Cybersecurity News and Headlines
  • All Technology
  • AI
  • Autonomy
  • B2B Growth
  • Big Data
  • BioTech
  • ClimateTech
  • Consumer Tech
  • Crypto
  • Cybersecurity
  • DevOps
  • Digital Marketing
  • Ecommerce
  • EdTech
  • Enterprise
  • FinTech
  • GovTech
  • Hardware
  • HealthTech
  • HRTech
  • LegalTech
  • Nanotech
  • PropTech
  • Quantum
  • Robotics
  • SaaS
  • SpaceTech
AllNewsDealsSocialBlogsVideosPodcastsDigests

Cybersecurity Pulse

EMAIL DIGESTS

Daily

Every morning

Weekly

Sunday recap

NewsDealsSocialBlogsVideosPodcasts
CybersecurityNewsFrom IT Controls to Engineering Resilience: Rethinking Smart Building Cybersecurity
From IT Controls to Engineering Resilience: Rethinking Smart Building Cybersecurity
PropTechCybersecurity

From IT Controls to Engineering Resilience: Rethinking Smart Building Cybersecurity

•February 20, 2026
0
Buildings.com
Buildings.com•Feb 20, 2026

Why It Matters

When security controls become single points of failure, building safety, comfort, and operational continuity are jeopardized, turning protective measures into new hazards.

Key Takeaways

  • •IT security controls can disrupt building control loops
  • •Legacy BMS devices lack support for frequent credential changes
  • •Fail‑safe design prevents safety loss when security fails
  • •Zero‑trust should protect access, not deterministic control paths
  • •Testing security failures like power outages improves resilience

Pulse Analysis

The rapid adoption of IoT sensors, cloud‑based analytics, and remote management has turned ordinary office towers into data‑rich smart buildings. Facility managers, eager to apply familiar IT safeguards, often install encryption, mutual authentication, and zero‑trust gateways across building automation networks. While these measures protect against external intrusion, they ignore the deterministic timing and long‑life hardware that underpin HVAC, lighting, and access systems. As the article’s HVAC case illustrates, a missed certificate renewal can halt controller communication, leaving occupants uncomfortable and operators locked out—demonstrating that a pure IT mindset can create operational hazards.

An engineering‑led cybersecurity model reframes protection as a component of system reliability rather than a separate perimeter. Controls are placed on user‑level interfaces and remote‑access points, while the core control loops remain open, deterministic, and capable of failing to a safe state. Designers embed fail‑safe logic so that, if authentication or encryption services drop, devices revert to predefined operating modes instead of shutting down. Routine drills now include simulated certificate expirations and network segmentation failures, ensuring that operators retain authority and that safety thresholds are maintained even when security subsystems misbehave.

Industry standards such as BACnet/SC signal a move toward native security, yet legacy equipment will dominate for decades, forcing owners to retrofit without compromising performance. Vendors are responding with lightweight cryptographic modules and credential‑rotation tools tailored to low‑power controllers, but adoption hinges on clear ROI and risk‑based justification. Building owners should audit control paths, segregate networks by physical function, and mandate that any security control includes a documented safe‑fail procedure. By treating cybersecurity as an engineering discipline, the sector can safeguard occupants while preserving the operational continuity that defines a resilient smart building.

From IT Controls to Engineering Resilience: Rethinking Smart Building Cybersecurity

Read Original Article
0

Comments

Want to join the conversation?

Loading comments...