December 17, 2025
10BASE-T1L: Expanding BAS Connectivity Without Expanding the Attack Surface
Quick Summary 10BASE-T1L is transforming building automation by extending Ethernet and IP connectivity all the way to the field device [...]
December 10, 2025
Building Cybersecurity Insurance: Why Smart Building and BAS Owners Need Coverage
Quick Summary Smart Building and BAS cyberattacks cause operational failures, safety hazards, and tenant disruption—risks far greater than traditional IT [...]
December 2, 2025
Building Secure BAS Connectivity Across Traditional, Hybrid, and Cloud Networks
Quick Summary As BAS shift from isolated networks to hybrid and cloud-connected architectures, securing connectivity becomes foundational—not optional. Device-level Zero [...]
November 22, 2025
Post-Quantum Cryptography and the Future of BAS Security
Quick Summary Quantum computing threatens to break today’s cryptographic protections, including the algorithms used across some BAS networks, while other [...]
November 9, 2025
Building Cybersecurity 101 – Tools and Methods
Introduction In this episode of the ASHB Smarter Homes & Buildings Podcast, host Greg Walker, ASHB CEO, sits down with [...]
November 3, 2025
Ransomware in the Building: What Facility Managers Must Know
Quick Summary Ransomware is now a direct threat to building infrastructure, not just corporate IT systems. Real incidents have disrupted [...]
October 24, 2025
Cybersecurity Compliance for Smart Buildings: Navigating NIS2, NIST, and DoD Standards
Quick Summary Smart buildings now fall under multiple cybersecurity frameworks, including NIS2, NIST CSF 2.0, and DoD Zero Trust. All [...]
October 16, 2025
Zero Trust for Building Automation: Securing Every Device at the Edge
Quick Summary Zero Trust brings continuous verification to the edge of your smart building—every device, command, and data flow. With [...]
October 8, 2025
The Cost of a Cyber Breach in Smart Buildings: Beyond Data Loss
Quick Summary A cyber breach in building automation can inflict far greater damage than lost data. Beyond IT, BAS attacks [...]
October 2, 2025
Top BAS/BMS Protocol Vulnerabilities
Quick Summary Legacy BAS/BMS protocols share common vulnerabilities, including no encryption, weak authentication, spoofing risks, replay attacks, and weak access [...]

