How Does a Rotary Valve Actuator Differ from a Linear Actuator?

Credit to Author: Kavita Manral| Date: Tue, 03 Dec 2019 08:50:23 +0000

Valve Actuators can be classified into two types based on their motion. The two primary types of actuators are commonly referred to as rotary and linear. Rotary actuators turn an… Read more »

The post How Does a Rotary Valve Actuator Differ from a Linear Actuator? appeared first on Schneider Electric Blog.

Read more

Cybersecurity Defense Requires a Strong Offense

Credit to Author: Nathalie Marcotte| Date: Tue, 26 Nov 2019 14:58:46 +0000

Cybersecurity is currently facing a tricky paradox. The number of attacks, and attempted attacks, is rapidly growing but as it stands, companies are struggling to adapt the right approaches in… Read more »

The post Cybersecurity Defense Requires a Strong Offense appeared first on Schneider Electric Blog.

Read more

How to Prevent Edge Computing Security Risks in a Connected World

Credit to Author: Steven Brown| Date: Thu, 31 Oct 2019 15:53:15 +0000

Edge computing sites are cropping up all over, driven in large part by Internet of Things (IoT) technology and digital transformation efforts that are generating enormous amounts of data that… Read more »

The post How to Prevent Edge Computing Security Risks in a Connected World appeared first on Schneider Electric Blog.

Read more

How to Regulate IoT Cybersecurity

Credit to Author: Trevor Rudolph| Date: Tue, 22 Oct 2019 18:19:51 +0000

Today, I have the honor of speaking on IoT security policy at the annual CyberNextDC conference organized by the Cybersecurity Coalition. As the number of connected devices grows and these… Read more »

The post How to Regulate IoT Cybersecurity appeared first on Schneider Electric Blog.

Read more

How IEC 62443 simplifies cybersecurity definition for electrical infrastructures

Credit to Author: Adam Gauci| Date: Thu, 17 Oct 2019 12:00:33 +0000

In my last post in this two-post series, we looked briefly at the operational benefits of IoT-enabled electrical power distribution systems. We also learned why cybersecurity management is becoming an… Read more »

The post How IEC 62443 simplifies cybersecurity definition for electrical infrastructures appeared first on Schneider Electric Blog.

Read more

New ISA Global Cybersecurity Alliance Helps Reduce Threats Through Collaboration

Credit to Author: Nathalie Marcotte| Date: Tue, 08 Oct 2019 19:06:19 +0000

Co-authored by Nathalie Marcotte, Senior Vice President Schneider Electric Industrial Services, and Mary Ramsey, Executive Director, International Society of Automation (ISA) According to Kaspersky Labs, 47% of industrial control systems computers… Read more »

The post New ISA Global Cybersecurity Alliance Helps Reduce Threats Through Collaboration appeared first on Schneider Electric Blog.

Read more

Protecting against cybersecurity risks in IoT-enabled electrical systems

Credit to Author: Adam Gauci| Date: Thu, 03 Oct 2019 12:00:13 +0000

This two-post blog series looks at the drivers for electrical system cybersecurity, as well as how the IEC 62443 standard is helping simplify the definition of cybersecurity requirements. The Internet-of-Things… Read more »

The post Protecting against cybersecurity risks in IoT-enabled electrical systems appeared first on Schneider Electric Blog.

Read more

The Importance of Safeguarding an IIoT Network

Credit to Author: Atin Chhabra| Date: Mon, 30 Sep 2019 04:25:54 +0000

The Industrial Internet of Things (IIoT) is essentially a network connectivity system of industrial devices working in sync to collect and interpret data in order to enable new-age insights and… Read more »

The post The Importance of Safeguarding an IIoT Network appeared first on Schneider Electric Blog.

Read more