Cyber Security

The New IIoT Security Framework: Some Guiding Principles

September 2016 marked an important milestone in the purposeful development and intelligent evolution of the Industrial Internet of Things (IIoT), namely the publication of the Industrial Internet Consortium’s new security… Read more »

Leave a comment

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

The Future of IoT: Our 5 Predictions

In my previous blog post, I discussed how IoT describes a world in which more and more devices are sensor-enabled, connected, and able to share information about their current state… Read more »

1 Comment

Trust, but Verify…Secure Remote Monitoring for Your Data Center

Modern digital remote monitoring platforms offer a lot of promise today….reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved efficiency for power and cooling… Read more »

Leave a comment

Securing Power and Control: Solutions

As stated in my previous post, the threat of cyber-attacks on power and control systems is growing.  One factor is the wider proliferation of attack tools and techniques.  Aging power… Read more »

Leave a comment

Cyber Security risks to buildings: What should you really be worried about

The threat of cyber attacks against Building Management Systems (BMS) is a growing concern both inside and outside of the buildings industry. One recent event, the much publicized attack against… Read more »

1 Comment

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

Straight talk on cyber security threats to industrial control systems

Hackers are always gravitating towards the easiest systems to exploit and Industrial Control Systems (ICS) are now among the most popular hacking attack targets. If control systems (like programmable logic… Read more »

Leave a comment

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

For Operational Technology (OT), Make Cyber Resiliency and Reliability of Operational Process and Assets Your Top Priority

Cyber attacks no longer focus only on stealing credit card numbers from banks. Disruption of core business processes via industrial control systems at manufacturing sites is also on the hacker… Read more »

Leave a comment

What is Smart Grid? Distributech wants to know.

The just concluded Consumer Electronics Show was a massive showcase of cool new ways to use electricity. It is unlikely the attendees and exhibitors thought of it that way, though… Read more »

2 Comments

Is it safe? Cybersecurity and Automation of the Data Center

I always enjoyed Eddie Izzard’s assertion that people writing software would deliberately leave a “back door” into their programs, just in case they needed to get back in later. Providing… Read more »

1 Comment

IoT: The Four Pillars of Opportunity

Recently I had the opportunity to present at 2016 IoT Solutions World Congress in Barcelona. During my keynote presentation “Leading in IoT with Innovation at Every Level” I discussed how the… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Guest Blog: Teaming Up to Provide Security Protection to Firms that Simply Can’t Afford a Breach

You don’t have to look hard to find examples of companies that have suffered serious security breaches, with recent examples including the U.S. Postal Service and Home Depot. While these… Read more »

Leave a comment

Trust, but Verify…Secure Remote Monitoring for Your Data Center

Modern digital remote monitoring platforms offer a lot of promise today….reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved efficiency for power and cooling… Read more »

Leave a comment

Secure Your BMS: Follow These Password Best Practices

In my last post I explained why, as building management systems (BMSs) become more intelligent and connected, it’s incumbent on facilities managers to ensure they are properly secured. Because the… Read more »

2 Comments

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

Security; The Key to Successful IIoT Deployments

The Industrial Internet of Things (IIoT) has been a hot topic of late.  One key consideration that will impact its acceptance rate and ultimate success is security.   A successful attack… Read more »

Leave a comment

Transporting Data Securely

Transporting Data Securely In our January 2013 newsletter, Stephen Santee gave some excellent guidance in setting up a Mobile Media program. This was followed up in February 2013 with Carrie… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Cyber Security update: Dynamic Endpoint Modeling vs. Network Intrusion Detection

As industrial control systems connect to the Internet they allow for greater business efficiency (e.g., remote process monitoring, predictive system maintenance, process control and production data analysis). However, at the… Read more »

Leave a comment

The New IIoT Security Framework: Some Guiding Principles

September 2016 marked an important milestone in the purposeful development and intelligent evolution of the Industrial Internet of Things (IIoT), namely the publication of the Industrial Internet Consortium’s new security… Read more »

Leave a comment

Straight talk on cyber security threats to industrial control systems

Hackers are always gravitating towards the easiest systems to exploit and Industrial Control Systems (ICS) are now among the most popular hacking attack targets. If control systems (like programmable logic… Read more »

Leave a comment

Unifying EcoStruxure™ and Azure to Optimize Processes and People

Every day, a growing number of companies are integrating smart, IoT-connected devices, gaining the potential for more data and insight – and with it, smarter decision making. But, to enable… Read more »

Leave a comment

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

How safe are your building operations from cyber attacks?

Although estimates vary, businesses worldwide lose billions each year to cyber crime, according to a report by McAfee and the Center for Strategic and International Studies. The modern building management… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Cybersecurity Risk Management and Your Preparedness

Cybersecurity Risk Management – Blog Series Part 3 The single biggest threat to cybersecurity – misunderstanding the risks Common cybersecurity misunderstanding number one – Many businesses think the cybersecurity problem… Read more »

Leave a comment