exida explains Blog

Back to Basics 13 - How Do I Start IEC 61508 Certification?

Do you want to know more about IEC 61508 certification, but you’re not sure if you are ready to jump in? Don’t worry, we will make this process as painless as possible.

Read More...

Building Cybersecurity into Software Applications

Back to Basics 12 –  What is IEC 61508 Certification?

Back to Basics 12 –  What is IEC 61508 Certification?

IEC 61508 Certification is a Third-Party Validation against the standard’s requirements, comprising of:

  • Detailed Analysis of engineering processes to determine Systematic Capability and Cybersecurity Strength 
  • Detailed Analysis of hardware design / design margins resulting…

    Read More...

When is an Alarm not an Alarm?

When is an Alarm not an Alarm?

The ISA-18.2 and IEC 62682 standards define an alarm as an “audible and/or visible means of indicating to the operator an equipment malfunction, process deviation, or abnormal condition requiring a timely…

Read More...

Back to Basics 11 – How is SIL Used by an End User?

Back to Basics 11 – How is SIL Used by an End User?

IEC62443 - Learning Cybersecurity (Prevention Techniques)

IEC62443 - Learning Cybersecurity (Prevention Techniques)

Last Saturday, I read an article about hackers who were behind at least two potentially fatal intrusions on oil and gas industrial facilities (Yes I read cyber articles on the weekend Read More...

Back to Basics 10 – How Does a Product Get a SIL?

Back to Basics 10 – How Does a Product Get a SIL?

IEC 61508 functional safety standard indicates Safety Integrity Levels (SIL) needs to be evaluated by three design barriers:

  • The Systematic Capability Rating
  • The Architectural Constraints for the Element
  • The Probability of Failure for the Product
  • Read More...

SCRUM and IEC 62443

SCRUM and IEC 62443

Information Technology (IT) is the personnel, hardware, and software that controls non-physical devices and/or processes such as websites, financial data, personal information, etc. 

Operation Technology (OT) is the personnel, hardware, and software that controls…

Read More...

Back to Basics 09 – Safety Lifecycle – IEC 61511

Back to Basics 09 – Safety Lifecycle – IEC 61511

The IEC 61511 standard recommends the use of a functional safety lifecycle. Any safety lifecycle can be used, but the standard lays out a process which can be divided into three main classifications as…

Read More...

Duty of Care (Too Good to Be True Failure Rate Data)

Duty of Care (Too Good to Be True Failure Rate Data)

I have received several calls lately to our Australia / New Zealand office about whether it is acceptable to use published failure rates that seem too good to be true.

The person calling is…

Read More...

Back to Basics 08 – IEC 61511

Back to Basics 08 – IEC 61511

IEC 61511: 2016 Process Industry Sector

IEC 61511 is a technical standard that sets out practices in the engineering of systems that ensure the safety of an industrial process through the use of instrumentation. It entails…

Read More...

Back to Basics 07– Safety Lifecycle – IEC 61508

Back to Basics 07– Safety Lifecycle – IEC 61508

The IEC 61508 standard recommends the use of a functional safety lifecycle. Any safety lifecycle can be used, but the standard does lay out a nominal 16-step process which can be divided into three…

Read More...

PIU May Only Get You So Far…

PIU May Only Get You So Far…

Back to Basics 06 – IEC 61508

Back to Basics 06 – IEC 61508

In the following series of blogs, we'll go back to basics and run down everything you need to know to get started in functional safety. We'll start with some more general terms and descriptions…

Read More...

Why the Docker Breach is Noteworthy

Why the Docker Breach is Noteworthy

All data breaches expose some type of IT (Information Technology) or OT (Operating Technology) system vulnerability. Cybersecurity professionals then need to evaluate and determine appropriate responses for themselves and their clients. It might be…

Read More...