• December 17, 2025

    10BASE-T1L: Expanding BAS Connectivity Without Expanding the Attack Surface

    Quick Summary 10BASE-T1L is transforming building automation by extending Ethernet and IP connectivity all the way to the field device [...]

  • December 10, 2025

    Building Cybersecurity Insurance: Why Smart Building and BAS Owners Need Coverage

    Quick Summary Smart Building and BAS cyberattacks cause operational failures, safety hazards, and tenant disruption—risks far greater than traditional IT [...]

  • December 2, 2025

    Building Secure BAS Connectivity Across Traditional, Hybrid, and Cloud Networks

    Quick Summary As BAS shift from isolated networks to hybrid and cloud-connected architectures, securing connectivity becomes foundational—not optional. Device-level Zero [...]

  • November 22, 2025

    Post-Quantum Cryptography and the Future of BAS Security

    Quick Summary Quantum computing threatens to break today’s cryptographic protections, including the algorithms used across some BAS networks, while other [...]

  • November 9, 2025

    Building Cybersecurity 101 – Tools and Methods

    Introduction In this episode of the ASHB Smarter Homes & Buildings Podcast, host Greg Walker, ASHB CEO, sits down with [...]

  • November 3, 2025

    Ransomware in the Building: What Facility Managers Must Know

    Quick Summary Ransomware is now a direct threat to building infrastructure, not just corporate IT systems. Real incidents have disrupted [...]

  • October 24, 2025

    Cybersecurity Compliance for Smart Buildings: Navigating NIS2, NIST, and DoD Standards

    Quick Summary Smart buildings now fall under multiple cybersecurity frameworks, including NIS2, NIST CSF 2.0, and DoD Zero Trust. All [...]

  • October 16, 2025

    Zero Trust for Building Automation: Securing Every Device at the Edge

    Quick Summary Zero Trust brings continuous verification to the edge of your smart building—every device, command, and data flow. With [...]

  • October 8, 2025

    The Cost of a Cyber Breach in Smart Buildings: Beyond Data Loss

    Quick Summary A cyber breach in building automation can inflict far greater damage than lost data. Beyond IT, BAS attacks [...]

  • October 2, 2025

    Top BAS/BMS Protocol Vulnerabilities

    Quick Summary Legacy BAS/BMS protocols share common vulnerabilities, including no encryption, weak authentication, spoofing risks, replay attacks, and weak access [...]