the increasing reliance of on technologies such


as robots and digital twins for business operations, has created numerous entry points for cybercriminals. Not only are these attacks becoming more frequent, but they are also growing in sophistication. This escalation necessitates countermeasures to safeguard these systems. Hackers can be driven by motives ranging from espionage to sheer malice, and attacks on systems can have severe consequences, which underscores the vital importance of cyber resilience. Guarding against cyber threats can be complex because a single point of entry can be all it takes for hackers to bring down an organisation or disrupt its operations. These vulnerabilities can arise from human error, like employees opening infected emails, or software updates that contain hidden, disruptive code.


Securing systems Whilst large government institutions, healthcare organisations and educational bodies have typically been targets for hackers, businesses of all sizes and across all industries are now increasingly falling victim to cyberattacks.


In September 2023, hackers stole social security numbers and drivers’ licence  loyalty programme customers of Caesars


14 April 2024 | Automation


Entertainment in the US, the casino and hotel giant based in Las Vegas. The attackers accessed computer systems using a socially-engineered attack on an IT support contractor serving the casino. That same month, MGM Resorts in the US also  guests unable to access their rooms. According to IBM, the average cost of a data breach in 2022 was $4.35m. The manufacturing sector alone experienced an increase in breach costs reaching $4.47m – a rise of 5.4% on the previous year.





and reputational damage as a result of cyberattacks that can force them to shut down their plants, recall products and make other drastic measures to minimise the damage caused. These incidents can also expose data, leading to failures in customer orders. To address these challenges, the Trusted Computing Group (TCG) is actively working on resolving vulnerabilities in IIoT systems and helping the manufacturing sector establish true cyber resilience.


Establishing trust


Ensuring legitimacy is vital to prevent system downtime, revenue loss, malfunctioning equipment and safety risks. In response to the evolving threat landscape, the TCG has developed technologies, standards and 


By Thorsten Stremlau, co- chair of the TCG Marketing Work Group


  foundation of trust for devices. 


feature that creates a safe environment for  allows users to store cryptographic keys and other sensitive information whilst attesting the identity of the software,  on a device. Within the industrial sector, it can establish trust in communications between devices and control systems found within a factory, protecting the integrity of both the device and its data.  applications is clear-cut – however, often it may be larger than the device it attaches to. In these circumstances solutions like    that identify a device such as the manufacturer, model and serial numbers can be safely stored in a protected environment, reducing the risk of illicit tampering.


As industries become increasingly shaped by IIoT, cyber resilience becomes crucial. Cyber threats can have damaging consequences for businesses, hence the importance of fortifying our defences. The  devised by the TCG can protect manufacturers, creating a strong line of defense against potentially critical attacks.


automationmagazine.co.uk


Page 1  |  Page 2  |  Page 3  |  Page 4  |  Page 5  |  Page 6  |  Page 7  |  Page 8  |  Page 9  |  Page 10  |  Page 11  |  Page 12  |  Page 13  |  Page 14  |  Page 15  |  Page 16  |  Page 17  |  Page 18  |  Page 19  |  Page 20  |  Page 21  |  Page 22  |  Page 23  |  Page 24  |  Page 25  |  Page 26  |  Page 27  |  Page 28  |  Page 29  |  Page 30  |  Page 31  |  Page 32  |  Page 33  |  Page 34  |  Page 35  |  Page 36  |  Page 37  |  Page 38  |  Page 39  |  Page 40  |  Page 41  |  Page 42