Enhancing Energy Resilience, Reducing Risk Through a Microgrid Approach

Credit to Author: Mark Feasel| Date: Mon, 03 Dec 2018 10:56:53 +0000

Why do microgrids become a hot topic when talking about natural disasters’ impacts and possible solutions? In an increasingly connected society, the economic impact of extreme weather and associated power outages has escalated rapidly…. Read more »

The post Enhancing Energy Resilience, Reducing Risk Through a Microgrid Approach appeared first on Schneider Electric Blog.

Read more

Bring your own security (BYOS): good idea or not?

Credit to Author: Pieter Arntz| Date: Tue, 02 Oct 2018 15:00:00 +0000

We know about BYOD. What about BYOS? Is it a good idea to Bring Your Own Security, or use your own security solution on devices that you use for work? What if they are company owned? We walk companies and employees through the pros and cons of each.

Categories:

Tags:

(Read more…)

The post Bring your own security (BYOS): good idea or not? appeared first on Malwarebytes Labs.

Read more

GDPR vs Blockchain: Technology vs the Law

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Thu, 22 Mar 2018 13:23:30 +0000

One of the biggest impacts that GDPR will have for consumers (citizens of countries that comply with GDPR, at least) is the right to be forgotten. A person can request that they be removed from a record. What if the record is part of a blockchain? This poses a challenge for blockchain implementations. Blockchains are…

The post GDPR vs Blockchain: Technology vs the Law appeared first on .

Read more

BYOD, why don’t you?

Credit to Author: Pieter Arntz| Date: Thu, 19 Oct 2017 17:16:16 +0000

Allowing your staff to BYOD has mutual benefits for employees and company, but to keep everyone happy and safe, there are some precautions you should be taking.

Categories:

Tags:

(Read more…)

The post BYOD, why don’t you? appeared first on Malwarebytes Labs.

Read more

Cybersecurity in the Workplace is Everybody’s Business

Credit to Author: William “Bill” Malik (CISA VP Infrastructure Strategies)| Date: Tue, 10 Oct 2017 13:00:04 +0000

What can individual users do to preserve cybersecurity at work? Your organization is spending on cybersecurity tools, you have an awareness program, and if you look you will find that there are standards and procedures for choosing and maintaining products to help keep information secure. But what can an individual do? Remember – you are…

Read more

What are the Benefits of Attribution?

Credit to Author: William “Bill” Malik| Date: Wed, 16 Aug 2017 12:00:04 +0000

How should CIOs approach cyber security in the new year?Whodunnit? The superior detective dazzles us with brilliance, skill, and patience to unmask the bad guy. The interplay of forensic science and psychological insight have fascinated us from Sherlock Holmes to the CSI television series. Sometimes the answer is completely surprising, as in Murder on the Orient Express. Other times, the mystery is known to…

Read more