Data center security, from the perimeter to the rack

    If data is the new oil, as has often been claimed, are data centers the new power stations? It might sound like a grand claim, but when more and more of the data storage, processing and analytics that underpins so many aspects of business and society is handled by data centers, it’s perhaps not so […]

      A win, win, win proposition for critical infrastructure

      When is a surveillance system more than a surveillance system? When it not only protects an organization’s premises but also supports efficient, reliable operations, and health and safety. Network surveillance supports critical infrastructure organizations in three ways: It helps them reach their goals for security, for operations and for health and safety, all with a […]

        Critical Infrastructure safety and security: Oil & Gas as the ideal example

        Its name highlights its importance. Critical Infrastructure is defined as those systems, networks and assets that are essential for the functioning of a society and economy. Areas of Critical Infrastructure include the provision of energy, the extraction and production of oil and gas, mining, telecommunications, water treatment and sewage, food production, and manufacturing. All of […]

          Key tips for cybersecurity protection at your critical site

          It goes without saying that a cybersecurity attack in critical infrastructure could cause a catastrophic impact. Making sure you are constantly thinking about your critical site’s cyber plan and asking the right questions is a key component of securing your site. In this blog, I continue my conversation with Ryan Zatolokin, Business Development Manager, Senior […]

            Why cybersecurity for critical infrastructure matters: How to better protect your devices

            Any device connected to a network may be susceptible for hackers to gain access to. Therefore, cybersecurity is a top priority for everyone. Unfortunately, all networked devices and systems can be vulnerable. When those devices are used in high-risk environments like critical infrastructure, the consequences of a breach could be more far-reaching, with the potential to […]