exida

exida explains Blog

Entries tagged with: ICS Cybersecurity

Cyberattacks Succeed Where Humans and Systems Are Weak

Cyberattacks Succeed Where Humans and Systems Are Weak

Have you noticed that over the last several years, cybersecurity seems to be “trending?” 

Companies of all sizes are starting to learn how to prevent, or at least minimize, these attacks. They hire third-party experts and attend trainings to learn more about the human and system weaknesses that are…

Read More...

How Secure Is Your Safety Instrumented System (SIS)?

How Secure Is Your Safety Instrumented System (SIS)?

As the cybersecurity threats in the industrial world continue to rise, the automation world continues to grapple with how to address these issues.  As such, the newly released IEC61511-1: 2016 edition has included a new clause to address this (Clause 8.2.4).  In essence, End Users have to carry out…

Read More...

Introduction to ICS Security - Pt. 1 - What is ICS Security and Why it Is Important

Introduction to ICS Security - Pt. 1 - What is ICS Security and Why it Is Important

Over the next couple of blogs, I plan to map out the importance of  ISA/IEC-62443/ISA-99 based cybersecurity and how it applies to your work environment.  I'll also explain some of our services so that you can see what might pertain to you.

For part 1, I will start from the beginnning…

Read More...

Introduction to ICS Security - Pt. 4 - Control System Assessments

Introduction to ICS Security - Pt. 4 - Control System Assessments

Over the last couple of blogs, I mapped out the importance of ISA/IEC-62443/ISA-99 based cybersecurity and how it applies to your work environment. 

For part 1, I started from the beginning and outlined what exactly ICS cybersecurity is and why it is important. 

For part 2, I explained the difference between…

Read More...

What can OT learn from IT data breaches?

What can OT learn from IT data breaches?

Does your organization even have a CISO position?

Cybersecurity continues to be an overlooked aspect in organizations—including those owning ICS (Industrial Control System) production facilities. Anyone following the news has most assuredly heard of the plethora of massive data breaches that organizations have endured over the last…

Read More...