Here we explore three topics we believe will be key in 2018: Blockchain (and its use cases for supply chain), trends in Identity Management, and the increasing importance of Corporate Social Responsibility for our supply chains and the world.
Cybersecurity, physical security, supply chain security (e.g. cargo theft, counterfeiting, etc.)
Secondarily, geopolitical security
Seven Principles for Stronger IoT Security
One of ChainLink’s key predictions for 2017 is that IoT security breaches will reach an all-time high this year. Here we discuss why these problems persist and seven principles for creating stronger IoT security.
Blockchain Gets Real
The Depository Trust and Clearing Corporation (DTCC) facilitates post-trade processing for over 98% of all credit derivatives worldwide (over $11 trillion). Last week, they announced (together with IBM) that DTCC is moving their credit derivatives Trade Information Warehouse (TIW) service off their legacy relational database and online transaction processing technologies and onto a distributed ledger, based on blockchain technology. That is a big deal for blockchain.
The Russians Are Coming?
Stealing trade secrets, patent infringements, piracy, counterfeiting and product tampering damage companies, make people ill, and deflate honest competition. And if financial and trade hacks are not enough, we now fear that our IoT devices can be hacked. Most of all, hacking/stealing trade secrets and hijacking product quality challenge the very notion of innovation, capitalism and free trade–the system that has modernized the world since the industrial revolution and catalyzed the information age.
A Framework for Securing the Industrial Internet of Things
The publication of the Industrial Internet Security Framework by the IIC is a vital early step towards creating security in the Industrial IoT. Strong security becomes increasingly crucial as more and more critical infrastructure becomes connected and remotely controllable.
The IoT Security Imperative – Part 3: IoT Platform Security Requirements
IoT platforms, outside of the devices themselves, comprise the bulk of the intellectual property, infrastructure, and complexity in IoT. We examine requirements that are needed to ensure security in these platforms.
The IoT Security Imperative – Part 2: Device Security Requirements
Control over physical devices is what makes IoT different, and more dangerous, than traditional IT software. Here we look at device-level security requirements for makers of IoT-enabled products and services.
The IoT Security Imperative – Part 1: Physical-Cyber Risk Landscape
With the current state of IoT security, we might call it the Internet-of-Vulnerable-Things. It’s all the more alarming because of the types of physical machines/systems that are increasingly network-connected–traffic lights, airplanes, nuclear power plants, and other critical or potentially lethal systems. In part one, we discuss the nature of the challenge.
Hacking Reaches out Beyond Retail
Hacking reaches into every aspect of consumer data&.
Supply Chain Risk Now?
The supply chain business community now includes Risk Management as a business priority and cites it as a key area in need of improvement. Are solution providers ready?
Looking Forward to 2015 – RFID Continues Steady Growth
Item level intelligence requirements spur the growth of RFID across sectors such as industrial, manufacturing, retail, transportation, security, healthcare and consumer applications…