This paper, written by Intel and Veridify Security, explores device-level cybersecurity for protecting building automation and Operational Technology (OT) networks.
An Introduction to Cryptographic
Security MethodsFuture-Proof Security for Building Automation Systems
Moving from 20th Century Legacy Methods to the Next Generation
of Quantum Resistant Public Key Cryptography via Group
Industries have been deploying actuators and sensors to manage their day-to-day operations for decades. Along the way, someone had the idea to connect these actuators and sensors to small microcontrollers, and eventually, they thought it would be an even better idea to link these devices to a network, leading to the invention of the Industrial Internet of Things (IIoT).
Veridify has a library of other IoT and OT security Whitepapers and Technical papers for you to read. Visit the Technical Papers and Whitepapers library here.