Search
Close this search box.

Facilities

Image courtesy: Brett Sayles

Cybersecurity needs for connected building systems

Connected capabilities offer a great deal of potential for building systems. Connected HVAC, lighting, alarms, fire protection and more are all key components of smart buildings currently in demand. These capabilities offer exciting opportunities for […]

Machinery

Requiring SBOMs and their impact on OT

The concept and benefits of a software bill of materials (SBOM) are simple to understand. SBOMs are a list of all software in an application or cyber asset. Vendors need to create and maintain an […]

Throwback Attack: How Stuxnet changed cybersecurity

Throwback Attack: How Stuxnet changed cybersecurity

During the second Bush Administration, there was great concern about the rapid progress of the Iranian enrichment program, which would likely lead to the attainment of weapons-grade uranium. The center of that operation was, and […]

How to establish defense in depth for building automation systems

How to establish defense in depth for building automation systems

Building automation systems have become a soft target for cyberattacks due to the large numbers of intelligent devices connected over open networks, sophisticated threats designed to attack control systems, as well as dependency on third-party […]

Image courtesy: Brett Sayles

Cybersecurity needs for connected building systems

Connected capabilities offer a great deal of potential for building systems. Connected HVAC, lighting, alarms, fire protection and more are all key components of smart buildings currently in demand. These capabilities offer exciting opportunities for […]

Machinery

Requiring SBOMs and their impact on OT

The concept and benefits of a software bill of materials (SBOM) are simple to understand. SBOMs are a list of all software in an application or cyber asset. Vendors need to create and maintain an […]

Throwback Attack: How Stuxnet changed cybersecurity

Throwback Attack: How Stuxnet changed cybersecurity

During the second Bush Administration, there was great concern about the rapid progress of the Iranian enrichment program, which would likely lead to the attainment of weapons-grade uranium. The center of that operation was, and […]

How to establish defense in depth for building automation systems

How to establish defense in depth for building automation systems

Building automation systems have become a soft target for cyberattacks due to the large numbers of intelligent devices connected over open networks, sophisticated threats designed to attack control systems, as well as dependency on third-party […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES