Cyber Security

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

Straight talk on cyber security threats to industrial control systems

Hackers are always gravitating towards the easiest systems to exploit and Industrial Control Systems (ICS) are now among the most popular hacking attack targets. If control systems (like programmable logic… Read more »

Leave a comment

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

For Operational Technology (OT), Make Cyber Resiliency and Reliability of Operational Process and Assets Your Top Priority

Cyber attacks no longer focus only on stealing credit card numbers from banks. Disruption of core business processes via industrial control systems at manufacturing sites is also on the hacker… Read more »

Leave a comment

Cyber Security update: Dynamic Endpoint Modeling vs. Network Intrusion Detection

As industrial control systems connect to the Internet they allow for greater business efficiency (e.g., remote process monitoring, predictive system maintenance, process control and production data analysis). However, at the… Read more »

Leave a comment

Cyber Security: Are your network intrusion systems in place for critical infrastructure protection?

Hackers are now beginning to target critical infrastructures such as power grids, water networks, and manufacturing SCADA systems. These cyber attacks are being generated from numerous sources including individuals, rogue… Read more »

1 Comment

Power and Automation Redefined

The recent growth of internet-connected industrial and personal devices is dubbed the ‘Internet of Things’ (IOT) revolution. Yet, this trend is really an evolution that has been underway for quite… Read more »

1 Comment

Cyber Security and Data Privacy – Avoiding the Element of Surprise

  Here’s an interesting snippet for you, purely anecdotal. As we do our groundwork about future product developments, especially where cloud or anything-as-a-service is concerned, the top of mind issues… Read more »

Leave a comment

Why You Need a Power Failure Response Strategy

Our world has become highly reliant upon the availability of continuous power. As a result, almost every company needs to have a power failure response strategy in place. Very few… Read more »

Leave a comment

Is Your Building IoT Ready?

Have you heard this one before? According to Gartner Research, there will be 20.8 billion connected objects by 2020. That’s more things than people on earth. Why does nearly every… Read more »

Leave a comment

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

Internet, Internet Everywhere!

Over the past few years the ‘Internet of Things’ has been a pretty hot topic. It has many names, and is considered by some to be the Next Industrial Revolution…. Read more »

Leave a comment

Software Vulnerability Best Practices to Protect Your BMS from Security Threats

As building management systems grow more intelligent and increasingly connect to the Internet to share data, they can also be the target of cybersecurity threats. In this fourth and final… Read more »

2 Comments

Beware the Disgruntled Employee: How to Protect Your BMS from the Threats Within

This is the third in a series of posts on the topic of building management system (BMS) security. BMSs today are growing more intelligent all the time, with devices connected… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

Is Your Building IoT Ready?

Have you heard this one before? According to Gartner Research, there will be 20.8 billion connected objects by 2020. That’s more things than people on earth. Why does nearly every… Read more »

Leave a comment

Cyber Security: Are your network intrusion systems in place for critical infrastructure protection?

Hackers are now beginning to target critical infrastructures such as power grids, water networks, and manufacturing SCADA systems. These cyber attacks are being generated from numerous sources including individuals, rogue… Read more »

1 Comment

Unifying EcoStruxure™ and Azure to Optimize Processes and People

Every day, a growing number of companies are integrating smart, IoT-connected devices, gaining the potential for more data and insight – and with it, smarter decision making. But, to enable… Read more »

Leave a comment

Transforming Industry with Digital Services: A Collaborative Industrial IoT Approach

Digital transformation is a key focal point for today’s industry. It’s about companies connecting their existing devices and implementing new, scalable platforms to drive maximum value from their efforts. But,… Read more »

2 Comments

Cyber Security Return on Investment

In today’s business environment, implementation of a cyber security program is a necessity. Many people correlate cyber security with an insurance policy, which is incorrect. Implementing a cyber security program… Read more »

Leave a comment

Schneider Electric DCIM An Undisputed Leader on Gartner Magic Quadrant, Again.

“There is only one thing in life worse than being talked about,” opined the great Irish poet and playwright, Oscar Wilde, “and that is not being talked about.” For Schneider… Read more »

Leave a comment

It’s Time to Give IOT and Edge Infrastructure the Same Protection IT Resources Get

At the recent Smart Industry 2016 event in Chicago, a colleague told a story that encapsulates some of the challenges I’ve been thinking about with respect to the Internet of… Read more »

Leave a comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

Is Your Building IoT Ready?

Have you heard this one before? According to Gartner Research, there will be 20.8 billion connected objects by 2020. That’s more things than people on earth. Why does nearly every… Read more »

Leave a comment

Managing Data Privacy and Cyber Security with StruxureOn

*September 25th update: StruxureOn was re-branded to EcoStruxure IT. In my recent blogs I’ve taken the opportunity to write about the features and benefits of StruxureOn – our new cloud-based… Read more »

Leave a comment

Is Mass Behavior the Best Evolutionary Response to Improve Data Center Security?

In a recent editorial, Peter Judge, the global editor of DatacenterDynamics, posed the question can management quell the embedded threat. The story led from an observation made by Ed Ansett… Read more »

Leave a comment

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

6 Requirements for Cloud-Based Security Management – Part 3 of “Moving to the Cloud”

This is the third blog in a series of three on why and how companies are moving their building security management to the cloud. In my previous blog, I discussed… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment