Supply Chain Security 101: An Expert’s View

Credit to Author: BrianKrebs| Date: Sat, 13 Oct 2018 01:03:12 +0000

Earlier this month I spoke at a cybersecurity conference in Albany, N.Y. alongside Tony Sager, senior vice president and chief evangelist at the Center for Internet Security and a former bug hunter at the U.S. National Security Agency. We  talked at length about many issues, including supply chain security, and I asked Sager whether he’d heard anything about rumors that Supermicro — a high tech firm in San Jose, Calif. — had allegedly inserted hardware backdoors in technology sold to a number of American companies.

Read more

Naming & Shaming Web Polluters: Xiongmai

Credit to Author: BrianKrebs| Date: Wed, 10 Oct 2018 00:41:56 +0000

What do we do with a company that regularly pumps metric tons of virtual toxic sludge onto the Internet and yet refuses to clean up their act? If ever there were a technology giant that deserved to be named and shamed for polluting the Web, it is Xiongmai — a Chinese maker of electronic parts that power a huge percentage of cheap digital video recorders (DVRs) and Internet-connected security cameras.

Read more

Wi-Fi-as-a-service: An Emerging Opportunity for Telecom Provider ITS Fiber

Credit to Author: Guest Blogger| Date: Thu, 04 Oct 2018 17:28:43 +0000

“My internet is down.” “My Wi-Fi isn’t working.” Customer service reps at network providers hear these countless times per day; they naturally get blamed. ITS Fiber, however, has a record… Read more »

The post Wi-Fi-as-a-service: An Emerging Opportunity for Telecom Provider ITS Fiber appeared first on Schneider Electric Blog.

Read more

Building Management Gets a Boost from the Power of IoT and the Cloud

Credit to Author: Jean-Paul Genet| Date: Tue, 25 Sep 2018 13:00:14 +0000

The Internet of Things (IoT) is opening up opportunities in all sorts of areas, including in facility operations. A case in point is tools for managing smaller buildings. While building… Read more »

The post Building Management Gets a Boost from the Power of IoT and the Cloud appeared first on Schneider Electric Blog.

Read more

Mirai Botnet Authors Avoid Jail Time

Credit to Author: BrianKrebs| Date: Wed, 19 Sep 2018 16:54:40 +0000

Citing “extraordinary cooperation” with the government, a court in Alaska on Tuesday sentenced three men to probation, community service and fines for their admitted roles in authoring and using “Mirai,” a potent malware strain used in countless attacks designed to knock Web sites offline — including an enormously powerful attack in 2016 that sidelined this Web site for nearly four days.

Read more

Sail the Blue Ocean with new digital business models

Credit to Author: Cyril Perducat| Date: Mon, 17 Sep 2018 13:57:36 +0000

 If you build it, will they come? That is, a new digital business model? Will it attract customers for the long haul in the digital economy? This is a question… Read more »

The post Sail the Blue Ocean with new digital business models appeared first on Schneider Electric Blog.

Read more

How to Manage Building Maintenance From Your Smart Phone

Credit to Author: Jean-Paul Genet| Date: Mon, 10 Sep 2018 13:00:46 +0000

As buildings become more complex, with all sorts of electrical, heating, cooling and other systems that need consistent routine maintenance, it can be a daunting task for facility managers and… Read more »

The post How to Manage Building Maintenance From Your Smart Phone appeared first on Schneider Electric Blog.

Read more

Digital transformation and value creation for Oil and Gas at the IT/OT market convergence

Credit to Author: Vincent Jacquement| Date: Thu, 06 Sep 2018 21:10:55 +0000

How much value has digital transformation created so far in the Oil & Gas industry? Which technology has contributed the most and what are the most compelling use cases? What… Read more »

The post Digital transformation and value creation for Oil and Gas at the IT/OT market convergence appeared first on Schneider Electric Blog.

Read more

The Risk of IoT Security Complacency

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Wed, 05 Sep 2018 12:04:14 +0000

Cyber security professionals are increasingly relying on their key security solutions to bridge staff and knowledge gaps.

Trend Micro recently surveyed 1,150 IT executives globally. We found a gap between the perceived risk from IoT and the planned mitigation for that risk. Most senior executives recognize that IoT can introduce security risk to the organization, but few will invest resources to remediate that risk. Click here for more details. Senior leadership should…

The post The Risk of IoT Security Complacency appeared first on .

Read more

Securing the Convergence of IT with OT

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 04 Sep 2018 10:00:00 +0000

The Industrial Internet of Things (IIoT) is the leading edge of the convergence of Operational Technology (OT) with IT. This convergence begins with network connectivity but requires enhancements in operational procedures, technology, and training as well. Beginning with the network, IT and OT use different protocols. Within the OT world, vendors have created many proprietary…

The post Securing the Convergence of IT with OT appeared first on .

Read more