Security Management

The Mill of the Future and Technology Enablers

Lately, there have been numerous technical evolutions related to new metallurgical process, equipment, and software technologies. The idea of this blog is not to tackle such technologies, but try to… Read more »

Leave a comment

The Delicate Balance of Reliability and Safety

Reliability and safety are two paramount components of a data center.  At the same time, there is an inherent conflict between the two. High system reliability and performance is often… Read more »

Leave a comment

Big Data is a really Big Deal in Healthcare… in a number of ways you might not have thought about

HHS Secretary Kathleen Sebelius announced May 28th, 2013 that more than half of all doctors and eligible providers have received Medicare or Medicaid incentive payments for adopting or meaningfully using… Read more »

2 Comments

Preventing Fires in the Data Center

A fire, even a small one, can become a catastrophic event in a data center, which is why facility managers should take the necessary steps to prevent such occurrences. Since… Read more »

Leave a comment

Security lessons learned from Boston’s hospitals

The International Association for Healthcare Security & Safety (IAHSS) gathered in Myrtle Beach, South Carolina on May 4th through May 8th for their 45th Annual General Meeting and Conference with… Read more »

Leave a comment

The best hospitals are safe hospitals

By far, clinical excellence lies at the core of world-class hospitals; however patient safety and hospital reputation also plays an important role, as indicated in U.S. News’ recent ranking of… Read more »

2 Comments

The central control room in 5 basic disciplines

A central control room is the dream of any intensive operation: The desire to have in a single location,  several remote operations and the ability to take business decisions. But… Read more »

2 Comments

How mobility, big data, and social media impact the mining and metals industry

I’ve always liked to write articles about trends and their applications in the heavy / process industries. Most of the time, I’ve focused on trends related to automation, process control,… Read more »

1 Comment

Learn how to Limit Your Risk of a Data Center Fire

You’ll see a fair amount of coverage on this blog and elsewhere about natural disasters that can disrupt power and generally wreak havoc on a data center. But we don’t… Read more »

3 Comments

How can an integrated healthcare infrastructure improve patient safety?

The statistics are staggering: According the World Health Organization, 1 in 10 patients is harmed while receiving care in even the most advanced hospitals. The National Center for Missing and… Read more »

Leave a comment

But Wait, There’s More: Benefits of Cloud-Based Security Solutions

Billy Mays was probably the most famous infomercial star ever, but Ed Valenti — hawker of the Ginsu knife — is said to have coined the phrase: “But wait, there’s… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

ASHE Annual Conference – Pre-Show Gossip

It’s Sunday morning and I’m on my way to the ASHE Annual Conference in Chicago. I don’t love to fly so I’m keeping my mind off my aerial status by… Read more »

Leave a comment

Choking on Data

Ever hear the phrase “Choking on data, starving for information?” I credit my exposure to this phrase during a meeting I had with my new Vice President as a fresh-out-of-college… Read more »

Leave a comment

Where to Start When Addressing Healthcare Facility Data Security Issues

Cyberattacks, whether generated from a single individual or a politically-motivated group, have emerged as a bigger threat to the healthcare industry security in recent years. Tight regulations and the growing… Read more »

Leave a comment

Power System Risk Assessments – A Valuable Tool for Facilities Following FEMA P-1019 Recommendations

In today’s environment where abnormal weather seems to be the new normal, we have seen numerous instances where natural disasters have wreaked havoc on critical facilities in a community. Recent… Read more »

Leave a comment

For Security Systems, 99% Availability May Be No Where Near Good Enough

When you think about the applications that your business needs to be continually available, most likely systems like transaction processing and, these days, even email come to mind. They are… Read more »

Leave a comment

4 Undeniable Benefits of the Cloud – Part 2 of “Moving to the Cloud”

This is the second blog in a series of three on why and how companies are moving their building security management to the cloud. In my last blog, I discussed… Read more »

Leave a comment

IHSSF Weapons Survey – Summary

Given an increase in violence in the hospital setting and continued attention on hospital security programs, the International Healthcare Security and Safety Foundation (IHSSF) recently completed a research project examining… Read more »

Leave a comment

The Endless Debate: Is the Cloud Secure? – Part 1 of “Moving to the Cloud”

This is the first blog in a series of three on why and how companies are moving their building security management to the cloud. I can’t tell you how many… Read more »

Leave a comment

IHSSF Weapons Survey – Summary

Given an increase in violence in the hospital setting and continued attention on hospital security programs, the International Healthcare Security and Safety Foundation (IHSSF) recently completed a research project examining… Read more »

Leave a comment

Cyber Security for Pipeline Management Solutions in the Digital Era

Safety and reliability of Pipeline Management Systems are paramount and have to be the top priority of all hours, every day. However, as the Oil and Gas sector develops with… Read more »

Leave a comment

Secure Power Solutions Must Be Adaptable to Specific Industry Needs

Ensuring reliable power for mission-critical applications in industry isn’t as simple as offering a range of standard power protection products, even if they are very good products. For many Secure… Read more »

Leave a comment

Hospital Fitness at the 2014 ASHE Annual Conference

Every year, the ASHE Annual Conference is “the event” for healthcare engineers to learn, network, and scope out new products and solutions that might benefit their hospitals. This year is… Read more »

Leave a comment

The IoT and Why DCIM Applications Could and Should be Gamified

You might remember that I blogged recently about a workshop we ran at our Kolding Solutions Center (see “24 Hours Putting the Internet of Things Under the Microscope”) to promote… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

Taking a Holistic Approach to Cyber Security for Pipeline Management Systems

As explained in my previous post about Cyber Security for pipeline management solutions,  security measures should always span an entire organization to be fully effective. OT, IT and physical assets… Read more »

Leave a comment

Prefabricated Modular Data Centers – Sorting through the terminology confusion

There’s not a shortage of terms to go around when it comes to talking about prefabricated data centers.  Terms like containerized, modular, self-contained, portable, pods, skids, and mobile, to name… Read more »

Leave a comment

Minimize Downtime Through Effective Backups

Modern organizations put more and more emphasis on using computer solutions for day-to-day problems. Whether it is payroll, operating door controllers, or controlling turbine assemblies, all these systems rely on… Read more »

Leave a comment

Industrial cyber security: standards progress, but vulnerability remains

When most people think of cyber security risks, they think of credit card data being stolen by breaches of corporate networks and data centers, but there is an entire other… Read more »

Leave a comment