How Renewables and Efficiency Measures Will Help Colo’s Meet Burgeoning Energy Demands

Credit to Author: Mark Bidinger| Date: Fri, 12 Jan 2018 16:00:04 +0000

Colocation companies are facing a period of tremendous opportunity for growth, but that same growth is forcing them to meet some serious challenges around energy use – for the sake… Read more »

The post How Renewables and Efficiency Measures Will Help Colo’s Meet Burgeoning Energy Demands appeared first on Schneider Electric Blog.

Read more

Protecting Critical Infrastructure from Cyber Threats

Credit to Author: Ed Cabrera (Chief Cybersecurity Officer)| Date: Tue, 31 Oct 2017 14:30:57 +0000

This last week of National Cyber Security Awareness Month (NCSAM), we focus on critical infrastructure (CI). For many years now we have discussed and seen the result of poorly designed and protected control system networks. I wrote on this very topic back in 2016. Now the threat landscape has evolved further and the attack surface…

Read more

Accelerating Security for Intelligent Transportation Systems: A New Trend Micro Report

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 24 Oct 2017 14:53:53 +0000

Connected cars and autonomous vehicles are getting all the headlines these days, especially when it comes to cybersecurity concerns. But that’s only half of the story. An under-reported but hugely important piece of the puzzle relates to the Intelligent Transportation Systems (ITS) needed to create truly smart cities. Governments around the world, including the US,…

Read more

IoT Device Security At Home

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 20 Sep 2017 15:16:10 +0000

What do security vulnerabilities mean for the IoT?  My girlfriend read something that worried her about the security risks posed by Internet of Things (IoT) devices at home. She had recently purchased a new TV, and she has an older home security system. She asked if her privacy might be at risk. We talked about the kinds of problems an unprotected home…

Read more

Security for a Rapidly Changing World: Why XGen™ is Our Formula for Success

Credit to Author: Eva Chen| Date: Tue, 11 Jul 2017 18:21:52 +0000

Right now, we’re living through a period of almost unprecedented technological change. It can be easy sometimes to get caught up in the excitement of this change and miss the bigger picture; the wider themes that tie our past to our future. That’s why at Trend Micro we’re proud to have been able to execute…

Read more

The Jetson’s Cyber Concerns – Future Smart Cities Cybersecurity Checklist

Credit to Author: Jon Clay| Date: Tue, 30 May 2017 12:00:36 +0000

As cities continue to grow smarter, they will also become easier to hack. With millions (if not billions) of dollars going into research for urban domains and the Internet of Things (IoT), there will be more opportunities to utilize technology to define, access and improve smart city services and infrastructure. In these smart cities, information…

Read more

Pwn2Own™ Returns for 2017 to Celebrate 10 Years of Exploits

Hackers make online life difficult.We are nine weeks away from Pwn2Own™ 2017 returning to CanSecWest, which is celebrating its 10th anniversary this year. A lot has changed in the world since the first Pwn2Own in 2007. The computing space has changed drastically, as well. The first Pwn2Own happened before Conficker or Stuxnet. It happened before the rise of nation-state…

Read more

Pwn2Own Returns for 2017 to Celebrate 10 Years of Exploits

Hackers make online life difficult.We are nine weeks away from Pwn2Own™ 2017 returning to CanSecWest, which is celebrating its 10th anniversary this year. A lot has changed in the world since the first Pwn2Own in 2007. The computing space has changed drastically, as well. The first Pwn2Own happened before Conficker or Stuxnet. It happened before the rise of nation-state…

Read more