exida

exida explains Blog

Benefits of Using IEC 62061 Machine Safety Templates

Benefits of Using IEC 62061 Machine Safety Templates

Why would someone consider purchasing templates as a starting point? First off, it decreases the amount of time and energy it takes to build out the program. If you think about starting from a blank page, as opposed to starting with something that is 80 to 90% of the…

Read More...

The Importance Of Considering Common Cause with Redundant Systems

The Importance Of Considering Common Cause with Redundant Systems

Common Cause is one of those variables that is not always considered important when it comes to SIL compliance.  And yet, for redundant systems, it can have a significant impact on the PFDavg and Risk Reduction achieved (in Low Demand mode) or PFH (in high or continuous mode).  Most of the…

Read More...

Why Functional Safety Management is Important for Machine Safety

Why Functional Safety Management is Important for Machine Safety

Functional Safety Management (FSM) is important for a few key reasons. First, it governs the entire machine safety lifecycle. Regardless of which standards we pick, we need to have the management plan in place to make sure we follow those steps and that we do them consistently. 

Allocating lifecycle…

Read More...

Machinery Accidents - Today’s Harsh Reality

Machinery Accidents - Today’s Harsh Reality

During 2017, there were over 36,000 injuries related to machinery in the United States. There were 6200 non-fatal amputations, nearly 60% involving machinery. There were close to 3000 fatalities in 2019. Machine accidents are often overlooked because there aren't multiple fatality explosions or major news events like you see…

Read More...

IEC 61508 – Two Key Fundamental Concepts

IEC 61508 – Two Key Fundamental Concepts

We want our system to work. We're going to do everything we can to make it work properly. If it doesn't work, we want it to fail in a predictable and hopefully safe manner. If the failure modes are predictable, we can design the equipment to be fail safe.…

Read More...

Creating a Cyber Hygiene Plan

Creating a Cyber Hygiene Plan

One of the things that automation companies are beginning to do is to plan for cyber hygiene. More and more companies are implementing automation specific awareness training for their employees. They conduct periodic exercises which like sending phishing emails to see who if you respond. They might leave USB…

Read More...

Automation Cybersecurity - Myths vs. Reality

Automation Cybersecurity - Myths vs. Reality

In today’s automation systems environment, certain myths continue to persist. For example, "cyber attacks are only a concern for big companies".  Although it may be less likely to be targeted by, say, a nation state attack, we’ve seen that malware can cause a shutdown of a system or trigger a…

Read More...

Why is Cybersecurity Hygiene Important for Automation Systems?

Why is Cybersecurity Hygiene Important for Automation Systems?

Cybersecurity incidents have shown that there can be major consequences for automation systems. There have been incidences where attackers have been able to manipulate the human resource interface console directly. It was only by chance that an operator in one particular instance happened to notice that his mouse pointer…

Read More...

Automation Cybersecurity: IT vs OT - Differing Priorities

Automation Cybersecurity: IT vs OT - Differing Priorities

Before you can dive in and look at the core concept of automation cybersecurity, it's helpful to first define it. Automation cybersecurity is the prevention of intentional or unintentional interference with proper operation of automation systems including industrial controls, smart manufacturing,  and IIOT systems through the use of computers,…

Read More...

FMEDA Webinar Series Playlist Now Available

FMEDA Webinar Series Playlist Now Available

As the inventor of the FMEDA process, our experts planned a series of eight webinars introducing FMEDA concepts and methods available in the Youtube playlist below.

The series starts with an introduction for the beginner, quickly moves to medium level topics, and finally, at the end, covers the more…

Read More...

What is a FMEDA?

What is a FMEDA?

In the 1980’s, there was a raging debate in the functional safety committee about redundancy versus diagnostics. Some said functional safety could only be achieved with redundant systems. This was strongly supported by Triple Modular Redundant (2oo3) safety PLC vendors. 

Others argued that diagnostics would be an equal or…

Read More...

Is IEC 62443 a Good Solution for IIoT Security?
  • by Hrishit Joshi
  • Thursday, March 23, 2023

Is IEC 62443 a Good Solution for IIoT Security?

Internet of things or IoT can be defined as the interconnection via the internet of computing devices embedded in everyday objects enabling them to send and receive data. The Internet of Things is revolutionizing the way we operate our systems today. As IIoT (Industrial IoT) devices and gateways populate the industrial…

Read More...

The Cuckoo’s Egg & How it Relates to Cybersecurity

The Cuckoo’s Egg & How it Relates to Cybersecurity

Let me be the first to say that I don’t normally do book reviews.  Frankly, I thought I left them behind years ago when they were required assignments for my undergraduate classes.  Nevertheless, I find myself writing one today, not because I must, but because there are so many cybersecurity professionals…

Read More...

Why Data Science Knowledge is Required in Alarm Management

Why Data Science Knowledge is Required in Alarm Management

The alarm system is a daily encounter for most operations across different industries. For oil and gas, the alarm system alerts and reminds the operation to take action(s) to revert the process back to the normal operating range. For pharmaceuticals and batch operations, the alarm system can be used…

Read More...

Are You Measuring the Performance of Your SIS?

Are You Measuring the Performance of Your SIS?

I’ve been teaching our FSE100 course now for nearly 10 years and it always amazes me that when teaching the course, the number of times I find that end users in the class are not really measuring the performance of their SIS.  In most cases, they are doing…

Read More...