exida

exida explains Blog

Why is Cybersecurity Hygiene Important for Automation Systems?

Why is Cybersecurity Hygiene Important for Automation Systems?

Cybersecurity incidents have shown that there can be major consequences for automation systems. There have been incidences where attackers have been able to manipulate the human resource interface console directly. It was only by chance that an operator in one particular instance happened to notice that his mouse pointer…

Read More...

Automation Cybersecurity: IT vs OT - Differing Priorities

Automation Cybersecurity: IT vs OT - Differing Priorities

Before you can dive in and look at the core concept of automation cybersecurity, it's helpful to first define it. Automation cybersecurity is the prevention of intentional or unintentional interference with proper operation of automation systems including industrial controls, smart manufacturing,  and IIOT systems through the use of computers,…

Read More...

FMEDA Webinar Series Playlist Now Available

FMEDA Webinar Series Playlist Now Available

As the inventor of the FMEDA process, our experts planned a series of eight webinars introducing FMEDA concepts and methods available in the Youtube playlist below.

The series starts with an introduction for the beginner, quickly moves to medium level topics, and finally, at the end, covers the more…

Read More...

What is a FMEDA?

What is a FMEDA?

In the 1980’s, there was a raging debate in the functional safety committee about redundancy versus diagnostics. Some said functional safety could only be achieved with redundant systems. This was strongly supported by Triple Modular Redundant (2oo3) safety PLC vendors. 

Others argued that diagnostics would be an equal or…

Read More...

Is IEC 62443 a Good Solution for IIoT Security?
  • by Hrishit Joshi
  • Thursday, March 23, 2023

Is IEC 62443 a Good Solution for IIoT Security?

Internet of things or IoT can be defined as the interconnection via the internet of computing devices embedded in everyday objects enabling them to send and receive data. The Internet of Things is revolutionizing the way we operate our systems today. As IIoT (Industrial IoT) devices and gateways populate the industrial…

Read More...

The Cuckoo’s Egg & How it Relates to Cybersecurity

The Cuckoo’s Egg & How it Relates to Cybersecurity

Let me be the first to say that I don’t normally do book reviews.  Frankly, I thought I left them behind years ago when they were required assignments for my undergraduate classes.  Nevertheless, I find myself writing one today, not because I must, but because there are so many cybersecurity professionals…

Read More...

Why Data Science Knowledge is Required in Alarm Management

Why Data Science Knowledge is Required in Alarm Management

The alarm system is a daily encounter for most operations across different industries. For oil and gas, the alarm system alerts and reminds the operation to take action(s) to revert the process back to the normal operating range. For pharmaceuticals and batch operations, the alarm system can be used…

Read More...

Are You Measuring the Performance of Your SIS?

Are You Measuring the Performance of Your SIS?

I’ve been teaching our FSE100 course now for nearly 10 years and it always amazes me that when teaching the course, the number of times I find that end users in the class are not really measuring the performance of their SIS.  In most cases, they are doing…

Read More...

New Year’s Resolution: Plan for OT Cybersecurity

New Year’s Resolution: Plan for OT Cybersecurity

The New Year is a great time to make resolutions, but often as the weeks pass, these resolutions fall to the back burner. A study completed in 2016 showed that less than 25% of those who set a resolution successfully followed that resolution for a year.1 When we think about…

Read More...

The Perfect Match of Lockpicking and Cybersecurity

The Perfect Match of Lockpicking and Cybersecurity

First off, an introduction is in order. My name is Greg Houser, and I’m one of the new fish here at exida (no, that’s not a typo – the ‘e’ is lowercase in “exida”).  And…

Read More...

To Be Meaningful & Useful Failure Rates Must Be Validated

To Be Meaningful & Useful Failure Rates Must Be Validated

Engineers and managers who work with safety equipment have likely seen a failure rate of some kind quoted for the equipment.  Some equipment even comes with a safety certification stating the failure rate given certain assumptions about how the equipment will be used.

The numbers sometimes turn out to be…

Read More...

Evolution of Engineering Design – Advanced Diagnostics vs Redundancy

Evolution of Engineering Design – Advanced Diagnostics vs Redundancy

I recently studied the design changes made on the T series of old British cars (a hobby) made by the MG Company in England from 1936-1955.  Models progressed over that time period including the TA, TB, TC, TD, and TF.  I noted a strange looking two position switch on the dash…

Read More...

Functional Safety Assessments – Why Aren’t They Being Done?

Functional Safety Assessments – Why Aren’t They Being Done?

It’s an interesting fact that many end users and engineering companies that I’ve talked to have not or do not undertake Functional Safety Assessments (FSAs).  Why is this?  My view is that many do not realize and/or understand the true purpose of and benefit of performing FSAs.  The IEC61511 standard identifies 5…

Read More...

Getting Failure Rate Data on a New Component

Getting Failure Rate Data on a New Component

What ASIL is a software tool?

What ASIL is a software tool?

TL;DR Tools used in developing safety related automotive systems do not receive an ASIL. Some tools and the way they are used may not be suitable for the development of automotive safety electronics and this depends on the ASIL. When a tool vendor mentions an ASIL they might be…

Read More...