Cybersecurity in Building Automation Systems (BAS)

February 15, 2019

The buildings that we live and work in are getting smarter and more connected. As we speak, the scenes we have only watched in sci-fi movies are becoming a reality, beginning with our homes and offices transforming into “smart buildings”. Only a few years ago, buildings offered very basic services. They had a central building management system (BMS) and one or two sub-systems, isolated from each other, typically used to control heating and air conditioning, the elevator or lighting systems. The control implemented by the BMS included simply switching the right equipment on or off at the right time of the day or year.

Spotlight

Sylint Group

Sylint provides Expert services in Digital Data Forensics, eDiscovery and Cyber Security to a wide variety of clients, from small firms to fortune 100 companies. Our services cover both pre- and post-incident support, and address a broad range of regulations and requirements including PCI, Sarbanes-Oxley, HIPAA and ISO 27001. Our engineering team develops unique techniques and methods, through software and hardware, to detect and respond to newly emerging security threats, anti-forensic activities and fraudulent behaviors. Sylint's professionals combine experience from law enforcement and intelligence sectors with advanced technologies to provide unparalleled solutions for our clients. Specialties Cyber Security, Forensics, eDiscovery.

OTHER WHITEPAPERS
news image

Google Cloud security foundations guide

whitePaper | April 19, 2021

This guide presents an opinionated view of Google Cloud security best practices, organized to allow users to adopt or adapt them and then automatically deploy them for their estates on Google Cloud. This document can be useful to you if you are a CISO, security practitioner, risk or compliance officer.

Read More
news image

2022 Cybersecurity Predictions

whitePaper | June 27, 2022

At the end of every year, our experts put their heads together to anticipate and prepare for what’s to come next in the world of cybersecurity. We retrospect on the months past, and analyze impactful developments, breaches, and tactics. We package the outputs of this process for IT leaders, so they, too, can anticipate and prepare.

Read More
news image

Zero Trust: Your Digital Transformation Requires a Risk Transformation

whitePaper | September 28, 2022

Modernizing your technology landscape requires a parallel cybersecurity strategy because your users and data are no longer protected by the corporate firewall. While the cloud provides unsurpassed agility, it also exposes new threat vectors. Your digital transformation must be accompanied by an innovative and comprehensive approach to reduce risk and attack surfaces.

Read More
news image

Cybersecurity Technologies for Cloud Access

whitePaper | September 14, 2022

The enterprises’ network and network security architectures are unable to effectively serve the dynamic secure access requirements of digital business. The enterprise data center is no longer the center of access requirements for users and devices.

Read More
news image

Understanding Ransomware and Strategies to Defeat it

whitePaper | March 5, 2020

Held Hostage in Hollywood: In February 2016 the Hollywood Presbyterian Medical Center, in Los Angeles, paid a ransom of about US$17,000 to hackers who infiltrated and disabled its computer network with ransomware. The hospital paid the ransom of 40 Bitcoins (currently worth about $16,664) after a “network infiltration” began on February 5, when employees reported being unable to access the hospital’s network and electronic medical records system. “The malware locked access to certain computer systems and prevented us from sharing communications electronically,” said hospital CEO Allen Stefanek.

Read More
news image

Brivo Access Information Security White Paper

whitePaper | August 26, 2022

As a provider of physical security services, we at Brivo believe that information security is of paramount importance to maintaining the safety and security of your facilities, and the privacy of your data. That’s why information security has been a consideration since day one.

Read More

Spotlight

Sylint Group

Sylint provides Expert services in Digital Data Forensics, eDiscovery and Cyber Security to a wide variety of clients, from small firms to fortune 100 companies. Our services cover both pre- and post-incident support, and address a broad range of regulations and requirements including PCI, Sarbanes-Oxley, HIPAA and ISO 27001. Our engineering team develops unique techniques and methods, through software and hardware, to detect and respond to newly emerging security threats, anti-forensic activities and fraudulent behaviors. Sylint's professionals combine experience from law enforcement and intelligence sectors with advanced technologies to provide unparalleled solutions for our clients. Specialties Cyber Security, Forensics, eDiscovery.

Events