Articles

Security Analytics and Visualizations that Could Prevent a Ukraine-like Power Outage

Richard Jones, VP Grid Security – Bridge Energy Group
Shawn Fountain, Principal Consultant – Bridge Energy Group 

Most readers by now have probably heard about the early January announcement of malware found in a Vermont Utility.  To those familiar with the cyberattack induced power outages in the Ukraine in December 2015 that cut power to nearly 230,000 customers for several hours, this was not a surprise.[1] While the Ukraine event is the only publicized power outage from a cyberattack, there have been other successful cyberattacks to SCADA and industrial control systems risking our critical infrastructure that represent a clear warning signal for utility organizations.

Continue reading

Three Critical Uses of Data for Off-Grid Telecom Power

Thomas Rahkonen, Chief Technology Officer & Vice President eCentre
Flexenclosure

Consumers in off-grid areas are rapidly increasing their use of mobile Internet services. At the same time they not only expect service to become more reliable, but they also want network coverage to expand and prices for mobile data plans to decrease too. This is a big ask for mobile operators struggling to achieve base station profitability when they have no access to a reliable power grid. So what’s the solution? Continue reading

The Fog is Getting Thicker

Alex Hardie, Principal
SDNNFV.net Labs

“…and Leon is getting larger!”

For the pop culture-savvy, this is a bit from the move “Airplane!”. For those in the industries of telecom and industrial process and control it’s a warning that fog computing has rolled in. It’s a gratuitous segue, but any reference to a line by Johnny is worth the effort, however clumsy. Continue reading

Steps Companies Can Take to Secure IoT Devices Against Hackers

Veikko Ylimartimo, CTO
Tosibox 

The Internet of Things (IoT) is already delivering a variety of operational efficiencies to organizations. This reality also creates the need for improved security to protect these essential business connections. In recent months, we have seen internet-connected devices and systems hacked, hijacked and used for large-scale denial of service attacks around the world. Continue reading

Persistent Tracking Using PTZ Camera Hand-Off

Eric Olson, Vice President of Marketing
PureTech Systems

The protection of remote facilities has many challenges. Facilities that have many remote sites, must maintain surveillance on all these sites simultaneously, while facilities with just one or two sites have the potential issue of long periods of inactivity, followed by a quick flurry of activity that must be address quickly in order to take proactive measures, including the collection of usable video.  As such, the automation of security tasks is always a welcomed tool.  One such tool is PTZ Camera to PTZ Camera Handoff. Continue reading

An Introduction to Digital Mobile Radio

Jerry Adams, Sales Engineering Manager
Simoco 

Digital Mobile Radio (DMR) is an open international standard developed and ratified by the European Telecommunications Standards Institute (ETSI) in 2005. As a technology guiding body the DMR Association, also established in 2005, supports ETSI throughout the DMR standardization process and interoperability testing (IoP). Continue reading

When It Comes to IoT Security for Remote Equipment, Think About All the Moving Parts

Donald Schleede, Information Security Officer
Digi International

For the Internet of Things (IoT), security is becoming a non-negotiable requirement. Although some may mistakenly assume IoT data is not being targeted by hackers, remotely connected devices on the front lines of IoT solutions are being exposed to more frequent cyber-attacks – because what appears to be mundane operational data represents value to those with malicious intent.   Continue reading