Demystifying Cloud Cybersecurity – An Edge Infrastructure Operator Perspective

Credit to Author: Kim Povlsen| Date: Thu, 04 Apr 2019 16:45:04 +0000

As if their jobs were not challenging enough already, data center teams are being faced with a new test — protecting edge computing infrastructure from cyberattacks. Why is this happening?… Read more »

The post Demystifying Cloud Cybersecurity – An Edge Infrastructure Operator Perspective appeared first on Schneider Electric Blog.

Read more

Harnessing the power of collaboration to advance the digital transformation of industry

Credit to Author: Jean-Pascal Tricoire| Date: Mon, 01 Apr 2019 10:25:41 +0000

Industrial markets are experiencing rapid change brought on by accelerated digitization and new technologies such as IoT, data analysis, and artificial intelligence (AI). Traditional industry boundaries are blurring at speed…. Read more »

The post Harnessing the power of collaboration to advance the digital transformation of industry appeared first on Schneider Electric Blog.

Read more

What Is Access Control? A Key Component Of Data Security

Credit to Author: Atin Chhabra| Date: Wed, 27 Mar 2019 13:27:49 +0000

Who should be able to access a company’s data? Under what circumstances do organisations deny access to a user with access privileges? To adequately protect data, an organisation’s access control… Read more »

The post What Is Access Control? A Key Component Of Data Security appeared first on Schneider Electric Blog.

Read more

The Familial Relationship Between Cybersecurity and Safety

Credit to Author: Jay Abdallah| Date: Mon, 25 Mar 2019 15:14:09 +0000

For many of us, our older siblings are our earliest mentors.  That’s because they frequently pass – directly or indirectly – their life lessons down to us. We benefit because,… Read more »

The post The Familial Relationship Between Cybersecurity and Safety appeared first on Schneider Electric Blog.

Read more

3 lessons from IT security for industrial cybersecurity

Credit to Author: Cyril Perducat| Date: Mon, 25 Mar 2019 13:00:10 +0000

The benefits of industrial IoT are clear: improved productivity and energy efficiency at the same time. IIoT integration enables industrial companies to achieve greater efficiency even in the face of… Read more »

The post 3 lessons from IT security for industrial cybersecurity appeared first on Schneider Electric Blog.

Read more

Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late

Credit to Author: Steven Carlini| Date: Wed, 16 Jan 2019 16:00:00 +0000

It’s been well publicized that Microsoft fends off more than 7 trillion cyberthreats per day, and allocates over $1 billion each year to cybersecurity for its cloud data centers. While… Read more »

The post Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late appeared first on Schneider Electric Blog.

Read more

Balancing Act: Regulation and Incentives in Cybersecurity

Credit to Author: Andrew Kling| Date: Fri, 14 Dec 2018 15:00:07 +0000

Cybersecurity Blog Series: Part 2 How do regulation and legislation impact global cybersecurity practices? What about incentives? In part one of this series, I discussed the importance of standards in… Read more »

The post Balancing Act: Regulation and Incentives in Cybersecurity appeared first on Schneider Electric Blog.

Read more

3 points of CISO advice for strengthening a cybersecurity ecosystem

Credit to Author: Christophe Blassiau| Date: Wed, 12 Dec 2018 02:40:13 +0000

A PwC study last year revealed that about 62% of global CEOs worry that cyber threats will affect their company’s growth prospects.[i] As a result, it is not surprising that… Read more »

The post 3 points of CISO advice for strengthening a cybersecurity ecosystem appeared first on Schneider Electric Blog.

Read more

Scrutinizing your cybersecurity strategy through a digital risk lens

Credit to Author: Hervé Coureil| Date: Thu, 29 Nov 2018 11:42:38 +0000

The Symantec 2018 Internet Security Threat Report[i] mentions a 600% increase in overall IoT attacks in 2017. It’s clear: cyber threats and incidents are a major operational risk every enterprise… Read more »

The post Scrutinizing your cybersecurity strategy through a digital risk lens appeared first on Schneider Electric Blog.

Read more

How to promote cyber security inside your company

Credit to Author: Roger Casellas| Date: Mon, 19 Nov 2018 11:55:54 +0000

As business are digitizing, companies get more and more vulnerable in front of cyberattacks. The numbers are impressive: in 2025 is expected to be 75 billion connected devices. Considering that… Read more »

The post How to promote cyber security inside your company appeared first on Schneider Electric Blog.

Read more

How to Create a Security Culture

Credit to Author: Jay Abdallah| Date: Mon, 22 Oct 2018 21:22:48 +0000

With ever increasing media coverage of cybersecurity attacks, the awareness of cybersecurity is expanding. This important subject is something everyone is talking about in manufacturing facilities across the globe. With… Read more »

The post How to Create a Security Culture appeared first on Schneider Electric Blog.

Read more