This paper provides a high-level overview of software trustworthiness for developers, owner-operators and decision makers in industrial internet of things (IIoT) systems. We address various aspects of creating, acquiring and protecting software. We provide practical and actionable best practices for recognizing, addressing managing and mitigating risks and their sources, whether developed in-house or acquired.
White Paper | Fail-safe versus Maintenance Bypass/Isolation Switches
Know the difference.
April 15, 2020