exida

exida explains Blog

Being Prepared in Cyberspace via Threat Modelling

Being Prepared in Cyberspace via Threat Modelling

Preparedness is defined as being in a state of readiness (Webster, 2022).  This can take many different forms but when it comes to cybersecurity, a big part is knowing what threats lie in wait within the cyber landscape.  It’s difficult to prepare against threats or vulnerabilities you don’t know exist.  Being able…

Read More...

Demystifying the Threat Modeling Process

Demystifying the Threat Modeling Process

The thought of tackling a threat model (TM) might not be the most appetizing to some people.   Doing a quick Internet search, someone could get stuck under a mountain of acronyms and terms.  I mean, what is a CVSS anyway?  And then there are the diagrams, attack trees and feedback loops that…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 4)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 4)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here , part 2 here, and part 3 here . Certification provides you with the opportunity to work with an experienced cyber team here at exida, and…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 3)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 3)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here and part 2 here.  Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber…

Read More...

Pipeline Safety and Security – Why are we still not prepared?

Pipeline Safety and Security – Why are we still not prepared?

It’s interesting that I had been preparing a webinar on pipeline safety and security since there have already been numerous incidents reported regarding pipeline accidents and leakage.  Now the latest incident concerning Colonial Pipeline and the ransomware attack by Darkside, a so-called extortion group,…

Read More...

Attack on Florida Water System Highlights Weak Security Protections for Critical Infrastructure

Attack on Florida Water System Highlights Weak Security Protections for Critical Infrastructure

The Oldsmar Water Treatment Facility in Pinellas County Florida was compromised by hackers on February 5th. Hackers took advantage of the TeamViewer application that was still installed on the water facilities network to gain remote access1. The TeamViewer was originally installed to allow for status checks and troubleshooting of…

Read More...

IEC 62443 - The Evolution of IACS Cybersecurity

When we were doing safety system designs in the 1980s, there was no Windows, there was no TCP/IP, there was no in Ethernet. We had to write our own protocols to transmit data to our I/O and our controllers.

Fault-finding was always a challenge . What we ended up…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 2)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 2)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here.  Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber experts worldwide codified in…

Read More...

IEC 62443 Cybersecurity Certification for Medical Devices

IEC 62443 Cybersecurity Certification for Medical Devices

Block that attack!  Getting IEC 62443 Cyber Certified (Part 1)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 1)

This is the next in a series of blogs and papers on the benefits of cyber certification.  Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber experts worldwide codified in the IEC 62443 family of…

Read More...

Block that attack!  Get Certified!

Block that attack!  Get Certified!

This is the first in a series of blogs and papers on the benefits of cyber certification.  Certification provides you with the opportunity to work with an experienced cyber team here at exida,.  It also allows you to gain access to our network of cyber experts worldwide codified…

Read More...

Grasping the Power of the (Stuxnet) Virus (or What I did during the COVID-19 Pandemic)

Grasping the Power of the (Stuxnet) Virus (or What I did during the COVID-19 Pandemic)

The travel and group meeting restrictions from COVID-19 have allowed me to catch up on some reading about viruses; not the type that get transmitted to humans. This article is about the Stuxnet virus and what I learned from the book “Countdown to Zero Day: Stuxnet and the Launch of…

Read More...

With Many Automation Professionals Working From Home Cybersecurity Exposure is Rising

With Many Automation Professionals Working From Home Cybersecurity Exposure is Rising

One of the commonly targeted pathways into an Industrial Automation and Control System (IACS) is through compromised remote access such as Virtual Private Networks (VPNs) and Remote Desktop Protocol (RDP). During the Stay at Home Orders and other self-quarantining measures around the globe to combat the COVID-19 pandemic, many…

Read More...

The Non-Hackable System – Wait a Minute, What?

The Non-Hackable System – Wait a Minute, What?

I had the privilege to attend the CDS-forum in Trondheim, Norway on October 15, 2019. The CDS-forum is a Norwegian Industry Forum for Cybersecurity of Industrial Automation and Control Systems. The forum is a co-operation between oil companies, engineering oil companies, consultants, vendors and researchers, with a…

Read More...

Are Your Control Systems Really Protected?

Are Your Control Systems Really Protected?

I don’t know whether you’ve noticed recently, but the number of cybersecurity alerts issued by CISA (Cybersecurity and Infrastructure Security Agency) seems to be increasing at an alarming rate.  The latest alert I’ve seen now relates to GPS tracking systems for children.  A device which is supposed to keep…

Read More...