Cyber Security

Why You Need a Power Failure Response Strategy

Our world has become highly reliant upon the availability of continuous power. As a result, almost every company needs to have a power failure response strategy in place. Very few… Read more »

Leave a comment

Is Your Building IoT Ready?

Have you heard this one before? According to Gartner Research, there will be 20.8 billion connected objects by 2020. That’s more things than people on earth. Why does nearly every… Read more »

Leave a comment

A Data Center Architecture Hack, Inspired by and Encompassing the Open Compute Project

When I first heard the term “hacking” from folks at the Open Compute Project (OCP), I was a little confused – what does that mean, “hacking”? Is it some play… Read more »

Leave a comment

Enabling Business Through Safety, Security

Editor and Founder Gregory Hale has over 30 years in the publishing industry covering manufacturing automation for 10 years as the Chief Editor of InTech magazine. Prior to starting atInTech in 1999, Hale… Read more »

Leave a comment

Protecting Healthcare Data: Facilities New Role In Cyber Security

In December 2013, 40 million Target customers were affected by one of the largest breaches in retail history. In December 2015, Target agreed to pay $39 million to banks as… Read more »

Leave a comment

Finance Execs: 3 Cyber Security Tips for Staying Out of the Headlines

Breaking News: “Bank accounts hacked! Identities stolen. Critical assets damaged.” 3 Cyber security tips for staying out of the headlines By some estimates Banks and other Financial Services companies are… Read more »

Leave a comment

The Seven Pillars of Cyber Defense

Think of all the ways to access your computer systems. The number has increased dramatically now that employees commonly use mobile devices or USB keys to connect. With so many… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Getting Good Directions on Your Drive to Successful DCIM Implementation

There’s this apocryphal story about the guy who gets lost in Ireland and eventually has to swallow his pride (male ego?) and ask for directions. As chance would have it,… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

IoT: The Four Pillars of Opportunity

Recently I had the opportunity to present at 2016 IoT Solutions World Congress in Barcelona. During my keynote presentation “Leading in IoT with Innovation at Every Level” I discussed how the… Read more »

Leave a comment

Transporting Data Securely

Transporting Data Securely In our January 2013 newsletter, Stephen Santee gave some excellent guidance in setting up a Mobile Media program. This was followed up in February 2013 with Carrie… Read more »

Leave a comment

Internet, Internet Everywhere!

Over the past few years the ‘Internet of Things’ has been a pretty hot topic. It has many names, and is considered by some to be the Next Industrial Revolution…. Read more »

Leave a comment

Trust, but Verify…Secure Remote Monitoring for Your Data Center

Modern digital remote monitoring platforms offer a lot of promise today….reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved efficiency for power and cooling… Read more »

Leave a comment

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

Secure Your BMS: Follow These Password Best Practices

In my last post I explained why, as building management systems (BMSs) become more intelligent and connected, it’s incumbent on facilities managers to ensure they are properly secured. Because the… Read more »

2 Comments

Beware the Disgruntled Employee: How to Protect Your BMS from the Threats Within

This is the third in a series of posts on the topic of building management system (BMS) security. BMSs today are growing more intelligent all the time, with devices connected… Read more »

Leave a comment

Is Your Building IoT Ready?

Have you heard this one before? According to Gartner Research, there will be 20.8 billion connected objects by 2020. That’s more things than people on earth. Why does nearly every… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Transporting Data Securely

Transporting Data Securely In our January 2013 newsletter, Stephen Santee gave some excellent guidance in setting up a Mobile Media program. This was followed up in February 2013 with Carrie… Read more »

Leave a comment

Cyber Security and Data Privacy – Avoiding the Element of Surprise

  Here’s an interesting snippet for you, purely anecdotal. As we do our groundwork about future product developments, especially where cloud or anything-as-a-service is concerned, the top of mind issues… Read more »

Leave a comment

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Internet, Internet Everywhere!

Over the past few years the ‘Internet of Things’ has been a pretty hot topic. It has many names, and is considered by some to be the Next Industrial Revolution…. Read more »

Leave a comment

Cyber Security – Critical Need of the Times

Cyber security is not just a new buzzword in the present age of digitization. It is a necessity going neck and neck with the pace of information revolution. Digital connectivity has… Read more »

Leave a comment

Getting Good Directions on Your Drive to Successful DCIM Implementation

There’s this apocryphal story about the guy who gets lost in Ireland and eventually has to swallow his pride (male ego?) and ask for directions. As chance would have it,… Read more »

Leave a comment

Cybersecurity Risk Management and Your Bottom Line

Cybersecurity Risk Management – A Blog Series: Part 1 In 2013 then US President Obama directed NIST to develop a framework that would become an authoritative source for cybersecurity best… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Cyber Security update: Dynamic Endpoint Modeling vs. Network Intrusion Detection

As industrial control systems connect to the Internet they allow for greater business efficiency (e.g., remote process monitoring, predictive system maintenance, process control and production data analysis). However, at the… Read more »

Leave a comment