• December 17, 2025

    10BASE-T1L: Expanding BAS Connectivity Without Expanding the Attack Surface

    Quick Summary 10BASE-T1L is transforming building automation by extending Ethernet and IP connectivity all the way to the field device [...]

  • October 24, 2025

    Cybersecurity Compliance for Smart Buildings: Navigating NIS2, NIST, and DoD Standards

    Quick Summary Smart buildings now fall under multiple cybersecurity frameworks, including NIS2, NIST CSF 2.0, and DoD Zero Trust. All [...]

  • October 16, 2025

    Zero Trust for Building Automation: Securing Every Device at the Edge

    Quick Summary Zero Trust brings continuous verification to the edge of your smart building—every device, command, and data flow. With [...]

  • September 23, 2025

    From Air Gaps to Always Connected: The Evolution of Smart Building Cyber Threats

    Quick Summary Smart building cyber threats have evolved alongside the shift from isolated, air-gapped BAS to always-connected systems. While connectivity [...]

  • September 17, 2025

    The Hidden Cyber Risks Inside HVAC, Lighting, and Access Control Systems

    Quick Summary HVAC, lighting, and access control systems may appear harmless but can be exploited to cause serious operational, financial, [...]

  • August 28, 2025

    Zero Trust for OT Security: The Last Line of Defense

    Quick Summary Traditional firewalls were never designed to meet the unique security needs of Operational Technology (OT) environments. While they [...]

  • August 7, 2025

    Overcoming Niagara Framework Cyber Vulnerabilities

    Key Points Comprehensive Vulnerability Mitigation: DOME encrypts all device communications, enforces unique cryptographic identities, blocks unauthorized actions, and prevents lateral [...]

  • July 27, 2025

    Future-Proofing OT Cybersecurity

    Key Points OT Cybersecurity Faces Unique Challenges: Operational technology networks are often outdated, lack operating systems, span wide geographies, and [...]

  • June 26, 2025

    Zero Trust Security for Microgrids and Energy Control Systems

    Key Points Growing Cyber Risk in Microgrids: The distributed nature, two-way data flows, and device diversity in microgrids greatly expand [...]

  • May 9, 2025

    Zero Trust Security for Legacy OT Devices

    Key Points Legacy OT Challenges: Many older OT systems use insecure protocols, lack modern security features, and have limited hardware [...]