Technical Articles

Bedrock Automation has published these technical articles:

(Industrial Automation Services)
From this Article:
This white paper is the first in a series to outline a new epoch of industrial automation. All aspects of control system reliability, security and lifecycle cost have been rethought from first...
(Industrial Automation Services)
From this Article:
This white paper is the second in a series to describe a new epoch of industrial automation. All aspects of industrial control system (ICS) reliability, security and lifecycle cost have been rethought...
(Security Software)
From this Article:
All aspects of industrial control system (ICS) design have been rethought and rebuilt in the Bedrock™ system. The result is a new platform we call Open Secure Automation. OSA™ delivers...
(Industrial Computing)
From this Article:
This document defines the assessment criteria, and processes used to produce a quantitative evaluation of different vendor's Industrial Control System (ICS) offerings. It is intended to be used as a...
(Industrial Computing)
From this Article:
Traditionally, most oil and gas production sites used a flow computer at the wellhead for measurement and simple control functions, and a PLC at a central facility for more sophisticated control....
(Power Supplies)
From this Article:
Traditional industrial power supplies are ill-equipped to meet the demands of the digital age. While they were once an integral component of industrial automation systems and poised to evolve along...
(Flow Sensing)
From this Article:
This review by an oil & gas LACT specialist looks at how integrating flow measurement and PLC control can improve oil & gas custody transfer...
(Flow Sensing)
From this Article:
Small discrepancies in custody transfer calculation can make a big difference on the bottom line of an oil & gas producer...
(Security Software)
From this Article:
Securing a control system is a process, not a one and done task. The strategy combines defense in depth with continuous improvement. The intent here is more a tour of concepts than a prescription for...
(Security Software)
From this Article:
The Russellville Water and Sewer System has replaced a legacy PLC with a secure Bedrock™ industrial control system. Bedrock certified solution provider Brown Engineers, of Little Rock, Arkansas,...
(Industrial Computing)
From this Article:
Dr. Rida Hamza, VP, Critical Infrastructure Protection at the global engineering firm Parsons, sees the Industrial Internet of Things (IIoT) unlocking new levels of productivity, helping organizations...
(Industrial Computing)
From this Article:
In a recent Dark Reading feature, Kelly Higgins Jackson describes how cyber threats to aging industrial operational technology have advanced from simple malware vulnerabilities and lack of security...
(Industrial Computing)
From this Article:
The City of Lynchburg Wastewater Treatment plant finds inspiration in its Bedrock® platform - leveraging its power, flexibility and simplicity to deliver multiple solutions faster and more cost...
(Security Software)
From this Article:
It's that time of the year and everybody is making predictions. IoT World Today has joined in the crystal gazing, sharing predictions gleaned from discussions with cyber security service providers....
(Industrial Computing)
From this Article:
Applied Risk, a Netherlands-based engineering firm specializing in cyber security for operational technology, has developed a report on The State of Industrial Cyber Security 2019. It analyzes the...
(Data Acquisition Products)
From this Article:
Recent data collected in relation to the Future Midstream Automation Conference indicates that midstream companies are upping their spending on digitalization - but needing more help in justifying...
(Industrial Computing)
From this Article:
The city of Hot Springs, Arkansas projected that its antiquated filter controls would not be adequate to meet anticipated future demands. The open object-oriented system design capability of Bedrock's...
(Industrial Computing)
From this Article:
Although a recent MIT paper introducing the concept of cybersafety is not light reading, it is must reading for anyone serious about industrial control system cyber security...
(Oil, Gas and Mining Equipment)
From this Article:
Companies with geographically dispersed operations, such as upstream and midstream oil and gas facilities, can benefit from the increased ability to monitor and control those installations remotely...
(Industrial Computing)
From this Article:
The concerns about industrial power supplies that cybersecurity authority Joe Weiss raised in his "Unfettered" Controlglobal.com blog in 2018 are even more valid today....
