Cyber Security

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

Cyber Security for Industry and Infrastructure

For many years the traditional information technology (IT) and operations technology (OT) systems remained distinct domains managed by different corporate resources, but this paradigm is undergoing a radical change as… Read more »

5 Comments

Avoiding cyber attacks: An inside look at industrial security fundamentals

Cyber security incidents are escalating in number and complexity. As industrial processes integrate with outside networks, plants are at risk. For that reason, operations teams need to know about security… Read more »

6 Comments

Beware the Unintended Consequences of Government Regulations around Cyber Security

Some big Internet companies made news recently with the announcement that they are urging President Obama to set limits on government surveillance. While on the face of it this may… Read more »

Leave a comment

Cyber attack – a clear and present danger

As cyber attacks become more high profile and more prevalent, cybersecurity is an increasing concern for industrial automation and control system users and vendors. Cyber attacks happen for any number… Read more »

Leave a comment

What is Smart Grid? Distributech wants to know.

The just concluded Consumer Electronics Show was a massive showcase of cool new ways to use electricity. It is unlikely the attendees and exhibitors thought of it that way, though… Read more »

2 Comments

How to Provide Physical Security for Your Most Critical Resources

In mission-critical facilities, it’s obviously important to keep unauthorized individuals out, but it’s also important that authorized employees don’t venture where they don’t belong. The reason? That’s how bad things… Read more »

Leave a comment

Understanding Firewalls and Their Role in Network Security

Anyone who uses a computer these days has almost certainly come across the term “firewall” and knows it has something to do with providing security. But to fully protect corporate… Read more »

1 Comment

Straight talk on cyber security threats to industrial control systems

Hackers are always gravitating towards the easiest systems to exploit and Industrial Control Systems (ICS) are now among the most popular hacking attack targets. If control systems (like programmable logic… Read more »

Leave a comment

Who Owns the Risk?

Some time ago, my colleague Joseph Reele wrote of the risk implications of various data centre choices that might be made. In that article Reele identified a (possibly simplistic) trade-off… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Choking on Data

Ever hear the phrase “Choking on data, starving for information?” I credit my exposure to this phrase during a meeting I had with my new Vice President as a fresh-out-of-college… Read more »

Leave a comment

Cyber Security update: Dynamic Endpoint Modeling vs. Network Intrusion Detection

As industrial control systems connect to the Internet they allow for greater business efficiency (e.g., remote process monitoring, predictive system maintenance, process control and production data analysis). However, at the… Read more »

Leave a comment

For Operational Technology (OT), Make Cyber Resiliency and Reliability of Operational Process and Assets Your Top Priority

Cyber attacks no longer focus only on stealing credit card numbers from banks. Disruption of core business processes via industrial control systems at manufacturing sites is also on the hacker… Read more »

Leave a comment

Cybersecurity Risk Management and Your Preparedness

Cybersecurity Risk Management – Blog Series Part 3 The single biggest threat to cybersecurity – misunderstanding the risks Common cybersecurity misunderstanding number one – Many businesses think the cybersecurity problem… Read more »

Leave a comment

The Cybersecurity Business Case: An Arduous Challenge – Part 2

In Part 1 of my previous blog, “The Cybersecurity Business Case – An Arduous Challenge”, I talked about the 3 key elements of a typical business case and the creation… Read more »

Leave a comment

Cloud Security Software Increasingly Adopted Across Industries

The variety of cloud software and platforms has exploded in recent years thanks to features such as scalability, flexibility, on-demand services, and cost-effectiveness. From email, human resources, IT security and… Read more »

1 Comment

The Endless Debate: Is the Cloud Secure? – Part 1 of “Moving to the Cloud”

This is the first blog in a series of three on why and how companies are moving their building security management to the cloud. I can’t tell you how many… Read more »

Leave a comment

8 Issues Driving Transformation at Distribution Utilities

What’s propelling distribution utilities to digitize, decarbonize, and decentralize their business? For an overview of the situation, let’s look at eight crucial change drivers. Decentralization One of the biggest game… Read more »

Leave a comment

Cyber Security Return on Investment

In today’s business environment, implementation of a cyber security program is a necessity. Many people correlate cyber security with an insurance policy, which is incorrect. Implementing a cyber security program… Read more »

Leave a comment

Trust, but Verify…Secure Remote Monitoring for Your Data Center

Modern digital remote monitoring platforms offer a lot of promise today….reduced downtime, reduced mean time to recovery (MTTR), less operations overhead, as well as improved efficiency for power and cooling… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

Cyber Security: The Cornerstone of IIoT Adoption

Over the past decade or more the need for cyber security in industrial automation and control systems has been accelerating at an ever increasing rate. Adoption of the benefits of… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Transporting Data Securely

Transporting Data Securely In our January 2013 newsletter, Stephen Santee gave some excellent guidance in setting up a Mobile Media program. This was followed up in February 2013 with Carrie… Read more »

Leave a comment

Cyber Security and Data Privacy – Avoiding the Element of Surprise

  Here’s an interesting snippet for you, purely anecdotal. As we do our groundwork about future product developments, especially where cloud or anything-as-a-service is concerned, the top of mind issues… Read more »

Leave a comment

Why Controlling Rack Access is a Vital Part of Securing Data Against Cyber Crime

It is the nature of everything connected that it also bears the risk of misuse – whether malicious or accidental. It seems to me that overall, companies have taken great… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment