- by Bill Thomson
- Tuesday, August 10, 2021
- Certification
Closing Two Common IEC 62443 Compliance Gaps
Two common gaps exida encounters when evaluating vendor compliance against the IEC 62443-4-1, IEC 62443-4-2 and IEC 62443-3-3 standards are:
- Inadequate or unclear Security Guidelines.
- A lack of documentation on the security audit records (AKA logs).
Improving compliance in these areas is also a very cost-effective…
Read More...
- by Bill Thomson
- Tuesday, October 08, 2024
- Industrial Cybersecurity
Threat Modeling: How to Succeed at this High Value and High Effort Cybersecurity Activity
Threat Modeling (TM) is a process for identifying and prioritizing potential cybersecurity threats to software, hardware or a system. Contributing to the high value of TM is:
- The ability to identify threats early in the design process when they are less expensive to address
- Methodically prioritizing threats helps…
Read More...