Cyber Security

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

Cyber Security for Industry and Infrastructure

For many years the traditional information technology (IT) and operations technology (OT) systems remained distinct domains managed by different corporate resources, but this paradigm is undergoing a radical change as… Read more »

5 Comments

Avoiding cyber attacks: An inside look at industrial security fundamentals

Cyber security incidents are escalating in number and complexity. As industrial processes integrate with outside networks, plants are at risk. For that reason, operations teams need to know about security… Read more »

5 Comments

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

Cyber attack – a clear and present danger

As cyber attacks become more high profile and more prevalent, cybersecurity is an increasing concern for industrial automation and control system users and vendors. Cyber attacks happen for any number… Read more »

Leave a comment

What is Smart Grid? Distributech wants to know.

The just concluded Consumer Electronics Show was a massive showcase of cool new ways to use electricity. It is unlikely the attendees and exhibitors thought of it that way, though… Read more »

2 Comments

How to Provide Physical Security for Your Most Critical Resources

In mission-critical facilities, it’s obviously important to keep unauthorized individuals out, but it’s also important that authorized employees don’t venture where they don’t belong. The reason? That’s how bad things… Read more »

Leave a comment

Understanding Firewalls and Their Role in Network Security

Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate… Read more »

1 Comment

Cybersecurity Risk Management and Your Bottom Line

Cybersecurity Risk Management – A Blog Series: Part 1 In 2013 then US President Obama directed NIST to develop a framework that would become an authoritative source for cybersecurity best… Read more »

Leave a comment

Bringing Innovation to Every Level of the Oil & Gas Sector

As I explained in my previous blog Revolutionizing the Oil & Gas industry with the IIoT, IIoT is having a noticeable impact on all Oil & Gas processes. By utilizing… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Cybersecurity Risk Management in Your Supply Chain

Cybersecurity Risk Management – Blog Series Part 2 Innovative technology and new products mean nothing without cybersecurity protections The constant influx of news stories about hacking and internet security issues… Read more »

2 Comments

For Operational Technology (OT), Make Cyber Resiliency and Reliability of Operational Process and Assets Your Top Priority

Cyber attacks no longer focus only on stealing credit card numbers from banks. Disruption of core business processes via industrial control systems at manufacturing sites is also on the hacker… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Lessons in Cyber Security for Oil Pipelines

Pipeline security is an increasingly complex issue. Big Data and the Internet of Things offer new opportunities for accuracy and efficiency. These, paired with converging infrastructure and multiservice use cases,… Read more »

1 Comment

Uncovering Cybersecurity and the IIoT in Oil & Gas Business

The Industrial Internet of Things (IIoT) is rapidly reshaping the Oil & Gas sector. Executives are investing heavily in new solutions to overcome the challenges companies face, including falling oil… Read more »

1 Comment

Cybersecurity Risk Management and Your Preparedness

Cybersecurity Risk Management – Blog Series Part 3 The single biggest threat to cybersecurity – misunderstanding the risks Common cybersecurity misunderstanding number one – Many businesses think the cybersecurity problem… Read more »

Leave a comment

Don’t Let an Aging UPS Bring You Down: Assess Your Replacement Options

An uninterruptible power supply (UPS) is something like an airplane in that it must work all the time; if it fails some pretty awful things can happen. What’s more, if… Read more »

2 Comments

Securing Power and Control: Solutions

As stated in my previous post, the threat of cyber-attacks on power and control systems is growing.  One factor is the wider proliferation of attack tools and techniques.  Aging power… Read more »

Leave a comment

Schneider Electric DCIM An Undisputed Leader on Gartner Magic Quadrant, Again.

“There is only one thing in life worse than being talked about,” opined the great Irish poet and playwright, Oscar Wilde, “and that is not being talked about.” For Schneider… Read more »

Leave a comment

It’s Time to Give IOT and Edge Infrastructure the Same Protection IT Resources Get

At the recent Smart Industry 2016 event in Chicago, a colleague told a story that encapsulates some of the challenges I’ve been thinking about with respect to the Internet of… Read more »

Leave a comment

The Importance of SQL Server Hardening

Server hardening is one of the most important tasks to be done on your servers, once you understand just how vulnerable servers are “out of the box.” The default configuration… Read more »

Leave a comment

Is Your Building IoT Ready?

Have you heard this one before? According to Gartner Research, there will be 20.8 billion connected objects by 2020. That’s more things than people on earth. Why does nearly every… Read more »

Leave a comment

Is Mass Behavior the Best Evolutionary Response to Improve Data Center Security?

In a recent editorial, Peter Judge, the global editor of DatacenterDynamics, posed the question can management quell the embedded threat. The story led from an observation made by Ed Ansett… Read more »

Leave a comment

Is securing a plant simply becoming too complex?

Being one of the most established control system companies has its advantages when watching the cybersecurity landscape evolve. Our technology has powered and protected some of the biggest and most… Read more »

Leave a comment

Top 5 Recommendations for Securing the Data Center Against Cyber Attacks

As I’ve mentioned in recent blog posts, my conversations with end-users about DCIM have included as much discussion about the company’s approach to ensuring customer’s security as they have about… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Why You Need a Power Failure Response Strategy

Our world has become highly reliant upon the availability of continuous power. As a result, almost every company needs to have a power failure response strategy in place. Very few… Read more »

Leave a comment