- by Rick Smith
- Tuesday, March 31, 2020
- News
Training in 2020 and Beyond. Adapting to COVID-19 with Online Solutions.
Hey everybody. I hope this blog finds you, your family, and your colleagues well. At exida, we appreciate the trust you place in our solutions and services to support you in achieving your functional safety, cybersecurity, and alarm management needs. We are committed…
Read More...
- by Robert J. Michalsky
- Wednesday, February 13, 2019
- Industrial Cybersecurity
What can OT learn from IT data breaches?
Does your organization even have a CISO position?
Cybersecurity continues to be an overlooked aspect in organizations—including those owning ICS (Industrial Control System) production facilities. Anyone following the news has most assuredly heard of the plethora of massive data breaches that organizations have endured over the last…
Read More...
- by Patrick O'Brien
- Monday, November 27, 2023
- Industrial Cybersecurity
What is a Pragmatic Approach to Cybersecurity?
Now that we have a little bit of context on what's driving our current cybersecurity landscape. The next question is, “where does this pragmatic approach come in? What is a pragmatic approach? What does the word pragmatic mean? The dictionary definition is dealing with things sensibly and realistically in a…
Read More...
- by Iwan van Beurden, CFSE
- Tuesday, January 17, 2012
- Certification
Why am I not on “the list?”
Many will agree that exida's Safety Equipment Reliability Handbook (SERH) and the Safety Automation Equipment List (SAEL) are very useful tools for choosing products to use in safety instrumented systems. The SAEL shows a product’s IEC 61508 and cyber security…
Read More...
- by Steve Gandy, CFSP
- Monday, June 12, 2023
- Industrial Cybersecurity
Why is Cybersecurity Hygiene Important for Automation Systems?
Cybersecurity incidents have shown that there can be major consequences for automation systems. There have been incidences where attackers have been able to manipulate the human resource interface console directly. It was only by chance that an operator in one particular instance happened to notice that his mouse pointer…
Read More...
- by Robert J. Michalsky
- Thursday, May 02, 2019
- Industrial Cybersecurity
Why the Docker Breach is Noteworthy
All data breaches expose some type of IT (Information Technology) or OT (Operating Technology) system vulnerability. Cybersecurity professionals then need to evaluate and determine appropriate responses for themselves and their clients. It might be patching software, revising work processes or altering incident response techniques.

…
Read More...