Is OT security ready for the next wave of cybercrime?

Credit to Author: Christophe Blassiau| Date: Thu, 16 Jan 2020 13:46:02 +0000

Forrester’s Predictions 2020: The Internet of Things report has an eye-opening forecast on cybercrime for the coming year – an IoT prediction that demands that we collectively consider how to… Read more »

The post Is OT security ready for the next wave of cybercrime? appeared first on Schneider Electric Blog.

Read more

Demystifying Industry 4.0

Credit to Author: Constantine Lau| Date: Tue, 03 Dec 2019 15:56:56 +0000

This blog is co-authored with: Rajesh D. Sharma is Global Marketing Director for the Schneider Electric Oil, Gas and Petrochemicals segment, and is responsible for developing strategy around Integrated Digitized… Read more »

The post Demystifying Industry 4.0 appeared first on Schneider Electric Blog.

Read more

How Does a Rotary Valve Actuator Differ from a Linear Actuator?

Credit to Author: Kavita Manral| Date: Tue, 03 Dec 2019 08:50:23 +0000

Valve Actuators can be classified into two types based on their motion. The two primary types of actuators are commonly referred to as rotary and linear. Rotary actuators turn an… Read more »

The post How Does a Rotary Valve Actuator Differ from a Linear Actuator? appeared first on Schneider Electric Blog.

Read more

Cybersecurity Defense Requires a Strong Offense

Credit to Author: Nathalie Marcotte| Date: Tue, 26 Nov 2019 14:58:46 +0000

Cybersecurity is currently facing a tricky paradox. The number of attacks, and attempted attacks, is rapidly growing but as it stands, companies are struggling to adapt the right approaches in… Read more »

The post Cybersecurity Defense Requires a Strong Offense appeared first on Schneider Electric Blog.

Read more

How to Prevent Edge Computing Security Risks in a Connected World

Credit to Author: Steven Brown| Date: Thu, 31 Oct 2019 15:53:15 +0000

Edge computing sites are cropping up all over, driven in large part by Internet of Things (IoT) technology and digital transformation efforts that are generating enormous amounts of data that… Read more »

The post How to Prevent Edge Computing Security Risks in a Connected World appeared first on Schneider Electric Blog.

Read more

How to Regulate IoT Cybersecurity

Credit to Author: Trevor Rudolph| Date: Tue, 22 Oct 2019 18:19:51 +0000

Today, I have the honor of speaking on IoT security policy at the annual CyberNextDC conference organized by the Cybersecurity Coalition. As the number of connected devices grows and these… Read more »

The post How to Regulate IoT Cybersecurity appeared first on Schneider Electric Blog.

Read more

How IEC 62443 simplifies cybersecurity definition for electrical infrastructures

Credit to Author: Adam Gauci| Date: Thu, 17 Oct 2019 12:00:33 +0000

In my last post in this two-post series, we looked briefly at the operational benefits of IoT-enabled electrical power distribution systems. We also learned why cybersecurity management is becoming an… Read more »

The post How IEC 62443 simplifies cybersecurity definition for electrical infrastructures appeared first on Schneider Electric Blog.

Read more

New ISA Global Cybersecurity Alliance Helps Reduce Threats Through Collaboration

Credit to Author: Nathalie Marcotte| Date: Tue, 08 Oct 2019 19:06:19 +0000

Co-authored by Nathalie Marcotte, Senior Vice President Schneider Electric Industrial Services, and Mary Ramsey, Executive Director, International Society of Automation (ISA) According to Kaspersky Labs, 47% of industrial control systems computers… Read more »

The post New ISA Global Cybersecurity Alliance Helps Reduce Threats Through Collaboration appeared first on Schneider Electric Blog.

Read more