Cyber Security

Securing Power and Control: Solutions

As stated in my previous post, the threat of cyber-attacks on power and control systems is growing.  One factor is the wider proliferation of attack tools and techniques.  Aging power… Read more »

Leave a comment

Cyber Security risks to buildings: What should you really be worried about

The threat of cyber attacks against Building Management Systems (BMS) is a growing concern both inside and outside of the buildings industry. One recent event, the much publicized attack against… Read more »

1 Comment

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

Straight talk on cyber security threats to industrial control systems

Hackers are always gravitating towards the easiest systems to exploit and Industrial Control Systems (ICS) are now among the most popular hacking attack targets. If control systems (like programmable logic… Read more »

Leave a comment

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

For Operational Technology (OT), Make Cyber Resiliency and Reliability of Operational Process and Assets Your Top Priority

Cyber attacks no longer focus only on stealing credit card numbers from banks. Disruption of core business processes via industrial control systems at manufacturing sites is also on the hacker… Read more »

Leave a comment

Cyber Security update: Dynamic Endpoint Modeling vs. Network Intrusion Detection

As industrial control systems connect to the Internet they allow for greater business efficiency (e.g., remote process monitoring, predictive system maintenance, process control and production data analysis). However, at the… Read more »

Leave a comment

Cyber Security: Are your network intrusion systems in place for critical infrastructure protection?

Hackers are now beginning to target critical infrastructures such as power grids, water networks, and manufacturing SCADA systems. These cyber attacks are being generated from numerous sources including individuals, rogue… Read more »

1 Comment

Power and Automation Redefined

The recent growth of internet-connected industrial and personal devices is dubbed the ‘Internet of Things’ (IOT) revolution. Yet, this trend is really an evolution that has been underway for quite… Read more »

1 Comment

Cyber Security and Data Privacy – Avoiding the Element of Surprise

  Here’s an interesting snippet for you, purely anecdotal. As we do our groundwork about future product developments, especially where cloud or anything-as-a-service is concerned, the top of mind issues… Read more »

Leave a comment

Cyber Security for Industry and Infrastructure

For many years the traditional information technology (IT) and operations technology (OT) systems remained distinct domains managed by different corporate resources, but this paradigm is undergoing a radical change as… Read more »

5 Comments

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

Why You Need to Apply Network Security Best Practices to Your BMS

As building management systems (BMSs) become more intelligent, collecting information from hundreds if not thousands of devices distributed throughout a building or campus, they are also becoming more susceptible to… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Is it safe? Cybersecurity and Automation of the Data Center

I always enjoyed Eddie Izzard’s assertion that people writing software would deliberately leave a “back door” into their programs, just in case they needed to get back in later. Providing… Read more »

1 Comment

The Future of IoT: Our 5 Predictions

In my previous blog post, I discussed how IoT describes a world in which more and more devices are sensor-enabled, connected, and able to share information about their current state… Read more »

1 Comment

What is Smart Grid? Distributech wants to know.

The just concluded Consumer Electronics Show was a massive showcase of cool new ways to use electricity. It is unlikely the attendees and exhibitors thought of it that way, though… Read more »

2 Comments

Guest Blog: Teaming Up to Provide Security Protection to Firms that Simply Can’t Afford a Breach

You don’t have to look hard to find examples of companies that have suffered serious security breaches, with recent examples including the U.S. Postal Service and Home Depot. While these… Read more »

Leave a comment

Revolutionizing the Oil and Gas industry with the IIoT

As Oil & Gas industries face challenges of oversupply, weaker demand, and therefore lower oil prices, executives are looking for more creative solutions to maintain profitability. The Industrial Internet of Things… Read more »

1 Comment

Power and Automation Redefined

The recent growth of internet-connected industrial and personal devices is dubbed the ‘Internet of Things’ (IOT) revolution. Yet, this trend is really an evolution that has been underway for quite… Read more »

1 Comment

Uncovering Cybersecurity and the IIoT in Oil & Gas Business

The Industrial Internet of Things (IIoT) is rapidly reshaping the Oil & Gas sector. Executives are investing heavily in new solutions to overcome the challenges companies face, including falling oil… Read more »

1 Comment

A Tale of Two T’s

Carric Dooley has extensive experience leading comprehensive security assessments as well as network and application penetration tests in a wide range of industries across North America, Europe and Asia. As… Read more »

1 Comment

Is it safe? Cybersecurity and Automation of the Data Center

I always enjoyed Eddie Izzard’s assertion that people writing software would deliberately leave a “back door” into their programs, just in case they needed to get back in later. Providing… Read more »

1 Comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Internet, Internet Everywhere!

Over the past few years the ‘Internet of Things’ has been a pretty hot topic. It has many names, and is considered by some to be the Next Industrial Revolution…. Read more »

Leave a comment

Cyber Security – Critical Need of the Times

Cyber security is not just a new buzzword in the present age of digitization. It is a necessity going neck and neck with the pace of information revolution. Digital connectivity has… Read more »

Leave a comment

Getting Good Directions on Your Drive to Successful DCIM Implementation

There’s this apocryphal story about the guy who gets lost in Ireland and eventually has to swallow his pride (male ego?) and ask for directions. As chance would have it,… Read more »

Leave a comment

Cybersecurity Risk Management and Your Bottom Line

Cybersecurity Risk Management – A Blog Series: Part 1 In 2013 then US President Obama directed NIST to develop a framework that would become an authoritative source for cybersecurity best… Read more »

Leave a comment