Cyber Security

Choking on Data

Ever hear the phrase “Choking on data, starving for information?” I credit my exposure to this phrase during a meeting I had with my new Vice President as a fresh-out-of-college… Read more »

Leave a comment

Why You Need to Apply Network Security Best Practices to Your BMS

As building management systems (BMSs) become more intelligent, collecting information from hundreds if not thousands of devices distributed throughout a building or campus, they are also becoming more susceptible to… Read more »

Leave a comment

3 SCADA considerations to optimize your industrial operation

Today’s business climate is putting plants under intense financial pressure, and operations and maintenance budgets are among the first to be cut. Fewer personnel are expected to operate and maintain… Read more »

4 Comments

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Electrical Grid Security is Serious Business

As we move further into the 21st century it’s difficult to imagine electrical installations that won’t be, in one way or another, connected. The Internet of Things is here and… Read more »

1 Comment

Transporting Data Securely

Transporting Data Securely In our January 2013 newsletter, Stephen Santee gave some excellent guidance in setting up a Mobile Media program. This was followed up in February 2013 with Carrie… Read more »

Leave a comment

Why Industrial Ethernet and how exactly?

“Why Ethernet?” That was a question posed to me during a recent meeting with a plant manager. He said, “I have been using serial Fieldbuses for many years, but now… Read more »

3 Comments

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

Is it safe? Cybersecurity and Automation of the Data Center

I always enjoyed Eddie Izzard’s assertion that people writing software would deliberately leave a “back door” into their programs, just in case they needed to get back in later. Providing… Read more »

1 Comment

Regulatory compliance drives – and complicates – government rack access strategies

Regulatory compliance remains the most common top priority for federal IT decision makers when it comes to securing equipment racks in data centers. Almost always part of an overall physical… Read more »

Leave a comment

Why Cybersecurity Matters in Food & Beverage?

May 2017, the world faced one of the most serious cyber-attacks. The Ransomware Wannacry put at risk 200,000 companies spread over 150 countries. Immediately after, every company, including those in… Read more »

Leave a comment

Securing Power and Control: Solutions

As stated in my previous post, the threat of cyber-attacks on power and control systems is growing.  One factor is the wider proliferation of attack tools and techniques.  Aging power… Read more »

Leave a comment

Bringing Innovation to Every Level of the Oil & Gas Sector

As I explained in my previous blog Revolutionizing the Oil & Gas industry with the IIoT, IIoT is having a noticeable impact on all Oil & Gas processes. By utilizing… Read more »

Leave a comment

Lessons in Cyber Security for Oil Pipelines

Pipeline security is an increasingly complex issue. Big Data and the Internet of Things offer new opportunities for accuracy and efficiency. These, paired with converging infrastructure and multiservice use cases,… Read more »

1 Comment

Uncovering Cybersecurity and the IIoT in Oil & Gas Business

The Industrial Internet of Things (IIoT) is rapidly reshaping the Oil & Gas sector. Executives are investing heavily in new solutions to overcome the challenges companies face, including falling oil… Read more »

1 Comment

Cyber Security risks to buildings: What should you really be worried about

The threat of cyber attacks against Building Management Systems (BMS) is a growing concern both inside and outside of the buildings industry. One recent event, the much publicized attack against… Read more »

1 Comment

How to Provide Physical Security for Your Most Critical Resources

In mission-critical facilities, it’s obviously important to keep unauthorized individuals out, but it’s also important that authorized employees don’t venture where they don’t belong. The reason? That’s how bad things… Read more »

Leave a comment

Keeping the Holes Plugged

One of our team’s most common quotes is “Cyber security is so much more than firewalls and anti-virus software.” All successful security solutions are part of an overall program that… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

Keeping the Holes Plugged

One of our team’s most common quotes is “Cyber security is so much more than firewalls and anti-virus software.” All successful security solutions are part of an overall program that… Read more »

Leave a comment

A Data Center Architecture Hack, Inspired by and Encompassing the Open Compute Project

When I first heard the term “hacking” from folks at the Open Compute Project (OCP), I was a little confused – what does that mean, “hacking”? Is it some play… Read more »

Leave a comment

Securing Power and Control: Solutions

As stated in my previous post, the threat of cyber-attacks on power and control systems is growing.  One factor is the wider proliferation of attack tools and techniques.  Aging power… Read more »

Leave a comment

4 Undeniable Benefits of the Cloud – Part 2 of “Moving to the Cloud”

4 Undeniable Benefits of the Cloud – Part 2 of “Moving to the Cloud This is the second blog in a series of three on why and how companies are… Read more »

Leave a comment

Top Reasons to Consider Mobility in your Industrial Operation

In recent years, dramatic changes in the global manufacturing plant landscape have compelled organizations to respond to a new set of challenges, including: An increasing number of casual users requiring… Read more »

Leave a comment

It’s Time to Give IOT and Edge Infrastructure the Same Protection IT Resources Get

At the recent Smart Industry 2016 event in Chicago, a colleague told a story that encapsulates some of the challenges I’ve been thinking about with respect to the Internet of… Read more »

Leave a comment

Schneider Electric DCIM An Undisputed Leader on Gartner Magic Quadrant, Again.

“There is only one thing in life worse than being talked about,” opined the great Irish poet and playwright, Oscar Wilde, “and that is not being talked about.” For Schneider… Read more »

Leave a comment

Managing Data Privacy and Cyber Security with StruxureOn

In my recent blogs I’ve taken the opportunity to write about the features and benefits of StruxureOn – our new cloud-based service for data center monitoring. This new introduction proactively… Read more »

Leave a comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment