Understanding Cybersecurity in Smart Buildings

Credit to Author: Ram Venkat| Date: Thu, 30 May 2019 16:00:54 +0000

When we think about Smart Buildings, we immediately think about their advantages. We think of the efficiencies such connected building technology offers developers, building managers and tenants. Whether it’s about… Read more »

The post Understanding Cybersecurity in Smart Buildings appeared first on Schneider Electric Blog.

Read more

Real Estate:  How to Manage Cybersecurity Risk in Smart Buildings

Credit to Author: Annick Villeneuve| Date: Tue, 07 May 2019 20:34:08 +0000

Cybersecurity in smart buildings There is no question, smart buildings are becoming more commonplace in today’s real estate portfolios, and cybersecurity is a critical consideration.  In an in-depth, 2 part… Read more »

The post Real Estate:  How to Manage Cybersecurity Risk in Smart Buildings appeared first on Schneider Electric Blog.

Read more

Demystifying Cloud Cybersecurity – An Edge Infrastructure Operator Perspective

Credit to Author: Kim Povlsen| Date: Thu, 04 Apr 2019 16:45:04 +0000

As if their jobs were not challenging enough already, data center teams are being faced with a new test — protecting edge computing infrastructure from cyberattacks. Why is this happening?… Read more »

The post Demystifying Cloud Cybersecurity – An Edge Infrastructure Operator Perspective appeared first on Schneider Electric Blog.

Read more

Harnessing the power of collaboration to advance the digital transformation of industry

Credit to Author: Jean-Pascal Tricoire| Date: Mon, 01 Apr 2019 10:25:41 +0000

Industrial markets are experiencing rapid change brought on by accelerated digitization and new technologies such as IoT, data analysis, and artificial intelligence (AI). Traditional industry boundaries are blurring at speed…. Read more »

The post Harnessing the power of collaboration to advance the digital transformation of industry appeared first on Schneider Electric Blog.

Read more

What Is Access Control? A Key Component Of Data Security

Credit to Author: Atin Chhabra| Date: Wed, 27 Mar 2019 13:27:49 +0000

Who should be able to access a company’s data? Under what circumstances do organisations deny access to a user with access privileges? To adequately protect data, an organisation’s access control… Read more »

The post What Is Access Control? A Key Component Of Data Security appeared first on Schneider Electric Blog.

Read more

The Familial Relationship Between Cybersecurity and Safety

Credit to Author: Jay Abdallah| Date: Mon, 25 Mar 2019 15:14:09 +0000

For many of us, our older siblings are our earliest mentors.  That’s because they frequently pass – directly or indirectly – their life lessons down to us. We benefit because,… Read more »

The post The Familial Relationship Between Cybersecurity and Safety appeared first on Schneider Electric Blog.

Read more

3 lessons from IT security for industrial cybersecurity

Credit to Author: Cyril Perducat| Date: Mon, 25 Mar 2019 13:00:10 +0000

The benefits of industrial IoT are clear: improved productivity and energy efficiency at the same time. IIoT integration enables industrial companies to achieve greater efficiency even in the face of… Read more »

The post 3 lessons from IT security for industrial cybersecurity appeared first on Schneider Electric Blog.

Read more

Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late

Credit to Author: Steven Carlini| Date: Wed, 16 Jan 2019 16:00:00 +0000

It’s been well publicized that Microsoft fends off more than 7 trillion cyberthreats per day, and allocates over $1 billion each year to cybersecurity for its cloud data centers. While… Read more »

The post Ways to Improve Your Data Center Cybersecurity That Most People Don’t Think of Until It’s Too Late appeared first on Schneider Electric Blog.

Read more

Balancing Act: Regulation and Incentives in Cybersecurity

Credit to Author: Andrew Kling| Date: Fri, 14 Dec 2018 15:00:07 +0000

Cybersecurity Blog Series: Part 2 How do regulation and legislation impact global cybersecurity practices? What about incentives? In part one of this series, I discussed the importance of standards in… Read more »

The post Balancing Act: Regulation and Incentives in Cybersecurity appeared first on Schneider Electric Blog.

Read more

3 points of CISO advice for strengthening a cybersecurity ecosystem

Credit to Author: Christophe Blassiau| Date: Wed, 12 Dec 2018 02:40:13 +0000

A PwC study last year revealed that about 62% of global CEOs worry that cyber threats will affect their company’s growth prospects.[i] As a result, it is not surprising that… Read more »

The post 3 points of CISO advice for strengthening a cybersecurity ecosystem appeared first on Schneider Electric Blog.

Read more

Scrutinizing your cybersecurity strategy through a digital risk lens

Credit to Author: Hervé Coureil| Date: Thu, 29 Nov 2018 11:42:38 +0000

The Symantec 2018 Internet Security Threat Report[i] mentions a 600% increase in overall IoT attacks in 2017. It’s clear: cyber threats and incidents are a major operational risk every enterprise… Read more »

The post Scrutinizing your cybersecurity strategy through a digital risk lens appeared first on Schneider Electric Blog.

Read more