Exosite Blog

Announcements, updates, news, and more.

Protecting the People: Securing Identities Within IoT Systems

Protecting the People: Securing Identities Within IoT Systems

August 3, 2017 1 min read
Security by Design: Architecture Considerations for Protection

Security by Design: Architecture Considerations for Protection

July 25, 2017 1 min read
Getting Ahead of the Curve: Developing Proactive Responses to Security Threats

Getting Ahead of the Curve: Developing Proactive Responses to Security Threats

July 20, 2017 2 min read
IoT Security in Layers: Defense in Depth

IoT Security in Layers: Defense in Depth

July 11, 2017 2 min read
The 3 Core Technology Concepts of IoT Security You Need to Know

The 3 Core Technology Concepts of IoT Security You Need to Know

July 6, 2017 3 min read
Not-so Doom & Gloom: Best Practices to Build a Pragmatic Security Strategy for IIoT

Not-so Doom & Gloom: Best Practices to Build a Pragmatic Security Strategy for IIoT

June 27, 2017 1 min read
Inside Exosite Podcast Kicks off with Scary Secure

Inside Exosite Podcast Kicks off with Scary Secure

June 21, 2017 1 min read
The Digital Twin and the Power of IoT

The Digital Twin and the Power of IoT

June 20, 2017 1 min read
Asset Reporting Frequency: Sampling, Monitoring, and Real-Time

Asset Reporting Frequency: Sampling, Monitoring, and Real-Time

June 13, 2017 2 min read
The 3 Types of Digital Twin Maturity Models

The 3 Types of Digital Twin Maturity Models

June 6, 2017 1 min read
4 Best Practices for Modeling a Digital Twin

4 Best Practices for Modeling a Digital Twin

May 30, 2017 3 min read
Modeling the Digital Twin

Modeling the Digital Twin

May 23, 2017 1 min read
The Digital Twin & Why It Comes in Handy

The Digital Twin & Why It Comes in Handy

May 16, 2017 2 min read
Digital Siblings: The IoT Asset

Digital Siblings: The IoT Asset

May 9, 2017 1 min read
Get Serious About IoT with Our Security Webinar

Get Serious About IoT with Our Security Webinar

May 2, 2017 1 min read

Exosite Blog

News, Articles, Thoughts, Product Information

August 3, 2017

Taking steps to secure the identities of system users is a critical step in IoT security. Implementing a properly managed two-factor authentication system requiring a U2F key, or other technology, can create a solid technical barrier in front of would-be hackers looking to control a device or gain access to data through phishing and other social engineering scams. Passwords and authentication can seem abstract to those unfamiliar with technology, but the concept of a U2F key compares closely to the idea of house and car keys in protecting your most important assets.

July 25, 2017

Proactive preparation works well, but when considering IoT security there are several methods that can be used in the design of a system to prevent and deter hacking events.

July 20, 2017

Layering on the security can never be a bad thing when it comes to developing your IoT ecosystem, especially since it helps deters more hackers and keeps your name out of the news headlines.

July 11, 2017

When it comes to developing a practical IoT security strategy, you really can’t get enough of the basics. That’s why your security strategy should involve layering proven security technologies, which creates a depth that yields better results and deters more hackers.

July 6, 2017

The first step in developing a comprehensive IoT security strategy is understanding the core technology concepts in the realm of security—data, control, and hardware. Developing an understanding of these concepts can help organizations learn how to better prevent attacks, mitigate impacts, and recover from attacks on IoT systems. We’ll explain each of these concepts in depth and provide considerations when contemplating security for each.

June 27, 2017

Technology has always been a step ahead of the culture that develops it. Cars existed long before roads, safety standards, and laws governing driving came into being. Similarly, IoT security continues to make technological improvements in leaps and bounds, while the culture critical to successful (and secure) usage lags behind.

June 21, 2017

Podcasts have been getting more popular, so we’re hopping on the bandwagon! Our first episode, Scary Secure, is an interview with Rob Viren, the author of our latest white paper Best Practices to Build a Pragmatic Security Strategy for Industrial IoT. We discuss the elements of security that organizations often overlook and how they can impact people as well as products. Rob covers the basics of IoT security, as well as his own experience with security in the nuclear power industry.

June 20, 2017

Augmented digital twins are the virtual concept that bring true value to IoT by enabling predictive and prescriptive analytics to run on the data from physical assets. Enlightening your devices to respond to upcoming problems or detect failures is essential to provide new insights and defeat downtime for any organization that wants to evolve their market.

June 13, 2017

Once you know about the 3 types of digital twin maturity, you can start to understand how the digital twin reflects and anticipates time-based events from the real world, aka asset reporting frequency. The frequency of state and condition changes are reflected in a digital twin, which determines what decisions can be made using its own data.

June 6, 2017

Maturity models for digital twins can be classified based on the level of information known about an asset and its environment (maturity). The maturity model shows how a digital twin can improve over time as more data (and derivative knowledge) is accumulated.

May 30, 2017

You know what a digital twin is if you’ve seen any of the news articles focusing on this emerging trend in IoT, but how do you develop a successful virtual sibling for your devices? There are four main practices to keep in mind when creating them:

May 23, 2017

Digital twins are all the rage in technology at the moment, especially featured at this year’s Hannover Messe. We’ve covered what a digital twin is and why it’s important, so now we’ll get into how to mold it into what you need it to be.

May 16, 2017

The concept of a digital twin is a popular topic right now, but what is it? Long story short, it keeps the physical and virtual data from a device in one place. As an industrial IoT platform provider, we give birth to these digital siblings all the time.

But why are they useful? There are several ways to get information from a device:

May 9, 2017

As an industrial IoT platform provider, we have the history and know-how to illuminate the path to connected-product deployment. One of the recurrent terms that you’ll encounter when developing an IoT project is “digital twin.” This week, Exosite’s Augmented Digital Twin Blog Series covers the IoT asset itself.

May 2, 2017

IoT security is one of the most popular topics in technology today, with articles coming out on a daily basis. Companies that are breached often end up as news stories for months, which is the exact opposite type of recognition organizations want. Using an evolving IoT security strategy is your best bet for keeping your reputation from being tarnished.

Subscribe to Updates