- by Ted Stewart, CFSP, exidaCSP
- Wednesday, June 19, 2019
- Industrial Cybersecurity
IEC62443 - Learning Cybersecurity (Prevention Techniques)
Last Saturday, I read an article about hackers who were behind at least two potentially fatal intrusions on oil and gas industrial facilities (Yes I read cyber articles on the weekend
). Besides the fact that I enjoy learning about cybersecurity on my…
Read More...
- by Dave Gunter
- Friday, August 24, 2018
- Industrial Cybersecurity
Managing Risk: How Cybersecurity Differs for Facility Managers
Operations and facility managers have a level of responsibility that requires a great deal of judgment, technical understanding, and the ability to make the right call when managing risk.
Safe, secure, and profitable plant operations are the cornerstones of how a plant manager is judged. The plant manager relies…
Read More...
- by Jeff Davis
- Thursday, June 06, 2019
- Industrial Cybersecurity
SCRUM and IEC 62443
Information Technology (IT) is the personnel, hardware, and software that controls non-physical devices and/or processes such as websites, financial data, personal information, etc.
Operation Technology (OT) is the personnel, hardware, and software that controls physical devices and/or processes such as manufacturing, oil & gas, power, etc. Today, OT has many…
Read More...
- by Rick Smith
- Tuesday, March 31, 2020
- News
Training in 2020 and Beyond. Adapting to COVID-19 with Online Solutions.
Hey everybody. I hope this blog finds you, your family, and your colleagues well. At exida, we appreciate the trust you place in our solutions and services to support you in achieving your functional safety, cybersecurity, and alarm management needs. We are committed…
Read More...
- by Robert J. Michalsky
- Thursday, May 02, 2019
- Industrial Cybersecurity
Why the Docker Breach is Noteworthy
All data breaches expose some type of IT (Information Technology) or OT (Operating Technology) system vulnerability. Cybersecurity professionals then need to evaluate and determine appropriate responses for themselves and their clients. It might be patching software, revising work processes or altering incident response techniques.

…
Read More...