A question that I am frequently asked is how well turbines can withstand hurricane force winds. The short answer is that International Standards help to ensure that turbines are built to withstand external conditions that may occur over the expected life of the project.
The integration and alignment of information technology (IT) and operational technology (OT) in the industrial internet of things (IIoT) has created new challenges for cyber security. That was the key message from a high-level cyber security summit in the Chinese city of Chengdu.
It is reported that up to 20% of all phone damage occurs as a result of immersion or contact with a liquid. That is why manufacturers claim their devices are waterproof, but what do the IP ratings they advertise actually mean?
The new IEC publication on cyber security is an executive introduction to strategy and best practices for decision-makers. Here is a quick overview of the management structure—IEC committees, working groups and systems—not covered in the new brochure.
Analysts estimate that up to 80% of cyber breaches may originate in supply chains—attacks where hackers sabotage software or hardware before it’s sent to the customer. Protecting supply chains is therefore an absolute priority for all organizations.
According to a new study commissioned by Inmarsat, the maritime industry has one of the most favourable attitudes towards the adoption of analytic, management and operational tools based on the internet of things (IoT).