Search results for: operational technology
Protecting Operational Technology from Quantum Computing
Protecting OT from Quantum Computing What is Quantum Computing? Quantum computing leverages the principles of quantum mechanics to perform complex calculations far more efficiently than classical computers. Unlike classical bits, which represent data as 0 or 1, quantum bits (qubits) can exist in multiple states simultaneously due to superposition. This, along with entanglement—where qubits become…
Read MoreEmbracing Digital Transformation – Zero Trust with Operational Technology
Embracing Digital Transformation – Zero Trust with Operational Technology Episode #175: In this episode titled “Embracing Digital Transformation – Zero Trust with Operational Technology” by Darren Pulsipher, Chief Solution Architect for Public Sector at Intel, interviews the CEO and Founder of Veridify Security Louis Parks. They discuss the unique problems with Operational technology networks that…
Read MoreMitigating Cyber Risks in Operational Technology Buildings and Critical Infrastructure
On-Demand Webinar: Mitigating Cyber Risks in Operational Technology Buildings and Critical Infrastructure Operational technology (OT), buildings, and critical infrastructure are becoming smarter and more efficient with connected systems, controls, sensors, and more. With connected OT and IT systems, cybersecurity risks increase as vulnerabilities become more widely exposed. Cyberattacks bring financial, operational, and intellectual property risks,…
Read MoreMitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure
Mitigating Cyber Risks in Operational Technology, Buildings, and Critical Infrastructure Operational technology (OT), buildings, and critical infrastructure are becoming smarter and more efficient with connected systems, controls, sensors, and more. With connected OT and IT systems, cybersecurity risks increase as vulnerabilities become more widely exposed. Cyberattacks bring financial, operational, and intellectual property risks, and studies…
Read MoreWEBINAR: Mitigating Cyber Risks in Operational Technology (OT), Buildings, and Critical Infrastructure
The Importance of Protecting Smart Building Technology from Cyber Threats
Smart Building Technology Market Size Juniper Research estimates more than 115 million buildings will deploy smart building technologies by 2026, an increase of over 2.5X from 2022. Grandview Research (graph) and Fortune Business Insights both predict CAGR of over 20% through 2030 for the smart building market. Smart building technology has revolutionized the way buildings…
Read MoreEU NIS2 Directive and Implications for BAS-BMS Cybersecurity
The EU NIS2 Directive (Network and Information Security 2 Directive), which replaces the original NIS Directive, aims to strengthen cybersecurity requirements across critical sectors, including energy, healthcare, transportation, and digital infrastructure. While not explicitly focused on building automation systems (BAS), its implications for such systems are significant, particularly for facilities considered critical infrastructure. Key Implications…
Read MoreBuilding Automation Endpoint Protection Is Critical for Cybersecurity
Building automation systems (BAS), now highly-connected to the internet, have transformed how the infrastructure of residential, commercial, and industrial properties is managed and optimized. From heating, ventilation, and air conditioning (HVAC) systems to lighting, security, life safety, and power distribution, these systems are now smart, centralized, and increasingly automated. While this level of convenience and…
Read MoreBACnet Secure Connect
BACnet Secure Connect (BACnet/SC) and BAS / BMS Cybersecurity BACnet Security Challenges BACnet started as a serial-based protocol and building operational technology (OT) systems were generally not connected to other systems inside or outside of the building. Therefore, there was no security built into the protocol and the messages were plain text. The BACnet standard…
Read MoreModbus Vulnerabilities Used for Cyberattack on a Heating Utility
Heat and Hot Water Disrupted to over 600 buildings, about 100,000 people, for 48 Hours Cyberattack on a Heating Utility A cyberattack on a heating utility (also known as district heating) in the Ukrainian city of Lviv, the largest city in western Ukraine, in January 2024. The malware, named FrostyGoop, is one of the few…
Read More