Automated Flare Monitoring – A step towards digitalization

    Even to those not working in the oil and gas industry, the image of a burning flare above an industrial plant is a familiar one. For people working directly in the sector, the critical importance of gas flares in ensuring Health and Safety is well-understood. Industrial flaring is a regulatory requirement to manage the releases […]

      Access control in smart cities: improving citizens’ security and everyday life

      You often see tragedies in movies where criminals take control of a city by hacking the network and changing traffic lights to create major car incidents. Fortunately, in the real world physical access control acts as fail safe to limit the impact of these incidents, even after a network has been breached. With a growing […]

        Critical Infrastructure safety and security: Oil & Gas as the ideal example

        Its name highlights its importance. Critical Infrastructure is defined as those systems, networks and assets that are essential for the functioning of a society and economy. Areas of Critical Infrastructure include the provision of energy, the extraction and production of oil and gas, mining, telecommunications, water treatment and sewage, food production, and manufacturing. All of […]

          Key tips for cybersecurity protection at your critical site

          It goes without saying that a cybersecurity attack in critical infrastructure could cause a catastrophic impact. Making sure you are constantly thinking about your critical site’s cyber plan and asking the right questions is a key component of securing your site. In this blog, I continue my conversation with Ryan Zatolokin, Business Development Manager, Senior […]

            Why cybersecurity for critical infrastructure matters: How to better protect your devices

            Any device connected to a network may be susceptible for hackers to gain access to. Therefore, cybersecurity is a top priority for everyone. Unfortunately, all networked devices and systems can be vulnerable. When those devices are used in high-risk environments like critical infrastructure, the consequences of a breach could be more far-reaching, with the potential to […]