(Industrial Computing)
From this Article:
The National Counterintelligence and Security Center (NCSC) has issued new guidance for supply chain risk management, acknowledging risks throughout the lifecycle of supply chains and making...
(Industrial Computing)
From this Article:
important information at a time when ransomware perpetrators are beginning to target industrial operations....
(Industrial Computing)
From this Article:
"Trust everyone - but cut the cards," is essentially the premise of Zero Trust cyber security. Zero Trust assumes that everyone or everything with access to your digital systems has inappropriate...
(Industrial Computing)
From this Article:
A recent study from Rystad Energy Group estimates that automation and digitalization can save upstream operators $100 billion in the 2020s, which represents about 10 percent of their 2018 spend...
(Networking Equipment)
From this Article:
Ransomware has targeted personal accounts and IT but until now has not had much impact on OT. A mysterious new form of ransomware is targeting those that use industrial control systems. Read m...
(Industrial Computing)
From this Article:
The importance of more open, secure, and integrated automation....
(Networking Equipment)
From this Article:
The best alternative and most modern approach to ICS cybersecurity is to ensure that it is built in or secure by design. This requires layering strong authentication of the ICS hardware, firmware,...
(Data Acquisition Products)
From this Article:
The Boston Consulting Group (BCG) sets $37 a barrel as the best possible oil price by the end of 2020....
(Flow Sensing)
From this Article:
a user's perspective on the potential of integrated control and flow measurement....
(Industrial Computing)
From this Article:
On May 1, 2020, President Trump declared a national emergency with respect to the threat to the U.S. bulk-power systems and issued an executive order prohibiting federal agencies and U.S. persons from...
(Industrial Computing)
From this Article:
The National Security Agency (NSA) and the Cybersecurity and Infrastructure Security Agency (CISA) have urged critical infrastructure facilities to take immediate action to secure their operational...
(Data Acquisition Products)
From this Article:
How OPC UA and MQTT work with built-in cybersecurity to reduce costs and improve safety across your infrastructure...
(Industrial Computing)
From this Article:
The mining industry was among the hardest hit by the COVID-19 pandemic, but, according to recent analysis by McKinsey & Company, it is in recovery - fueled in part by lower energy prices. As it does...
(Networking Equipment)
From this Article:
Like other automation standards, OT cyber security standards are evolving to accommodate technological and business changes. One OT cyber security expert looks at the limitations of the Purdue model...
(Networking Equipment)
From this Article:
Operational technology is essential for resilience, but it too must be resilient....
(Batteries and Accessories)
From this Article:
With Li-ion technilogy at their core, m UPSs are evolving in many other ways to optimize reliability at the edge....
(Industrial Computing)
From this Article:
Ransomware attacks on ICS are on the rise and the OT data and functions hosted by Windows applications are the most vulnerable....
(Industrial Computing)
From this Article:
Digital transformation isn't just for automating process operations. It is potentially changing the way that capital projects will be delivered, reducing the cost and speeding time to value for major...
(Networking Equipment)
From this Article:
Cyber security discussions are often somber, but there is some hope. More than 4,000 executives shared their assessment of the state of cyber security with Accenture and expressed both optimism and...
(Networking Equipment)
From this Article:
Zero trust cyber security is coming to the industrial space. Here are 10 best practices for automation vendors that want to build zero trust security into their products and supply chains....
(Networking Equipment)
From this Article:
The more visibility an automation manufacturer has into its electronics supply chain, the lower the risk of any component being a malware carrier. Bedrock Automation has more visibility into its...
(Industrial Computing)
From this Article:
If you have ever had doubts that electronic component counterfeiting is real, this 2017 article on the website Ataviat will likely change your mind....
(Industrial Computing)
From this Article:
In a recent Automation.com editorial, editor Bill Lydon calls for increased vendor compliance and certification to open interoperable programming standards...
