Cyber Security

Why the End of XP Support Makes Secure Power Even More Important

In April 2014, Microsoft stopped issuing security patches for its XP operating system. While the move had been announced two years previously, many corporate operations – including building management and… Read more »

Leave a comment

Guest Blog: Teaming Up to Provide Security Protection to Firms that Simply Can’t Afford a Breach

You don’t have to look hard to find examples of companies that have suffered serious security breaches, with recent examples including the U.S. Postal Service and Home Depot. While these… Read more »

Leave a comment

How safe are your building operations from cyber attacks?

Although estimates vary, businesses worldwide lose billions each year to cyber crime, according to a report by McAfee and the Center for Strategic and International Studies. The modern building management… Read more »

Leave a comment

Cyber Security – Critical Need of the Times

Cyber security is not just a new buzzword in the present age of digitization. It is a necessity going neck and neck with the pace of information revolution. Digital connectivity has… Read more »

Leave a comment

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

Cyber Security for Industry and Infrastructure

For many years the traditional information technology (IT) and operations technology (OT) systems remained distinct domains managed by different corporate resources, but this paradigm is undergoing a radical change as… Read more »

5 Comments

Avoiding cyber attacks: An inside look at industrial security fundamentals

Cyber security incidents are escalating in number and complexity. As industrial processes integrate with outside networks, plants are at risk. For that reason, operations teams need to know about security… Read more »

6 Comments

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

Managing Data Privacy and Cyber Security with StruxureOn

In my recent blogs I’ve taken the opportunity to write about the features and benefits of StruxureOn – our new cloud-based service for data center monitoring. This new introduction proactively… Read more »

Leave a comment

Choking on Data

Ever hear the phrase “Choking on data, starving for information?” I credit my exposure to this phrase during a meeting I had with my new Vice President as a fresh-out-of-college… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

Cyber Security update: Dynamic Endpoint Modeling vs. Network Intrusion Detection

As industrial control systems connect to the Internet they allow for greater business efficiency (e.g., remote process monitoring, predictive system maintenance, process control and production data analysis). However, at the… Read more »

Leave a comment

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

6 Comments

8 Issues Driving Transformation at Distribution Utilities

What’s propelling distribution utilities to digitize, decarbonize, and decentralize their business? For an overview of the situation, let’s look at eight crucial change drivers. Decentralization One of the biggest game… Read more »

Leave a comment

Cybersecurity Risk Management and Your Bottom Line

Cybersecurity Risk Management – A Blog Series: Part 1 In 2013 then US President Obama directed NIST to develop a framework that would become an authoritative source for cybersecurity best… Read more »

Leave a comment

Uncovering Cybersecurity and the IIoT in Oil & Gas Business

The Industrial Internet of Things (IIoT) is rapidly reshaping the Oil & Gas sector. Executives are investing heavily in new solutions to overcome the challenges companies face, including falling oil… Read more »

1 Comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Finance Execs: 3 Cyber Security Tips for Staying Out of the Headlines

Breaking News: “Bank accounts hacked! Identities stolen. Critical assets damaged.” 3 Cyber security tips for staying out of the headlines By some estimates Banks and other Financial Services companies are… Read more »

Leave a comment

Straight talk on cyber security threats to industrial control systems

Hackers are always gravitating towards the easiest systems to exploit and Industrial Control Systems (ICS) are now among the most popular hacking attack targets. If control systems (like programmable logic… Read more »

Leave a comment

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

How safe are your building operations from cyber attacks?

Although estimates vary, businesses worldwide lose billions each year to cyber crime, according to a report by McAfee and the Center for Strategic and International Studies. The modern building management… Read more »

Leave a comment

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Cybersecurity Risk Management and Your Preparedness

Cybersecurity Risk Management – Blog Series Part 3 The single biggest threat to cybersecurity – misunderstanding the risks Common cybersecurity misunderstanding number one – Many businesses think the cybersecurity problem… Read more »

Leave a comment

Choking on Data

Ever hear the phrase “Choking on data, starving for information?” I credit my exposure to this phrase during a meeting I had with my new Vice President as a fresh-out-of-college… Read more »

Leave a comment

How to Provide Physical Security for Your Most Critical Resources

In mission-critical facilities, it’s obviously important to keep unauthorized individuals out, but it’s also important that authorized employees don’t venture where they don’t belong. The reason? That’s how bad things… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment