One year after Triton: Building ongoing, industry-wide cyber resilience

Credit to Author: Andrew Kling| Date: Wed, 08 Aug 2018 00:03:12 +0000

Cybersecurity Blog Series:  Part 1 One year ago cybersecurity experts discovered the world’s first known cyberattack on a safety instrumented system. Some called it Triton. Others named it TRISIS. Still… Read more »

The post One year after Triton: Building ongoing, industry-wide cyber resilience appeared first on Schneider Electric Blog.

Read more

Technology isn’t the only weapon for effective cybersecurity

Credit to Author: Jay Abdallah| Date: Mon, 14 May 2018 20:32:27 +0000

Technology can serve as a solid tool to ward off cyber attacks, there is no doubt, but what really comes into play is superior knowledge in recommending the proper devices,… Read more »

The post Technology isn’t the only weapon for effective cybersecurity appeared first on Schneider Electric Blog.

Read more

Cyber-nationalism in Cybersecurity Standards

Credit to Author: Daniel Desruisseaux| Date: Mon, 16 Apr 2018 12:00:12 +0000

There are a variety of global standards that have been created to provide guidance to Industrial Control System (ICS) vendors and end users attempting to secure systems.  Examples include ISA/IEC… Read more »

The post Cyber-nationalism in Cybersecurity Standards appeared first on Schneider Electric Blog.

Read more

Making Workers a Strong Security Asset

Credit to Author: Jay Abdallah| Date: Thu, 01 Feb 2018 13:00:19 +0000

People play the most important role in security, there is no doubt, but here are some ways to keep people informed and be a strong part of a company’s security… Read more »

The post Making Workers a Strong Security Asset appeared first on Schneider Electric Blog.

Read more

3 Steps for Countering Oil & Gas Cybersecurity-related Business Continuity Threats

Credit to Author: Philippe Carle| Date: Thu, 09 Nov 2017 18:26:09 +0000

Cyber-attacks cost companies worldwide an estimated $300-400 billion each year in unanticipated downtime and that number is projected to increase sharply. Some large industrial organizations estimate their cost of downtime… Read more »

The post 3 Steps for Countering Oil & Gas Cybersecurity-related Business Continuity Threats appeared first on Schneider Electric Blog.

Read more

Reducing Vulnerability to Cyberattacks

Credit to Author: Daniel Desruisseaux| Date: Mon, 23 Oct 2017 16:00:14 +0000

The need for secure systems is a growing priority for Industry Control System (ICS) operators.  Recent high profile cyber-attacks against critical infrastructure, coupled with the growing list of published equipment vulnerabilities, and… Read more »

The post Reducing Vulnerability to Cyberattacks appeared first on Schneider Electric Blog.

Read more

Partnering with specialists to help protect the world’s critical infrastructure from cyber attacks

Credit to Author: Daniel Desruisseaux| Date: Mon, 07 Aug 2017 15:46:06 +0000

Today in Schneider Electric’s News Release it was  announced that we are partnering with Claroty, an innovator in Operational Technology (OT) network protection, to help to address cybersecurity challenges for the… Read more »

The post Partnering with specialists to help protect the world’s critical infrastructure from cyber attacks appeared first on Schneider Electric Blog.

Read more

Where to Start When Addressing Healthcare Facility Data Security Issues

Credit to Author: Christopher Roberts| Date: Wed, 26 Jul 2017 15:09:46 +0000

Cyberattacks, whether generated from a single individual or a politically-motivated group, have emerged as a bigger threat to the healthcare industry security in recent years. Tight regulations and the growing… Read more »

The post Where to Start When Addressing Healthcare Facility Data Security Issues appeared first on Schneider Electric Blog.

Read more