(Industrial Computing)
From this Article:
As countries, states and businesses begin to reopen, we do so with cause and some anticipation. Deloitte & Touche explores this in a recent report titled: Embedding trust into COVID-19 recovery, in...
(Networking Equipment)
From this Article:
The CISA, the FBI, and the DoD have issued a malware report warning about the dangerous new TAIDOOR malware variant....
(Industrial Computing)
From this Article:
The Florida water plant that was the subject of a cyber-attack last week may have dodged a bullet, but it highlights the vulnerability of the nation's water supplies and the need for better security...
(Networking Equipment)
From this Article:
A 2020 report puts the water industry behind only the energy and manufacturing sectors in terms of the number of exploitable cyber-vulnerabilities with a 122% increase over 2019. The AWWA has issued...
(Power Supplies)
From this Article:
Uninterruptible power supplies (UPSs) are evolving to deliver the high continuity needed in the digital age and battery technology is evolving with them. In this Automation.com feature, Bedrock...
(Industrial Computing)
From this Article:
Article identifies upstream compressors, tanks, lease automated custody transfer (LACT) units, rectifiers, test points, pipeline inspection gauges (PIGs) and gas meters as assets that could benefit...
(Industrial Computing)
From this Article:
Despite being visionaries in implementing intrinsic cyber security, we don't have a crystal ball into the future of cyber events, but we do have plenty of informed opinions. Here are some of our...
(Application Development and Deployment Software)
From this Article:
"No one learns secure PLC coding at school," said cyber security consultant Jake Brodsky at a 2020 S4 conference. Today he has joined forces with other ICS cyber security industry leaders in a project...
(Application Development and Deployment Software)
From this Article:
The U.S. National Institute of Standards and Technology (NIST) has issued new guidelines for Cyber Security Supply Chain Risk Management....
(Application Development and Deployment Software)
From this Article:
More than 100 bills addressing cyber security are currently under consideration in the U.S. House and Senate. Can legislation stop a hacker?...
(Industrial Computing)
From this Article:
Where industry 4.0 was all about smart technology, a large part of which was getting the machines to do most of the work, industry 5.0 is more about getting human judgment back in the game. The...
(Networking Equipment)
From this Article:
Effective pump control is critical to many processes, but the further you get from your control room, the more challenging it is to optimize pump operation. Secure remote monitoring can improve...
(Industrial Computing)
From this Article:
The SolarWinds hack that dominated news cycles late last year is among the largest and most pervasive known cyber intrusions by a nation-state. Bedrock Fellow Sam Galpin analyzes what we know so far...
(Industrial Computing)
From this Article:
While U.S. lawmakers are determining what infrastructure needs to be protected, states are taking measures to keep the threat in focus....
(Application Development and Deployment Software)
From this Article:
When is it OK to copy copyrighted computer code? In its recent landmark decision in Oracle vs. Google, the Supreme court says you can do it when it's in the public's interest....
(Networking Equipment)
From this Article:
Bedrock Fellow Sam Galpin says the time to think about your ransomware response is NOW, not when you've already gotten a ransom note and are scrambling to figure out how you're going to save your...
(Application Development and Deployment Software)
From this Article:
How to determine the state of your process without a Windows HMI. (There is a good chance your PLCs or other automation are not compromised.) How to determine whether there is a safety risk. What...
(Flow Sensing)
From this Article:
Restoring and replacing aging water and wastewater infrastructure continues to be job one for most American public utilities. Federal funding is available, but is it enough?...
(Flow Sensing)
From this Article:
The Florida water plant that was the subject of a cyber-attack last week may have dodged a bullet, but it highlights the vulnerability of the nation's water supplies and the need for better security...
(Application Development and Deployment Software)
From this Article:
In an IIoT World article titled Industrial Cyber Security: Why IT & OT collaboration is no longer an option but a necessity authors Joe Weiss and Richard Ku argue that information technology (IT) and...