Cybersecurity for Building Automation Systems

Security Boulevard | December 10, 2019

Cybersecurity for Building Automation Systems
Rapid adoption of IoT-based systems with the promise of significantly reducing operational costs is driving rapid growth in the building and facility automation marketplace. The purpose of these systems is to improve occupant comfort, reduce energy consumption and total cost of ownership, efficiently operate building systems, and increase the lifecycle of utilities. This digital transformation of the building automation sector involves moving away from older proprietary systems and adopting edge-to-cloud computing architectures. There is a drive to deploy lower cost sensors, both wired and wireless, to gather as much data as possible. At the same time, the industry has a considerable installed base of legacy building automation systems, applications, devices, and networks that must be managed, maintained and gradually modernized.

Spotlight

THE NEVER-ENDING BATTLE TO KEEP INFORMATION SAFE. OF SECURITY BREACHES ARE AVOIDABLE THROUGH SIMPLE OR INTERMEDIATE CONTROLS. INTRUSIONS & DISCLOSURES. $174 MILLION RECORDS INVOLVED IN DATA THEFTS. 1 U.S. DATA BREACH COSTS $5.5MILLION. COMMON DATA INTRUSION IN THE ENTERPRISE. 58% ‘HACKTIVISTS’.

Related News

ENTERPRISE SECURITY

Coalfire announces HITRUST Accelerator with AWS Security Assurances Services (AWS SAS)

Coalfire | October 19, 2021

Coalfire, a leading cybersecurity firm, announced HITRUST Accelerator, a new program that allows customers to achieve HITRUST CSF Validation up to 50% faster when compared with conventional methods. This program combines deep technical knowledge of AWS Security Assurance Services, LLC (AWS SAS) with Coalfire, a HITRUST External Assessor Organization, to streamline the entirety of the HITRUST Validation lifecycle. Organizations who attempt to prepare for HITRUST certification internally without the help of an experienced external assessor may have timelines in excess of 2 years to achieve HITRUST Certification. The HITRUST Accelerator program uses a three-step process that provides end-to-end support of an organization's preparation, remediation, and HITRUST Validation. This integrated approach enables Coalfire and AWS SAS to quickly identify compliance gaps, assist with technical remediation, simplify document creation, and expedite the Validated Assessment. By accelerating HITRUST Validation, customers will be able to offer significant assurances over their security and privacy controls, which enables them to focus on innovation and driving adoption. Coalfire and AWS SAS share an obsession in creating innovative solutions that maximize customer success," "This passion and collaboration resulted in a program that helps our mutual customers prepare, remediate, and validate against the HITRUST CSF. By taking industry leaders in cloud security and HITRUST, we aim to revolutionize the way that organizations approach and maintain compliance. This has been a long time coming and we are absolutely thrilled to be launching this program with the AWS SAS team. Jeff Rector, Global Engagement at Coalfire The customer journey is accelerated via three tailored workstreams that are designed to: Prepare the customer for HITRUST Validation by thoroughly defining the technical systems and boundary, conducting a thorough gap assessment, and developing fully customized policies and procedures designed to be HITRUST compliant. Reduce remediation efforts and time to 12 WEEKS in most instances, using automated compliance-as-code packages, 30 days of expert AWS technical guidance and security engineering services, and hands-on AWS support configuring AWS services., and to fast-track the collection of evidence ahead of the Validated Assessment to minimize burden and audit fatigue on compliance teams. Validate the environment with confidence, including end-to-end support during HITRUST QA, Corrective Action Plan creation, and report finalization. About Coalfire Leading technology infrastructure providers, SaaS companies, and enterprises – including the top-five cloud service providers and eight of the top-10 SaaS organizations – rely on Coalfire to strengthen their security posture and secure their digital transformations. As one of the largest firms dedicated to cybersecurity, Coalfire delivers a comprehensive suite of advisory and managed services, spanning cyber strategy and risk, cloud security, threat and vulnerability management, application security, privacy, and compliance management. A proven leader in cybersecurity for the past 20 years, Coalfire combines extensive cloud expertise, advanced technology, and innovative approaches that fuel success.

Read More

DATA SECURITY

Data Protection Platform, Protegrity to introduce dynamic monitoring and data masking capabilities

helpnetsecurity | June 11, 2021

Version 8.1 of Protegrity, the latest version of the Protegrity Data Protection Platform, is released. This has the features such as monitoring capabilities and dynamic data masking. It provides all the customers, from a single data store, multiple data-protection methods. The company has also introduced Protegrity Cloud API and a redesigned logging architecture. Monitoring and dynamic data masking provide visibility and control for sensitive data access With this functionality, version 8.1 of the Protegrity Data Protection Platform gives a greater level of control and choice to meet the data protection they need to run their business smoothly. Monitoring capabilities provide customers standard visibility into how data is being retrieved and used across the company. Customers can utilize dynamic data masking of Protegrity for a greater level of control over their sensitive data. Unicode tokenization delivers language-preserving data security for global businesses Unicode is a standard for the consistent handling, encoding, and representing text expressed in the world's writing systems. Protegrity, with version 8.1, now brings all the benefits of its tokenization to all text encoded in the one- and two-byte Unicode standards. New cloud API and logging architecture enhance platform functionality Along with new data-protection methods, including data masking, monitoring, and Unicode tokenization, version 8.1 of Protegrity has revealed the following essential platform enhancements: • Protegrity Cloud API • Redesigned logging architecture

Read More

Companies migrate to the cloud and MSSPs helping to secure these multi-cloud environments

prnewswire | September 04, 2020

The "Japanese Managed Security Services Market, Forecast to 2023" report has been added to ResearchAndMarkets.com's offering.The Japanese managed security services (MSS) market, recording a year-on-year (YoY) growth rate of 14% in 2018, is the largest in the Asia-Pacific (APAC) region. There were several key market drivers in 2018: increased general information technology (IT) investment in Japanese enterprises for the 2020 Tokyo Olympic Games; Japanese enterprise spending shifting to an as a service' instead of on-premise' model (despite on-premise being the major revenue contributor); lack of security expertise among the internal IT teams.

Read More

Spotlight

THE NEVER-ENDING BATTLE TO KEEP INFORMATION SAFE. OF SECURITY BREACHES ARE AVOIDABLE THROUGH SIMPLE OR INTERMEDIATE CONTROLS. INTRUSIONS & DISCLOSURES. $174 MILLION RECORDS INVOLVED IN DATA THEFTS. 1 U.S. DATA BREACH COSTS $5.5MILLION. COMMON DATA INTRUSION IN THE ENTERPRISE. 58% ‘HACKTIVISTS’.