Articles Tagged: cybersecurity

Building Cybersecurity Knowledge Is Critical First Step to Secure Industrial Networks

Cybersecurity is a critical topic for industrial control systems that will continue to accelerate in importance over the coming years.  Personnel working with industrial control systems everywhere in the world… Read more »

Leave a comment

Industrial Technology Architectures are Changing and Unleashing the Benefits of IIoT

Industrial organizations are looking to deploy power, automation and control solutions faster and more efficiently than ever before. The need to stay competitive by lowering costs while increasing production has… Read more »

Leave a comment

The Cybersecurity Business Case: An Arduous Challenge – Part 2

In Part 1 of my previous blog, “The Cybersecurity Business Case – An Arduous Challenge”, I talked about the 3 key elements of a typical business case and the creation… Read more »

Leave a comment

The Cybersecurity Business Case: An Arduous Challenge – Part 1

The need for secure control systems is a growing priority for industrial applications.  Recent high profile cyber-attacks against critical infrastructure, coupled with the growing list of published equipment vulnerabilities, and… Read more »

1 Comment

Cloud Security Software Increasingly Adopted Across Industries

The variety of cloud software and platforms has exploded in recent years thanks to features such as scalability, flexibility, on-demand services, and cost-effectiveness. From email, human resources, IT security and… Read more »

1 Comment

Use the Right Software to Get Comfortable

As noted in the previous post in this series, a building energy management system, a BEMS, can increase productivity and comfort. That’s not surprising if you think about it because… Read more »

Leave a comment

Cybersecurity Risk Management and Your Bottom Line

Cybersecurity Risk Management – A Blog Series: Part 1 In 2013 then US President Obama directed NIST to develop a framework that would become an authoritative source for cybersecurity best… Read more »

Leave a comment

A Tale of Two T’s

Carric Dooley has extensive experience leading comprehensive security assessments as well as network and application penetration tests in a wide range of industries across North America, Europe and Asia. As… Read more »

1 Comment

Driving Innovation at Every Level with IoT

In my previous blog post, I discussed the four pillars of opportunity for IoT and the potential that IoT has for creating greater value over time through ongoing innovation. Three… Read more »

Leave a comment

What to Consider When Starting Your IIoT Journey?

Keith Blodorn is a Director of Program Management at ProSoft Technology, specializing in IIoT and wireless communication solutions. He has worked in the Industrial Automation industry for more than 20… Read more »

Leave a comment

Substation Cyber Security: How Vulnerabilities Create Asset Management Challenges

When cyber threats were less of an issue than they are today, the relationship between a utility and a vendor was based on discussions about bugs that could be found… Read more »

Leave a comment

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

How safe are your building operations from cyber attacks?

Although estimates vary, businesses worldwide lose billions each year to cyber crime, according to a report by McAfee and the Center for Strategic and International Studies. The modern building management… Read more »

Leave a comment

Toward Better Configuration Management for Substation Cybersecurity

Within a substation context, there are multiple types of configuration. One type is specific to a device, such as the number of boards and the configuration of each board. This… Read more »

Leave a comment

What’s Driving Innovation in the HVAC Market?

Like many other markets, digitalization, mobilization and cloud technologies are driving innovation in the HVAC software and applications market. These three trends are impacting both the organization as a whole… Read more »

2 Comments

Why You Need to Apply Network Security Best Practices to Your BMS

As building management systems (BMSs) become more intelligent, collecting information from hundreds if not thousands of devices distributed throughout a building or campus, they are also becoming more susceptible to… Read more »

Leave a comment

Building Management Software and IoT

As I said in my first post, the Internet of Things (aka the IoT) is getting attention because billions of devices and trillions of dollars are at stake. As a… Read more »

Leave a comment

Finance Execs: 3 Cyber Security Tips for Staying Out of the Headlines

Breaking News: “Bank accounts hacked! Identities stolen. Critical assets damaged.” 3 Cyber security tips for staying out of the headlines By some estimates Banks and other Financial Services companies are… Read more »

2 Comments

What is the impact of Industry 4.0 for system integration engineers?

The Industry 4.0 report outlines how many jobs and tasks will change as a result of smart plant deployments and the convergence of IT and OT. For system integration engineers… Read more »

Leave a comment

Secure Your BMS: Follow These Password Best Practices

In my last post I explained why, as building management systems (BMSs) become more intelligent and connected, it’s incumbent on facilities managers to ensure they are properly secured. Because the… Read more »

2 Comments

Secure Your BMS: Follow These Password Best Practices

In my last post I explained why, as building management systems (BMSs) become more intelligent and connected, it’s incumbent on facilities managers to ensure they are properly secured. Because the… Read more »

2 Comments

Software Vulnerability Best Practices to Protect Your BMS from Security Threats

As building management systems grow more intelligent and increasingly connect to the Internet to share data, they can also be the target of cybersecurity threats. In this fourth and final… Read more »

2 Comments

Monitoring Your Networks

Today’s complex network systems have become the foundation of business.  A network’s reliability and performance are essential.  With so many interrelated devices and applications running simultaneously, system event diagnosis can… Read more »

2 Comments

4 Steps Toward Substation Cybersecurity

When it comes to utility substation automation, how do you put basic cybersecurity concepts into practice? Concepts like availability, integrity, confidentiality (AIC), or authorization, authentication, and auditability (AAA) need the… Read more »

2 Comments

Finance Execs: 3 Cyber Security Tips for Staying Out of the Headlines

Breaking News: “Bank accounts hacked! Identities stolen. Critical assets damaged.” 3 Cyber security tips for staying out of the headlines By some estimates Banks and other Financial Services companies are… Read more »

2 Comments

What’s Driving Innovation in the HVAC Market?

Like many other markets, digitalization, mobilization and cloud technologies are driving innovation in the HVAC software and applications market. These three trends are impacting both the organization as a whole… Read more »

2 Comments

Cloud Security Software Increasingly Adopted Across Industries

The variety of cloud software and platforms has exploded in recent years thanks to features such as scalability, flexibility, on-demand services, and cost-effectiveness. From email, human resources, IT security and… Read more »

1 Comment

Cyber Security risks to buildings: What should you really be worried about

The threat of cyber attacks against Building Management Systems (BMS) is a growing concern both inside and outside of the buildings industry. One recent event, the much publicized attack against… Read more »

1 Comment

The Cybersecurity Business Case: An Arduous Challenge – Part 1

The need for secure control systems is a growing priority for industrial applications.  Recent high profile cyber-attacks against critical infrastructure, coupled with the growing list of published equipment vulnerabilities, and… Read more »

1 Comment

A Tale of Two T’s

Carric Dooley has extensive experience leading comprehensive security assessments as well as network and application penetration tests in a wide range of industries across North America, Europe and Asia. As… Read more »

1 Comment