Cyber Security

4 Undeniable Benefits of the Cloud – Part 2 of “Moving to the Cloud”

4 Undeniable Benefits of the Cloud – Part 2 of “Moving to the Cloud This is the second blog in a series of three on why and how companies are… Read more »

Leave a comment

Partnering with Specialists to help Protect the World’s Critical Infrastructure from Cyber Attacks

Today in Schneider Electric’s News Release it was  announced that we are partnering with Claroty, an innovator in Operational Technology (OT) network protection, to help to address cybersecurity challenges for the… Read more »

Leave a comment

Focus on Your Risk Strategy: Cyber Security for the Smart Grid

Today’s automated distribution grids are under pressure to significantly improve network and operational efficiency while still securing critical infrastructure reliability. The transformation of existing utility assets thanks to the convergence… Read more »

Leave a comment

Why Cybersecurity Matters in Food & Beverage?

May 2017, the world faced one of the most serious cyber-attacks. The Ransomware Wannacry put at risk 200,000 companies spread over 150 countries. Immediately after, every company, including those in… Read more »

Leave a comment

The Endless Debate: Is the Cloud Secure? – Part 1 of “Moving to the Cloud”

This is the first blog in a series of three on why and how companies are moving their building security management to the cloud. I can’t tell you how many… Read more »

Leave a comment

7 Technology Trends That Define Next-Generation Data Center Monitoring

Data center monitoring methods have undergone a dramatic change over the last several years. Consider data center power and cooling infrastructure monitoring as an example. These monitoring systems handle roughly… Read more »

Leave a comment

The Cybersecurity Business Case: An Arduous Challenge – Part 2

In Part 1 of my previous blog, “The Cybersecurity Business Case – An Arduous Challenge”, I talked about the 3 key elements of a typical business case and the creation… Read more »

Leave a comment

The Cybersecurity Business Case: An Arduous Challenge – Part 1

The need for secure control systems is a growing priority for industrial applications.  Recent high profile cyber-attacks against critical infrastructure, coupled with the growing list of published equipment vulnerabilities, and… Read more »

1 Comment

Cloud Security Software Increasingly Adopted Across Industries

The variety of cloud software and platforms has exploded in recent years thanks to features such as scalability, flexibility, on-demand services, and cost-effectiveness. From email, human resources, IT security and… Read more »

1 Comment

Unifying EcoStruxure™ and Azure to Optimize Processes and People

Every day, a growing number of companies are integrating smart, IoT-connected devices, gaining the potential for more data and insight – and with it, smarter decision making. But, to enable… Read more »

Leave a comment

Understanding Firewalls and Their Role in Network Security

Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate… Read more »

1 Comment

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

Power and Automation Redefined

The recent growth of internet-connected industrial and personal devices is dubbed the ‘Internet of Things’ (IOT) revolution. Yet, this trend is really an evolution that has been underway for quite… Read more »

1 Comment

Avoiding cyber attacks: An inside look at industrial security fundamentals

Cyber security incidents are escalating in number and complexity. As industrial processes integrate with outside networks, plants are at risk. For that reason, operations teams need to know about security… Read more »

6 Comments

Why You Need a Power Failure Response Strategy

Our world has become highly reliant upon the availability of continuous power. As a result, almost every company needs to have a power failure response strategy in place. Very few… Read more »

Leave a comment

Cyber Security: The Cornerstone of IIoT Adoption

Over the past decade or more the need for cyber security in industrial automation and control systems has been accelerating at an ever increasing rate. Adoption of the benefits of… Read more »

Leave a comment

Why Industrial Ethernet and how exactly?

“Why Ethernet?” That was a question posed to me during a recent meeting with a plant manager. He said, “I have been using serial Fieldbuses for many years, but now… Read more »

3 Comments

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

3 SCADA considerations to optimize your industrial operation

Today’s business climate is putting plants under intense financial pressure, and operations and maintenance budgets are among the first to be cut. Fewer personnel are expected to operate and maintain… Read more »

4 Comments

How safe are your building operations from cyber attacks?

Although estimates vary, businesses worldwide lose billions each year to cyber crime, according to a report by McAfee and the Center for Strategic and International Studies. The modern building management… Read more »

Leave a comment

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

6 Comments

Avoiding cyber attacks: An inside look at industrial security fundamentals

Cyber security incidents are escalating in number and complexity. As industrial processes integrate with outside networks, plants are at risk. For that reason, operations teams need to know about security… Read more »

6 Comments

Cyber Security for Industry and Infrastructure

For many years the traditional information technology (IT) and operations technology (OT) systems remained distinct domains managed by different corporate resources, but this paradigm is undergoing a radical change as… Read more »

5 Comments

3 SCADA considerations to optimize your industrial operation

Today’s business climate is putting plants under intense financial pressure, and operations and maintenance budgets are among the first to be cut. Fewer personnel are expected to operate and maintain… Read more »

4 Comments

Why Industrial Ethernet and how exactly?

“Why Ethernet?” That was a question posed to me during a recent meeting with a plant manager. He said, “I have been using serial Fieldbuses for many years, but now… Read more »

3 Comments

Software Vulnerability Best Practices to Protect Your BMS from Security Threats

As building management systems grow more intelligent and increasingly connect to the Internet to share data, they can also be the target of cybersecurity threats. In this fourth and final… Read more »

2 Comments

Transforming Industry with Digital Services: A Collaborative Industrial IoT Approach

Digital transformation is a key focal point for today’s industry. It’s about companies connecting their existing devices and implementing new, scalable platforms to drive maximum value from their efforts. But,… Read more »

2 Comments

Monitoring Your Networks

Today’s complex network systems have become the foundation of business.  A network’s reliability and performance are essential.  With so many interrelated devices and applications running simultaneously, system event diagnosis can… Read more »

2 Comments

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

Finance Execs: 3 Cyber Security Tips for Staying Out of the Headlines

Breaking News: “Bank accounts hacked! Identities stolen. Critical assets damaged.” 3 Cyber security tips for staying out of the headlines By some estimates Banks and other Financial Services companies are… Read more »

2 Comments