Carol Rudinschi, PhD

Carolina Rudinschi, PhD,  author of a Digital Media Book, brings  a wealth of experience in Research, Journalism, Public Relations and Social Media. Certifications include: Google Adwords Certified Specialist (Search & Mobile), Hootsuite Certified Professional, Facebook BluePrint & Digital Marketing Certification from University of Illinois. She has a PhD in Digital Journalism & Media and is experienced in running campaigns on Google AdWords, Facebook, Twitter, LinkedIn.

Carolina has an engagement in the global influencer program of Siemens AG. This is NOT an endorsement of SIEMENS AS products or services. It is Carolina’s role to encourage SIEMENS AG to think more openly and engage in a wider community. Carolina is independent in her work in this wider community and provides a unique set of insights accordingly to those willing to listen.

Carolina participates/participated in influencer & analysts programs with ABB, Hewlett Packard Enterprises, IBM, Schneider Electric, PTC.

Simple NIST cybersecurity Compliance for Manufacturing
· Cybersecurity

Simple NIST cybersecurity Compliance for Manufacturing

As industrial technology advances, manufacturers are increasingly using cloud, data analytics and mobile to improve their connectivity and infrastructure. This means a larger attack surface which creates a rich target for threats that cause physical damage, facility downtime, and breaches of customer data and intellectual property. To help manufacturing organizations reduce cybersecurity risk, NIST published […]

Read more →
Chris Churilo, Director of Product Marketing
· Our Contributors

Chris Churilo, Director of Product Marketing

Chris Churilo is responsible for Product Marketing at InfluxData. Prior to joining InfluxData, she defined and designed a SaaS monitoring solution at Centroid, and prior to that she was the VP of product management at iPass and was the LOB for several cloud services that required her to track the business and operational metrics and […]

Read more →
Why smart buildings represent a great business opportunity
· Smart Buildings

Why smart buildings represent a great business opportunity

Buildings are an integral part of everyday life. With people spending an estimated 90 percent of their lives indoors, the drive to ensure that those buildings are comfortable, safe, secure and provide the functionality that we want is more important than ever. But how do we take what are essentially inanimate, silent and passive structures and turn them into living […]

Read more →
How to Actively Secure Your Industrial Environment In the New Era of Distrust
· Cybersecurity

How to Actively Secure Your Industrial Environment In the New Era of Distrust

Today’s sophisticated Operations Technology (OT) environments have a large attack surface with numerous attack vectors. Without complete coverage, the likelihood of getting attacked is not a matter of ‘if’; it’s a matter of ‘when’. Security for OT has gained significant attention due to a confluence of events. Up until only recently the IT infrastructure played front […]

Read more →
Attack Vectors in the… Trillions?
· Cybersecurity

Attack Vectors in the… Trillions?

The growing attack surface of the new Industry 4.0 internet is a big problem. On this everyone agrees. But underneath the headlines and the frequent “patch now” warnings from firewall vendors is a more ominous reality few are talking about: the exponential vector problem. Yes, the attack surface is huge and growing. 127 new devices per second are […]

Read more →
Galina Antova, Co-Founder
· Our Contributors

Galina Antova, Co-Founder

Galina Antova is the co-founder and chief business development officer at Claroty. Prior to co-founding the company, she was the global head of industrial security services at Siemens, overseeing the development of its portfolio of services that protect industrial customers against cyberattacks. While at Siemens, she was also responsible for leading the Cyber Security Practice […]

Read more →
Six criteria to consider when evaluating industrial cybersecurity solutions
· Cybersecurity

Six criteria to consider when evaluating industrial cybersecurity solutions

Converged infrastructure is only as valuable as it is secure. Attacks on critical infrastructure have grown in frequency and sophistication as bad actors, including nation states, seek to disrupt or disable essential services or to gather intelligence into strategic operations and planning.  The damages of a breach have been well documented. Billions of records have […]

Read more →
Faran Rolingson, Engineer
· Our Contributors

Faran Rolingson, Engineer

Faran Rolingson is an ELEC/I&C Engineer (PO B) at Tennessee Valley Authorities. Faran has a BS in Electrical Engineering and a Master’s degree in Engineering Management from New Jersey Institute of Technology. Before joining TVA, Faran worked as a Senior Control Engineer for Alabama Power where he was involved with several iterations and implementation of […]

Read more →
New business opportunities using IIoT and analytics
· Connected Industry

New business opportunities using IIoT and analytics

New business opportunities for IIoT Today, manufacturers around the world are seeking new ways to meet market needs, improve products, optimize operations, increase revenues, and reduce costs and risk. Automation, digitalization, and the adoption of IIoT are important requirements for companies that wish to lower costs, drive new efficiencies, and find new business opportunities with […]

Read more →
The Five Phases of Successful IIoT Implementation
· Connected Industry

The Five Phases of Successful IIoT Implementation

The Internet of Things (IoT) is changing the way we live. Having become ubiquitous in the consumer economy, IoT is now emerging as a force in every industry including manufacturing, energy utilities, healthcare, transportation and building technologies. This is no coincidence. The Internet of Things creates measurable value for private and public organizations alike. The […]

Read more →