Cyber Security

It’s Time to Give IOT and Edge Infrastructure the Same Protection IT Resources Get

At the recent Smart Industry 2016 event in Chicago, a colleague told a story that encapsulates some of the challenges I’ve been thinking about with respect to the Internet of… Read more »

Leave a comment

A Tale of Two T’s

Carric Dooley has extensive experience leading comprehensive security assessments as well as network and application penetration tests in a wide range of industries across North America, Europe and Asia. As… Read more »

1 Comment

Security; The Key to Successful IIoT Deployments

The Industrial Internet of Things (IIoT) has been a hot topic of late.  One key consideration that will impact its acceptance rate and ultimate success is security.   A successful attack… Read more »

Leave a comment

IoT: The Four Pillars of Opportunity

Recently I had the opportunity to present at 2016 IoT Solutions World Congress in Barcelona. During my keynote presentation “Leading in IoT with Innovation at Every Level” I discussed how the… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

The New IIoT Security Framework: Some Guiding Principles

September 2016 marked an important milestone in the purposeful development and intelligent evolution of the Industrial Internet of Things (IIoT), namely the publication of the Industrial Internet Consortium’s new security… Read more »

Leave a comment

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

The Future of IoT: Our 5 Predictions

In my previous blog post, I discussed how IoT describes a world in which more and more devices are sensor-enabled, connected, and able to share information about their current state… Read more »

1 Comment

Trust, but Verify…Secure Remote Monitoring for Your Data Center

Modern digital remote monitoring platforms offer a lot of promise today….reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved efficiency for power and cooling… Read more »

Leave a comment

Cyber Security – Critical Need of the Times

Cyber security is not just a new buzzword in the present age of digitization. It is a necessity going neck and neck with the pace of information revolution. Digital connectivity has… Read more »

Leave a comment

Trifork’s Five Step Approach for Successful Application Development in the IoT Age

If you follow this blog, you might have seen that I was recently involved in running a 24-hour workshop to get to grips with that thing we call the Internet… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

Cyber Security and Data Privacy – Avoiding the Element of Surprise

  Here’s an interesting snippet for you, purely anecdotal. As we do our groundwork about future product developments, especially where cloud or anything-as-a-service is concerned, the top of mind issues… Read more »

Leave a comment

The Seven Pillars of Cyber Defense

Think of all the ways to access your computer systems. The number has increased dramatically now that employees commonly use mobile devices or USB keys to connect. With so many… Read more »

Leave a comment

Electrical Grid Security is Serious Business

As we move further into the 21st century it’s difficult to imagine electrical installations that won’t be, in one way or another, connected. The Internet of Things is here and… Read more »

1 Comment

Getting Good Directions on Your Drive to Successful DCIM Implementation

There’s this apocryphal story about the guy who gets lost in Ireland and eventually has to swallow his pride (male ego?) and ask for directions. As chance would have it,… Read more »

Leave a comment

Schneider Electric DCIM An Undisputed Leader on Gartner Magic Quadrant, Again.

“There is only one thing in life worse than being talked about,” opined the great Irish poet and playwright, Oscar Wilde, “and that is not being talked about.” For Schneider… Read more »

Leave a comment

Cyber attack – a clear and present danger

As cyber attacks become more high profile and more prevalent, cybersecurity is an increasing concern for industrial automation and control system users and vendors. Cyber attacks happen for any number… Read more »

Leave a comment

Top Reasons to Consider Mobility in your Industrial Operation

In recent years, dramatic changes in the global manufacturing plant landscape have compelled organizations to respond to a new set of challenges, including: An increasing number of casual users requiring… Read more »

Leave a comment

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

2 Comments

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

Lessons in Cyber Security for Oil Pipelines

Pipeline security is an increasingly complex issue. Big Data and the Internet of Things offer new opportunities for accuracy and efficiency. These, paired with converging infrastructure and multiservice use cases,… Read more »

1 Comment

Electrical Grid Security is Serious Business

As we move further into the 21st century it’s difficult to imagine electrical installations that won’t be, in one way or another, connected. The Internet of Things is here and… Read more »

1 Comment

Cyber Security: Are your network intrusion systems in place for critical infrastructure protection?

Hackers are now beginning to target critical infrastructures such as power grids, water networks, and manufacturing SCADA systems. These cyber attacks are being generated from numerous sources including individuals, rogue… Read more »

1 Comment

The Future of IoT: Our 5 Predictions

In my previous blog post, I discussed how IoT describes a world in which more and more devices are sensor-enabled, connected, and able to share information about their current state… Read more »

1 Comment

Understanding Firewalls and Their Role in Network Security

Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate… Read more »

1 Comment

Cyber Security risks to buildings: What should you really be worried about

The threat of cyber attacks against Building Management Systems (BMS) is a growing concern both inside and outside of the buildings industry. One recent event, the much publicized attack against… Read more »

1 Comment

Challenges of Data Consolidation Part I: Ensuring Network Connectivity

The fire hose of data has been turned on, and there’s no end in sight to the hydrant sourcing the spray. Our lives and our jobs are now dictated by… Read more »

1 Comment