Ewon IIoT Blog



Exploring IIoT - a rapidly expanding world of connected objects.

On this blog, Ewon is happy to provide you with articles, tips & tricks and explanations on a wide variety of IIoT topics.

iiot-blog-internet-of-things-blog-ewon
Cybersecurity

NIS2: an important step towards greater cybersecurity

With NIS2, the EU wants to make companies step up their cybersecurity efforts. At Ewon, we already meet the most stringent standards in this field.
Security

Cybersecurity, a step further : Birth certificate

A digital identity for an IoT product is similar to a birth certificate for a human. The term "birth certificate" is also used in the IoT world.
Industry 4.0

Industry 4.0 security, at the crossroads between IT and OT

Industry 4.0 is at the crossroads between IT and OT. The two are interdependent yet have different security approaches.
Security

Cybersecurity, a step further : Secrets, vaults and key ceremonies

Hardware based security raises the bar of confidentiality, authenticity, and integrity capabilities at a new level
Security

Cybersecurity essentials : Secure boot

Secure Boot is the process that ensures that only genuine, manufacturer-validated software runs on the device.
Security

Cybersecurity essentials : Asymmetric cryptography

Encryption & signature with asymmetric cryptography : Caesar was protecting his military messages by encrypting them. Could it be that easy today?
Security

Hardware root of trust: what and why?

Hardware root of trust brings security to the core of the hardware.
Security

Cybersecurity essentials : Symmetric cryptography

Cryptography is the art of coding and making a message unintelligible by non-authorised people.
Security

ISO 27001 in IIoT

Discover how the ISO 27001 certification helps us develop highly secure IIoT solutions.