exida

exida explains Blog

Entries tagged with: Dave Johnson

Block that attack!  Get Certified!

Block that attack!  Get Certified!

This is the first in a series of blogs and papers on the benefits of cyber certification.  Certification provides you with the opportunity to work with an experienced cyber team here at exida,.  It also allows you to gain access to our network of cyber experts worldwide codified…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 1)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 1)

This is the next in a series of blogs and papers on the benefits of cyber certification.  Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber experts worldwide codified in the IEC 62443 family of…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 2)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 2)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here.  Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber experts worldwide codified in…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 3)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 3)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here and part 2 here.  Certification provides you with the opportunity to work with an experienced cyber team here at exida, and the vast knowledge of cyber…

Read More...

Block that attack!  Getting IEC 62443 Cyber Certified (Part 4)

Block that attack!  Getting IEC 62443 Cyber Certified (Part 4)

This is the next in a series of blogs and papers on the benefits of cyber certification. You can read part 1 here , part 2 here, and part 3 here . Certification provides you with the opportunity to work with an experienced cyber team here at exida, and…

Read More...

Performing a Cybersecurity Risk Assessment as a Component of the PHA

There are three main components of the safety lifecycle: analysis, realization, and operation. We will be taking a look at the analysis phase, particularly related to the cyber industry.

To start, the first thing to do in both safety and security is do a detailed process, hazard and…

Read More...

Preventing Cyberattacks by Following Practical Guidance in IEC 62443

Preventing Cyberattacks by Following Practical Guidance in IEC 62443

Isn’t it frustrating when you experience an event that disrupts operations and then discover it could have been prevented? Very often a detailed analysis will reveal that a combination of (preventable) mistakes and unknown factors caused the incident. Training can help the mistakes, but dealing with the unknowns is a little…

Read More...