Cyber Security

The Seven Pillars of Cyber Defense

Think of all the ways to access your computer systems. The number has increased dramatically now that employees commonly use mobile devices or USB keys to connect. With so many… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Getting Good Directions on Your Drive to Successful DCIM Implementation

There’s this apocryphal story about the guy who gets lost in Ireland and eventually has to swallow his pride (male ego?) and ask for directions. As chance would have it,… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Cyber Security: The Cornerstone of IIoT Adoption

Over the past decade or more the need for cyber security in industrial automation and control systems has been accelerating at an ever increasing rate. Adoption of the benefits of… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

Schneider Electric DCIM An Undisputed Leader on Gartner Magic Quadrant, Again.

“There is only one thing in life worse than being talked about,” opined the great Irish poet and playwright, Oscar Wilde, “and that is not being talked about.” For Schneider… Read more »

Leave a comment

Who Owns the Risk?

Some time ago, my colleague Joseph Reele wrote of the risk implications of various data centre choices that might be made. In that article Reele identified a (possibly simplistic) trade-off… Read more »

Leave a comment

Keeping the Holes Plugged

One of our team’s most common quotes is “Cyber security is so much more than firewalls and anti-virus software.” All successful security solutions are part of an overall program that… Read more »

Leave a comment

Trifork’s Five Step Approach for Successful Application Development in the IoT Age

If you follow this blog, you might have seen that I was recently involved in running a 24-hour workshop to get to grips with that thing we call the Internet… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

Unifying EcoStruxure™ and Azure to Optimize Processes and People

Every day, a growing number of companies are integrating smart, IoT-connected devices, gaining the potential for more data and insight – and with it, smarter decision making. But, to enable… Read more »

Leave a comment

Managing Data Privacy and Cyber Security with StruxureOn

In my recent blogs I’ve taken the opportunity to write about the features and benefits of StruxureOn – our new cloud-based service for data center monitoring. This new introduction proactively… Read more »

Leave a comment

A Data Center Architecture Hack, Inspired by and Encompassing the Open Compute Project

When I first heard the term “hacking” from folks at the Open Compute Project (OCP), I was a little confused – what does that mean, “hacking”? Is it some play… Read more »

Leave a comment

Is Mass Behavior the Best Evolutionary Response to Improve Data Center Security?

In a recent editorial, Peter Judge, the global editor of DatacenterDynamics, posed the question can management quell the embedded threat. The story led from an observation made by Ed Ansett… Read more »

Leave a comment

Challenges of Data Consolidation Part I: Ensuring Network Connectivity

The fire hose of data has been turned on, and there’s no end in sight to the hydrant sourcing the spray. Our lives and our jobs are now dictated by… Read more »

1 Comment

Transforming Industry with Digital Services: A Collaborative Industrial IoT Approach

Digital transformation is a key focal point for today’s industry. It’s about companies connecting their existing devices and implementing new, scalable platforms to drive maximum value from their efforts. But,… Read more »

2 Comments

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

6 Comments

Securing Power and Control: The Problem and Attack Vectors

Electricity is taken for granted. Lights illuminate when we flip a switch. Turn up the thermostat and the house warms up. In the recent past a power failure could mean… Read more »

2 Comments

The New IIoT Security Framework: Some Guiding Principles

September 2016 marked an important milestone in the purposeful development and intelligent evolution of the Industrial Internet of Things (IIoT), namely the publication of the Industrial Internet Consortium’s new security… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

How to Provide Physical Security for Your Most Critical Resources

In mission-critical facilities, it’s obviously important to keep unauthorized individuals out, but it’s also important that authorized employees don’t venture where they don’t belong. The reason? That’s how bad things… Read more »

Leave a comment

Guest Blog: Teaming Up to Provide Security Protection to Firms that Simply Can’t Afford a Breach

You don’t have to look hard to find examples of companies that have suffered serious security breaches, with recent examples including the U.S. Postal Service and Home Depot. While these… Read more »

Leave a comment

The Seven Pillars of Cyber Defense

Think of all the ways to access your computer systems. The number has increased dramatically now that employees commonly use mobile devices or USB keys to connect. With so many… Read more »

Leave a comment

For Operational Technology (OT), Make Cyber Resiliency and Reliability of Operational Process and Assets Your Top Priority

Cyber attacks no longer focus only on stealing credit card numbers from banks. Disruption of core business processes via industrial control systems at manufacturing sites is also on the hacker… Read more »

Leave a comment

The Cybersecurity Business Case: An Arduous Challenge – Part 2

In Part 1 of my previous blog, “The Cybersecurity Business Case – An Arduous Challenge”, I talked about the 3 key elements of a typical business case and the creation… Read more »

Leave a comment

Why You Need to Apply Network Security Best Practices to Your BMS

As building management systems (BMSs) become more intelligent, collecting information from hundreds if not thousands of devices distributed throughout a building or campus, they are also becoming more susceptible to… Read more »

Leave a comment

IoT: The Four Pillars of Opportunity

Recently I had the opportunity to present at 2016 IoT Solutions World Congress in Barcelona. During my keynote presentation “Leading in IoT with Innovation at Every Level” I discussed how the… Read more »

Leave a comment

Trifork’s Five Step Approach for Successful Application Development in the IoT Age

If you follow this blog, you might have seen that I was recently involved in running a 24-hour workshop to get to grips with that thing we call the Internet… Read more »

Leave a comment

Bringing Innovation to Every Level of the Oil & Gas Sector

As I explained in my previous blog Revolutionizing the Oil & Gas industry with the IIoT, IIoT is having a noticeable impact on all Oil & Gas processes. By utilizing… Read more »

Leave a comment