June 30, 2025
summary for facility management professional, building owners and IT professionals who are interested in building security and Facility IT.
The U.S. National Institute of Standards and Technology (NIST) has observed in a discussion essay a growing convergence between OT (operational technology (OT) and IT, driven by the rise of the Internet of Things (IoT) and internet-connected equipment that were once isolated. OT infrastructure covers programmable systems and devices that directly interact with or control the physical environment. Covering industrial control systems (ICS), building automation, transportation networks, access control, and systems for monitoring or measuring physical conditions, these systems have longer life cycles, are sometimes difficult to access, and increasingly connect to broader networks rather than operating in isolation. Read more
Key takeaways:
Nearly every Windows user has had a run-in with the infamous “Blue Screen of Death” at some point in their computing life. Now, after more than 40 years of being set against a very recognizable blue, the updated error message will soon be displayed across a black background. Read more
The FBI and cybersecurity firms are warning that the prolific hacking group known as Scattered Spider is now targeting airlines and the transportation sector.
Scattered Spider is a collective of mostly English-speaking hackers, typically teenagers and young adults, who are financially motivated to steal and extort sensitive data from company networks. The hackers are also known for their deception tactics, which often rely on social engineering, phishing, and sometimes threats of violence toward company help desks and call centers to gain access to their networks, and sometimes deploy ransomware. Read more
Accenture’s “State of Cybersecurity Resilience 2025” report is based on a survey of 2,286 cybersecurity and technology executives from large organizations around the globe. It reveals that the rapid AI adoption has dramatically accelerated the speed, scale and sophistication of cyber threats, far outpacing current enterprise cyber defenses. For example, more than three-quarters (77%) of organizations lack the essential data and AI security practices needed to protect critical business models, data pipelines and cloud infrastructure. Read more
With the damages from cybercrime growing ($16 billion in U.S. damages in 2024 alone), human error remains the leading cause of breaches—but also the greatest opportunity for improvement. Companies need to invest in building a human-centered security culture. Leaders can do so by following a three-step strategy that builds on Neidert’s Core Motives Model and Cialdini’s influence principles: (1) Connect by building trust and rapport; (2) Reduce uncertainty through modeling and peer examples; and (3) Inspire action using nudges, public commitments, and incentives. The authors emphasize that awareness alone isn’t enough—leaders must foster real behavioral change. When done right, security becomes a shared cultural norm, not just a compliance task. Read More
Comments will be approved before showing up.
July 01, 2025
New BACstac/DN Release + Smart Sensors for Building Efficiency & Training Opportunities
May 29, 2025
Midyear Roundup: Nation-State Cyber Threats in 2025, The Current Cybersecurity Landscape, Explained - J.P. Morgan, Why AI Is The New Cybersecurity Battleground and more...
May 01, 2025
BACnet User Group June 12, Energy Optimisation with Analytika, April Cybersecurity news, Cybersecurity course from BACnet international and more...