Cyber Security

Lessons in Cyber Security for Oil Pipelines

Pipeline security is an increasingly complex issue. Big Data and the Internet of Things offer new opportunities for accuracy and efficiency. These, paired with converging infrastructure and multiservice use cases,… Read more »

1 Comment

Cybersecurity Risk Management and Your Bottom Line

Cybersecurity Risk Management – A Blog Series: Part 1 In 2013 then US President Obama directed NIST to develop a framework that would become an authoritative source for cybersecurity best… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

It’s Time to Give IOT and Edge Infrastructure the Same Protection IT Resources Get

At the recent Smart Industry 2016 event in Chicago, a colleague told a story that encapsulates some of the challenges I’ve been thinking about with respect to the Internet of… Read more »

Leave a comment

A Tale of Two T’s

Carric Dooley has extensive experience leading comprehensive security assessments as well as network and application penetration tests in a wide range of industries across North America, Europe and Asia. As… Read more »

1 Comment

Security; The Key to Successful IIoT Deployments

The Industrial Internet of Things (IIoT) has been a hot topic of late.  One key consideration that will impact its acceptance rate and ultimate success is security.   A successful attack… Read more »

Leave a comment

IoT: The Four Pillars of Opportunity

Recently I had the opportunity to present at 2016 IoT Solutions World Congress in Barcelona. During my keynote presentation “Leading in IoT with Innovation at Every Level” I discussed how the… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

Cyber attack – a clear and present danger

As cyber attacks become more high profile and more prevalent, cybersecurity is an increasing concern for industrial automation and control system users and vendors. Cyber attacks happen for any number… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

Top Reasons to Consider Mobility in your Industrial Operation

In recent years, dramatic changes in the global manufacturing plant landscape have compelled organizations to respond to a new set of challenges, including: An increasing number of casual users requiring… Read more »

Leave a comment

8 Issues Driving Transformation at Distribution Utilities

What’s propelling distribution utilities to digitize, decarbonize, and decentralize their business? For an overview of the situation, let’s look at eight crucial change drivers. Decentralization One of the biggest game… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

The Future of IoT: Our 5 Predictions

In my previous blog post, I discussed how IoT describes a world in which more and more devices are sensor-enabled, connected, and able to share information about their current state… Read more »

1 Comment

Finance Execs: 3 Cyber Security Tips for Staying Out of the Headlines

Breaking News: “Bank accounts hacked! Identities stolen. Critical assets damaged.” 3 Cyber security tips for staying out of the headlines By some estimates Banks and other Financial Services companies are… Read more »

2 Comments

Why You Need to Apply Network Security Best Practices to Your BMS

As building management systems (BMSs) become more intelligent, collecting information from hundreds if not thousands of devices distributed throughout a building or campus, they are also becoming more susceptible to… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Uncovering Cybersecurity and the IIoT in Oil & Gas Business

The Industrial Internet of Things (IIoT) is rapidly reshaping the Oil & Gas sector. Executives are investing heavily in new solutions to overcome the challenges companies face, including falling oil… Read more »

1 Comment

A Tale of Two T’s

Carric Dooley has extensive experience leading comprehensive security assessments as well as network and application penetration tests in a wide range of industries across North America, Europe and Asia. As… Read more »

1 Comment

Is it safe? Cybersecurity and Automation of the Data Center

I always enjoyed Eddie Izzard’s assertion that people writing software would deliberately leave a “back door” into their programs, just in case they needed to get back in later. Providing… Read more »

1 Comment

Cloud Security Software Increasingly Adopted Across Industries

The variety of cloud software and platforms has exploded in recent years thanks to features such as scalability, flexibility, on-demand services, and cost-effectiveness. From email, human resources, IT security and… Read more »

1 Comment

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

Lessons in Cyber Security for Oil Pipelines

Pipeline security is an increasingly complex issue. Big Data and the Internet of Things offer new opportunities for accuracy and efficiency. These, paired with converging infrastructure and multiservice use cases,… Read more »

1 Comment

Electrical Grid Security is Serious Business

As we move further into the 21st century it’s difficult to imagine electrical installations that won’t be, in one way or another, connected. The Internet of Things is here and… Read more »

1 Comment

Cyber Security: Are your network intrusion systems in place for critical infrastructure protection?

Hackers are now beginning to target critical infrastructures such as power grids, water networks, and manufacturing SCADA systems. These cyber attacks are being generated from numerous sources including individuals, rogue… Read more »

1 Comment

How IIoT is Pioneering the Future of Intuitive Industries

Intuitive industries are here. Increased digitization calls on adapted control. Digitization leads to connectivity, which enables two-way energy and information flow. This enables the emergence of an even more efficient… Read more »

1 Comment

The Future of IoT: Our 5 Predictions

In my previous blog post, I discussed how IoT describes a world in which more and more devices are sensor-enabled, connected, and able to share information about their current state… Read more »

1 Comment