Cyber Security

Challenges of Data Consolidation Part I: Ensuring Network Connectivity

The fire hose of data has been turned on, and there’s no end in sight to the hydrant sourcing the spray. Our lives and our jobs are now dictated by… Read more »

1 Comment

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

Monitoring Your Networks

Today’s complex network systems have become the foundation of business.  A network’s reliability and performance are essential.  With so many interrelated devices and applications running simultaneously, system event diagnosis can… Read more »

2 Comments

Software Vulnerability Best Practices to Protect Your BMS from Security Threats

As building management systems grow more intelligent and increasingly connect to the Internet to share data, they can also be the target of cybersecurity threats. In this fourth and final… Read more »

2 Comments

Internet, Internet Everywhere!

Over the past few years the ‘Internet of Things’ has been a pretty hot topic. It has many names, and is considered by some to be the Next Industrial Revolution…. Read more »

Leave a comment

Cyber Security Return on Investment

In today’s business environment, implementation of a cyber security program is a necessity. Many people correlate cyber security with an insurance policy, which is incorrect. Implementing a cyber security program… Read more »

Leave a comment

Beware the Disgruntled Employee: How to Protect Your BMS from the Threats Within

This is the third in a series of posts on the topic of building management system (BMS) security. BMSs today are growing more intelligent all the time, with devices connected… Read more »

Leave a comment

Is Mass Behavior the Best Evolutionary Response to Improve Data Center Security?

In a recent editorial, Peter Judge, the global editor of DatacenterDynamics, posed the question can management quell the embedded threat. The story led from an observation made by Ed Ansett… Read more »

Leave a comment

Top Reasons to Consider Mobility in your Industrial Operation

In recent years, dramatic changes in the global manufacturing plant landscape have compelled organizations to respond to a new set of challenges, including: An increasing number of casual users requiring… Read more »

Leave a comment

Secure Your BMS: Follow These Password Best Practices

In my last post I explained why, as building management systems (BMSs) become more intelligent and connected, it’s incumbent on facilities managers to ensure they are properly secured. Because the… Read more »

2 Comments

Cybersecurity Risk Management in Your Supply Chain

Cybersecurity Risk Management – Blog Series Part 2 Innovative technology and new products mean nothing without cybersecurity protections The constant influx of news stories about hacking and internet security issues… Read more »

2 Comments

Why the End of XP Support Makes Secure Power Even More Important

In April 2014, Microsoft stopped issuing security patches for its XP operating system. While the move had been announced two years previously, many corporate operations – including building management and… Read more »

Leave a comment

Regulatory compliance drives – and complicates – government rack access strategies

Regulatory compliance remains the most common top priority for federal IT decision makers when it comes to securing equipment racks in data centers. Almost always part of an overall physical… Read more »

Leave a comment

Monitoring Your Networks

Today’s complex network systems have become the foundation of business.  A network’s reliability and performance are essential.  With so many interrelated devices and applications running simultaneously, system event diagnosis can… Read more »

2 Comments

Revolutionizing the Oil and Gas industry with the IIoT

As Oil & Gas industries face challenges of oversupply, weaker demand, and therefore lower oil prices, executives are looking for more creative solutions to maintain profitability. The Industrial Internet of Things… Read more »

1 Comment

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

7 Technology Trends That Define Next-Generation Data Center Monitoring

Data center monitoring methods have undergone a dramatic change over the last several years. Consider data center power and cooling infrastructure monitoring as an example. These monitoring systems handle roughly… Read more »

Leave a comment

Enabling Business Through Safety, Security

Editor and Founder Gregory Hale has over 30 years in the publishing industry covering manufacturing automation for 10 years as the Chief Editor of InTech magazine. Prior to starting atInTech in 1999, Hale… Read more »

Leave a comment

A Tale of Two T’s

Carric Dooley has extensive experience leading comprehensive security assessments as well as network and application penetration tests in a wide range of industries across North America, Europe and Asia. As… Read more »

1 Comment

The Cybersecurity Business Case: An Arduous Challenge – Part 1

The need for secure control systems is a growing priority for industrial applications.  Recent high profile cyber-attacks against critical infrastructure, coupled with the growing list of published equipment vulnerabilities, and… Read more »

1 Comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Cyber Security update: Dynamic Endpoint Modeling vs. Network Intrusion Detection

As industrial control systems connect to the Internet they allow for greater business efficiency (e.g., remote process monitoring, predictive system maintenance, process control and production data analysis). However, at the… Read more »

Leave a comment

The New IIoT Security Framework: Some Guiding Principles

September 2016 marked an important milestone in the purposeful development and intelligent evolution of the Industrial Internet of Things (IIoT), namely the publication of the Industrial Internet Consortium’s new security… Read more »

Leave a comment

Straight talk on cyber security threats to industrial control systems

Hackers are always gravitating towards the easiest systems to exploit and Industrial Control Systems (ICS) are now among the most popular hacking attack targets. If control systems (like programmable logic… Read more »

Leave a comment

Unifying EcoStruxure™ and Azure to Optimize Processes and People

Every day, a growing number of companies are integrating smart, IoT-connected devices, gaining the potential for more data and insight – and with it, smarter decision making. But, to enable… Read more »

Leave a comment

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

How safe are your building operations from cyber attacks?

Although estimates vary, businesses worldwide lose billions each year to cyber crime, according to a report by McAfee and the Center for Strategic and International Studies. The modern building management… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Cybersecurity Risk Management and Your Preparedness

Cybersecurity Risk Management – Blog Series Part 3 The single biggest threat to cybersecurity – misunderstanding the risks Common cybersecurity misunderstanding number one – Many businesses think the cybersecurity problem… Read more »

Leave a comment