September 23, 2025
From Air Gaps to Always Connected: The Evolution of Smart Building Cyber Threats
Quick Summary Smart building cyber threats have evolved alongside the shift from isolated, air-gapped BAS to always-connected systems. While connectivity [...]
August 28, 2025
Zero Trust for OT Security: The Last Line of Defense
Quick Summary Traditional firewalls were never designed to meet the unique security needs of Operational Technology (OT) environments. While they [...]
July 27, 2025
Future-Proofing OT Cybersecurity
Key Points OT Cybersecurity Faces Unique Challenges: Operational technology networks are often outdated, lack operating systems, span wide geographies, and [...]
July 17, 2025
Benefits of Encryption for OT Networks
Key Points Why OT Needs Encryption Now: Historically air-gapped OT systems avoided encryption due to isolation, performance concerns, and device [...]
June 26, 2025
Zero Trust Security for Microgrids and Energy Control Systems
Key Points Growing Cyber Risk in Microgrids: The distributed nature, two-way data flows, and device diversity in microgrids greatly expand [...]
June 9, 2025
Protecting Airport Baggage Handling Systems from Cyberattack
Key Points Growing Cyber Risk for BHS: Airport baggage handling systems, running on legacy OT hardware and insecure protocols like [...]
May 9, 2025
Zero Trust Security for Legacy OT Devices
Key Points Legacy OT Challenges: Many older OT systems use insecure protocols, lack modern security features, and have limited hardware [...]
April 8, 2025
Securing Critical Infrastructure to Reduce OT Cyber Risks and Impacts
Webinar Summary - Securing Critical Infrastructure (OT) In the webinar about securing critical infrastructure hosted by KMC Controls, the panelists [...]
March 27, 2025
Zero Trust Security for Building Management Systems in Data Centers
Key Points Cooling and Power Risks: While power failures are the top cause of serious data center outages, 13–19% result [...]
March 12, 2025
Zero Trust vs Remote Access VPN for Building Control Systems
Zero Trust architecture fundamentally transforms how organizations secure their building automation networks by addressing the inherent vulnerabilities of traditional remote [...]

