Back to the Future Cyber Security – Chapter 4, Episode 2: When unauthorized access and unqualified people team up to cause havoc

*WARNING* These are real incidents from the field and could scare you. A lot! *WARNING* Liquid aluminium has 3 very dangerous characteristics. It is extremely hot, aggressive to most materials including other metals and responds explosive when in contact with water. Three reasons to be extremely careful when handling liquid aluminum. Safety precautions are important,

Back to the Future Cyber Security – Chapter 4, Episode 1: Real incidents from the field

*WARNING* These are real incidents from the field and could scare you. A lot! *WARNING* We talk a lot about what could go wrong with Cyber Security and what could be done to prevent it. Let’s have a look at what already happened and what should have been done to prevent it. Just to make

Back to the Future Cyber Security – Chapter 3: Rethink and act, a Manifesto

With the introduction of Industry 4.0 by the German Government and the designated workgroup, a roadmap was created to introduce Artificial Intelligence, Smart Controls, Smart Automation and Industrial Internet of Things (IIoT) in combination with Big Data into the manufacturing industries in Germany and beyond. When Siemens AG introduced the Charter of Trust during the 2018 Munich Security

Back to the Future Cyber Security – Chapter 2: A new strategy for Legacy Risk is needed!

  When you stay informed about new developments in Internet of Things and Industry 4.0, you might easily get the impression that factories are filled with the latest greatest in technology. A short factory tour in most production facilities will remind you immediately that the majority of the active machines and equipment are far from

Back to the Future Cyber Security – Chapter 1: The Industrial Legacy

Do you know who Big Blue is? Follow the link if you don’t, but most of us will know that IBM is known as Big Blue. Think about that for a while. A nickname for a company that (almost) everyone knows. Some say this is a deliberate marketing strategy, based on the blue logo of IBM.