Cyber Security

The Seven Pillars of Cyber Defense

Think of all the ways to access your computer systems. The number has increased dramatically now that employees commonly use mobile devices or USB keys to connect. With so many… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Getting Good Directions on Your Drive to Successful DCIM Implementation

There’s this apocryphal story about the guy who gets lost in Ireland and eventually has to swallow his pride (male ego?) and ask for directions. As chance would have it,… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Cyber Security: The Cornerstone of IIoT Adoption

Over the past decade or more the need for cyber security in industrial automation and control systems has been accelerating at an ever increasing rate. Adoption of the benefits of… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

Schneider Electric DCIM An Undisputed Leader on Gartner Magic Quadrant, Again.

“There is only one thing in life worse than being talked about,” opined the great Irish poet and playwright, Oscar Wilde, “and that is not being talked about.” For Schneider… Read more »

Leave a comment

Who Owns the Risk?

Some time ago, my colleague Joseph Reele wrote of the risk implications of various data centre choices that might be made. In that article Reele identified a (possibly simplistic) trade-off… Read more »

Leave a comment

Keeping the Holes Plugged

One of our team’s most common quotes is “Cyber security is so much more than firewalls and anti-virus software.” All successful security solutions are part of an overall program that… Read more »

Leave a comment

Trifork’s Five Step Approach for Successful Application Development in the IoT Age

If you follow this blog, you might have seen that I was recently involved in running a 24-hour workshop to get to grips with that thing we call the Internet… Read more »

Leave a comment

Beware the Disgruntled Employee: How to Protect Your BMS from the Threats Within

This is the third in a series of posts on the topic of building management system (BMS) security. BMSs today are growing more intelligent all the time, with devices connected… Read more »

Leave a comment

It’s Time to Give IOT and Edge Infrastructure the Same Protection IT Resources Get

At the recent Smart Industry 2016 event in Chicago, a colleague told a story that encapsulates some of the challenges I’ve been thinking about with respect to the Internet of… Read more »

Leave a comment

Is Your Building IoT Ready?

Have you heard this one before? According to Gartner Research, there will be 20.8 billion connected objects by 2020. That’s more things than people on earth. Why does nearly every… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Cyber Security Return on Investment

In today’s business environment, implementation of a cyber security program is a necessity. Many people correlate cyber security with an insurance policy, which is incorrect. Implementing a cyber security program… Read more »

Leave a comment

Cyber Security: Are your network intrusion systems in place for critical infrastructure protection?

Hackers are now beginning to target critical infrastructures such as power grids, water networks, and manufacturing SCADA systems. These cyber attacks are being generated from numerous sources including individuals, rogue… Read more »

1 Comment

Protecting Healthcare Data: Facilities New Role In Cyber Security

In December 2013, 40 million Target customers were affected by one of the largest breaches in retail history. In December 2015, Target agreed to pay $39 million to banks as… Read more »

Leave a comment

Software Vulnerability Best Practices to Protect Your BMS from Security Threats

As building management systems grow more intelligent and increasingly connect to the Internet to share data, they can also be the target of cybersecurity threats. In this fourth and final… Read more »

2 Comments

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

Is Mass Behavior the Best Evolutionary Response to Improve Data Center Security?

In a recent editorial, Peter Judge, the global editor of DatacenterDynamics, posed the question can management quell the embedded threat. The story led from an observation made by Ed Ansett… Read more »

Leave a comment

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Why You Need a Power Failure Response Strategy

Our world has become highly reliant upon the availability of continuous power. As a result, almost every company needs to have a power failure response strategy in place. Very few… Read more »

Leave a comment

8 Issues Driving Transformation at Distribution Utilities

What’s propelling distribution utilities to digitize, decarbonize, and decentralize their business? For an overview of the situation, let’s look at eight crucial change drivers. Decentralization One of the biggest game… Read more »

Leave a comment

Cyber Security Return on Investment

In today’s business environment, implementation of a cyber security program is a necessity. Many people correlate cyber security with an insurance policy, which is incorrect. Implementing a cyber security program… Read more »

Leave a comment

Trust, but Verify…Secure Remote Monitoring for Your Data Center

Modern digital remote monitoring platforms offer a lot of promise today….reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved efficiency for power and cooling… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

Cyber Security: The Cornerstone of IIoT Adoption

Over the past decade or more the need for cyber security in industrial automation and control systems has been accelerating at an ever increasing rate. Adoption of the benefits of… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment