Security Management

IHSSF Weapons Survey – Summary

Given an increase in violence in the hospital setting and continued attention on hospital security programs, the International Healthcare Security and Safety Foundation (IHSSF) recently completed a research project examining… Read more »

Leave a comment

Can physical environment big data make a big difference in your hospital?

Today’s healthcare facility managers face a myriad of challenges. As budgets and headcount shrinks, they are being asked to do more with less. This includes addressing variable operating expenses, managing… Read more »

2 Comments

Cyber Security – Critical Need of the Times

Cyber security is not just a new buzzword in the present age of digitization. It is a necessity going neck and neck with the pace of information revolution. Digital connectivity has… Read more »

Leave a comment

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

The Next Age: The 20,000 Ft. View from the Schneider Influencer Summit

In today’s world, it’s easy to focus on the immediate challenges we see before us. Troubles in the Middle East. Tensions rising in Eastern Europe. Viruses we thought we had… Read more »

1 Comment

How can utilities protect themselves against cyber attacks?

The energy industry is attracting the attention of hackers looking to cause widespread disruption. This should worry all of us, as the energy that utilities provide serves as the lifeblood… Read more »

1 Comment

For Security Systems, 99% Availability May Be No Where Near Good Enough

When you think about the applications that your business needs to be continually available, most likely systems like transaction processing and, these days, even email come to mind. They are… Read more »

Leave a comment

2014 ASHE Annual Conference Recap

Last week’s ASHE Annual Conference hit a new high. The presentations were well-attended and provided attendees with food for thought on everything from hospital emergency power to sustainability to progressing… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment

LV installation systems: access rules

In our previous post we saw that an LV Functional Panel doesn’t have just electrical Distribution functions (which are its raison d’être), but also some functions related to its Installation… Read more »

2 Comments

How mobility, big data, and social media impact the mining and metals industry

I’ve always liked to write articles about trends and their applications in the heavy / process industries. Most of the time, I’ve focused on trends related to automation, process control,… Read more »

1 Comment

Preventing Fires in the Data Center

A fire, even a small one, can become a catastrophic event in a data center, which is why facility managers should take the necessary steps to prevent such occurrences. Since… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

Can physical environment big data make a big difference in your hospital?

Today’s healthcare facility managers face a myriad of challenges. As budgets and headcount shrinks, they are being asked to do more with less. This includes addressing variable operating expenses, managing… Read more »

2 Comments

Who Sets Security Standards for the IoT?

As manufacturers across the planet are rushing to ensure that all upcoming products have their Internet of Things (IoT) label while standards are yet to emerge, it is the right time… Read more »

Leave a comment

Software Licensing: The Top Benefits of the Concurrent License Model

Software licensing agreements can be a daunting task for an enterprise. Using a multi-plant organization as an example, I plan to go over the benefits of the concurrent licensing over… Read more »

Leave a comment

LV installation systems: internal organisation (1/2)

Let’s go one step forward on our way to choose a Low Voltage Electrical Distribution (LV ED) panel for our small or medium size building. Until now we concentrated on… Read more »

Leave a comment

LV installation systems: internal organisation (2/2)

As promised in our previous article, it is time now to make a focus on Wall-Mounted panels. Wall-Mounted (WM) Panels We have to take in consideration the following elements which… Read more »

2 Comments

The New IIoT Security Framework: Some Guiding Principles

September 2016 marked an important milestone in the purposeful development and intelligent evolution of the Industrial Internet of Things (IIoT), namely the publication of the Industrial Internet Consortium’s new security… Read more »

Leave a comment

Mining Volatility – Bucking the Trends

Mining is a capital-intensive activity in a world marked by high volatility of commodity markets. On top of that, it faces the double whammy of demand slowdown and increasing operational… Read more »

Leave a comment

Trifork’s Five Step Approach for Successful Application Development in the IoT Age

If you follow this blog, you might have seen that I was recently involved in running a 24-hour workshop to get to grips with that thing we call the Internet… Read more »

Leave a comment

Security lessons learned from Boston’s hospitals

The International Association for Healthcare Security & Safety (IAHSS) gathered in Myrtle Beach, South Carolina on May 4th through May 8th for their 45th Annual General Meeting and Conference with… Read more »

Leave a comment

A new security precedent fit for a president

A few days ago Omar Gonzalez managed to scale the 8-foot perimeter fence that surrounds 1600 Pennsylvania Avenue. For those of you who might not recognize that address – that… Read more »

Leave a comment

Mobile Notifications Simplify Multi-Site Security Management

Facility managers and security operations staff are often bombarded with calls for from multiple tenants, across several sites, but traditionally they had no insight or control on the spot.  Now… Read more »

Leave a comment

Business Process Management for Transportation Operations: Part 2

This is Part 2 of a two-part blog on the application of business process management (BPM) for transportation operations for the Smart City.  In Part 1, we identified the transportation… Read more »

Leave a comment

Healthcare Events Focus on Improving Patient Care through Technology

This year, a common theme is emerging from all the Healthcare events and conferences I have attended – technology as an integral part of the changing medical landscape and its… Read more »

Leave a comment

Preventing Fires in the Data Center

A fire, even a small one, can become a catastrophic event in a data center, which is why facility managers should take the necessary steps to prevent such occurrences. Since… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment