This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies
By closing this message or continuing to use our site, you agree to our cookie policy. Learn More
This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
search
cart
facebook   twitter   linkedin   youtube  
  • Sign In
  • Create Account
  • Sign Out
  • My Account
  • NEWS
    • Industry News
    • Women in Tech
    • Events Calendar
  • PRODUCTS
    • New Products
    • Editor’s Pick
  • TECHNOLOGIES
    • Cloud Computing
    • Cybersecurity
    • Edge Computing
    • Infrastructure
    • Power
    • 5G
  • OPERATIONS
    • Building Commissioning
    • Facility Design
    • Life Safety
    • Mission Sustainability
      • Code Green
    • Site Selection
    • Thermal Management
  • COLUMNS
    • Writing on the Edge
    • Unconventional Wisdom
    • On Target Series
    • Guest Column
      • Hot Aisle Insight
      • MC Skills Exchange
      • Real (Estate) Talk
  • MULTIMEDIA
    • Podcasts
    • Videos
    • Webinars
    • eNewsletter
  • CONTESTS
    • Top Tier Product Awards
    • Women in Technology
  • RESOURCES
    • Buyer's Guide
    • White Papers
    • Quizzes
    • Case Studies
    • Technical Advisory Board
    • Continuing Education
    • Store
    • Student Section
      • Training and Education
      • Glossary
    • Classifieds
    • DCEP
    • International Data Center Day
  • EMAGAZINE
    • eMagazine
    • Archived Issues
    • Contact Us
    • Advertise
    • Subscribe
Home » Topics » Mission Critical Technologies » Cybersecurity

Cybersecurity
Cybersecurity RSS Feed RSS

CyberSecure Monitoring

2022 Top Tier Products Winner | SECURITY

CyberSecure Monitoring, SolarEdge
August 16, 2022
No Comments

The CyberSecure Monitoring solution by SolarEdge is among the world’s first integrated hardware-based cloud monitoring solutions for critical power infrastructure.


Read More
NERC CIP standards

NERC CIP standards increase requirements for threat visibility, detection for critical infrastructure

Grid modernization has created an explosion of network-connected equipment, exposing utilities to a wide range of potential threats
Ow headshot 200
Gail Ow
August 5, 2022
No Comments

Threat detection and monitoring begins with the addition of network test access points (TAPs) in power plants and substations at multiple levels of a SCADA network.


Read More
Federal tech allocations

New government budgets feature significant increases in tech allocations

A look at upcoming projects
Nabers headshot 200
Mary Scott Nabers
August 4, 2022
No Comments

It appears that technology soon will be a component of almost every type of contracting opportunity in government.


Read More
Backup practices
Guest Column

The ins and outs of the recovery process

Forward thinking about cybersecurity and ransomware starts with backup
Mcgann guest headshot 200
Jim McGann
August 3, 2022
No Comments

Backup practices are not only key to recovery, they’re also key to identifying when an attack has occurred, assessing the impact, and mitigating downtime — or, at least, they should be.


Read More
Flycoin.jpg

Flycoin names Anchorage Digital as a custodian for its token, FLY

The company strengthens its infrastructure and security in safeguarding FLY
July 20, 2022
No Comments

Anchorage Digital is a regulated institutional platform and the first crypto company to receive a national bank charter from the Office of the Comptroller of the Currency (OCC).


Read More
The Cuckoo’s Egg

Could Modern Technology Have Changed the Past?

An analysis of the tools and techniques utilized in “The Cuckoo’s Egg”
Amy al katib200
Amy Al-Katib, CDCDP
July 18, 2022
No Comments

If you haven’t read “The Cuckoo’s Egg,” I highly recommend it; however, it’s not required to proceed.


Read More
Amy-WebImage.jpg
Writing on the Edge

What makes the mission critical?

It’s not all rows upon rows of servers
Amy al katib200
Amy Al-Katib, CDCDP
July 14, 2022
No Comments

If you work in a unique area of the mission critical industry, I want to hear more about it, so I can share it with the rest of the readers too.



Read More
data center trends
Cover Feature

The state of the industry

A yearly update on data center trends, challenges, and opportunities
Amy al katib200
Amy Al-Katib, CDCDP
July 11, 2022
No Comments

Change is one thing the mission critical industry has never lacked, but, it’s safe to say the COVID-19 pandemic ramped up the rate at which it’s taking place. So, what does that mean for the digital transformation, cybersecurity, sustainability, workforce development, the edge, and the cloud? And, what about cryptocurrency, quantum computing, AI, machine learning, AR/VR, and the metaverse?


Read More
post-quantum.jpg

NIST announces international Post-Quantum Cryptography standards using PQShield algorithms

Demand for quantum-ready solutions has been on the rise as companies seek to defend against security threats
July 7, 2022
No Comments

In January, a White House Memorandum called for U.S. government agencies to identify any encryption not compliant with quantum-proof standards and provide a timeline toward transition. Separately, the French national security agency (ANSSI) recommended the immediate introduction of post-quantum defenses throughout the private sector.


Read More
identity security

Lessons from last year’s major data breaches

Enterprises must rethink identity security
Mc kumar bala headshot
Bala Kumar
July 6, 2022
No Comments

With the cybersecurity landscape at a significant turning point, security executives must learn from last year’s major, disruptive breaches to prevent further attacks from impacting their businesses.


Read More
Previous 1 2 3 4 5 6 7 8 9 10 11 12 … 26 27 Next
Subscribe For Free!
  • eMagazine
  • eNewsletter
  • Online Registration
  • Manage My Preferences
  • Subscription Customer Service

More Videos

Popular Stories

Top 25 Women in Technology of 2023

2023 Top 25 Women in Technology

Melissa-Reali-Elliott.jpg

We are the frog

11-Beatriz-Jimenez-wit-780x439.jpg

Beatriz Jimenez | A 2023 Top 25 Women In Technology Winner

2023 Top Tier Products Awards

Events

October 11, 2022

Cellular Glass Insulation’s Impact on Mission Critical Building Design

On Demand This course discusses the performance properties of cellular glass insulation ideal for these facilities as well as example assemblies to help achieve redundancy and durability.


EARN: 1 AIA LU/HSW; 0.1 IACET CEU; 1 PDH

December 30, 2030

Webinar Sponsorship Information

For webinar sponsorship information, visit www.bnpevents.com/webinars or email webinars@bnpmedia.com.

View All Submit An Event

Products

Location Location Connectivity

Location Location Connectivity

See More Products
2023 Top 25 Women in Technology

Get our new eMagazine delivered to your inbox every month.

Stay in the know on the latest data center news and information.

SUBSCRIBE TODAY!
  • Resources
    • Product Info (Free)
    • Security Group
    • Editorial Guidelines
    • List Rental
    • Survey And Sample
    • Custom Content & Marketing
    • Market Research
    • Partners
  • Want More
    • Connect
  • Privacy
    • PRIVACY POLICY
    • TERMS & CONDITIONS
    • DO NOT SELL MY PERSONAL INFORMATION
    • PRIVACY REQUEST
    • UPDATE MY PREFERENCES
    • ACCESSIBILITY

Copyright ©2023. All Rights Reserved BNP Media.

Design, CMS, Hosting & Web Development :: ePublishing