Technology isn’t the only weapon for effective cybersecurity

Credit to Author: Jay Abdallah| Date: Mon, 14 May 2018 20:32:27 +0000

Technology can serve as a solid tool to ward off cyber attacks, there is no doubt, but what really comes into play is superior knowledge in recommending the proper devices,… Read more »

The post Technology isn’t the only weapon for effective cybersecurity appeared first on Schneider Electric Blog.

Read more

Why use the same controller to manage process and safety systems?

Credit to Author: John Boville| Date: Fri, 11 May 2018 15:30:55 +0000

Looking back at the evolution of the PLC, we can certainly see leaps and bounds in development since the invention of the Modicon 084 controller in 1968. Fast forward to… Read more »

The post Why use the same controller to manage process and safety systems? appeared first on Schneider Electric Blog.

Read more

Digital Transformation to hit the energy wall

Credit to Author: Vincent Petit| Date: Tue, 17 Apr 2018 20:26:50 +0000

In my last blog post, I discussed the world’s ever-increasing need for energy and how to turn that challenge into an opportunity. Now, let’s explore how that shift will develop. … Read more »

The post Digital Transformation to hit the energy wall appeared first on Schneider Electric Blog.

Read more

Cyber-nationalism in Cybersecurity Standards

Credit to Author: Daniel Desruisseaux| Date: Mon, 16 Apr 2018 12:00:12 +0000

There are a variety of global standards that have been created to provide guidance to Industrial Control System (ICS) vendors and end users attempting to secure systems.  Examples include ISA/IEC… Read more »

The post Cyber-nationalism in Cybersecurity Standards appeared first on Schneider Electric Blog.

Read more

IEC 62443 Security Assurance Levels Explained

Credit to Author: Daniel Desruisseaux| Date: Fri, 30 Mar 2018 19:16:02 +0000

Industrial Control Systems have experienced an exponential increase in cyber-attacks over the last decade.  The industry has responded to cybersecurity threats by creating standards to assist end users and equipment… Read more »

The post IEC 62443 Security Assurance Levels Explained appeared first on Schneider Electric Blog.

Read more

My Journey to Discover “Digital France”

Credit to Author: Shawn Burns| Date: Wed, 28 Mar 2018 17:47:06 +0000

We know digital is transforming the world around us, and in preparation for the upcoming Paris Innovation Summit, I wanted to do something with a French twist. I set out exploring… Read more »

The post My Journey to Discover “Digital France” appeared first on Schneider Electric Blog.

Read more

Strengthen cybersecurity through a united industry

Credit to Author: Jay Abdallah| Date: Fri, 23 Mar 2018 14:30:26 +0000

Every process requires detail, precision and collaboration. If all of the components of the process aren’t working together, it fails. And that can result in catastrophe. As an example, let’s… Read more »

The post Strengthen cybersecurity through a united industry appeared first on Schneider Electric Blog.

Read more

Power management system integrators WANTED for our changing world

Credit to Author: Kevin Morin| Date: Wed, 28 Feb 2018 22:21:40 +0000

Our ever-changing world has big implications for business owners and power management solutions. Energy efficiency and power reliability requirements are growing, while external influences are resulting in a complete restructuring… Read more »

The post Power management system integrators WANTED for our changing world appeared first on Schneider Electric Blog.

Read more

TippingPoint Threat Intelligence and Zero-Day Coverage – Week of February 5, 2018

Credit to Author: Elisa Lippincott (TippingPoint Global Product Marketing)| Date: Fri, 09 Feb 2018 16:55:38 +0000

It was a busy week in the cyber security world, but it shouldn’t be surprising given that the 2018 Winter Olympics in Pyeongchang have begun. I shouldn’t blame just the Olympics, but it’s hard not to given the international focus, controversy around the ban of certain athletes and its proximity to a certain country. So…

Read more

Making Workers a Strong Security Asset

Credit to Author: Jay Abdallah| Date: Thu, 01 Feb 2018 13:00:19 +0000

People play the most important role in security, there is no doubt, but here are some ways to keep people informed and be a strong part of a company’s security… Read more »

The post Making Workers a Strong Security Asset appeared first on Schneider Electric Blog.

Read more

How the IIoT is Delivering on the Promise of Asset Performance Management Part 3

Credit to Author: John Boville| Date: Wed, 10 Jan 2018 15:53:09 +0000

Part 1 of this 4-part series introduced ways in which increasing digitization might improve plant operations. Part 2: we focused on how IIoT can improve the productivity of reactive, preventive,… Read more »

The post How the IIoT is Delivering on the Promise of Asset Performance Management Part 3 appeared first on Schneider Electric Blog.

Read more