The world's most capable, rugged and secure
industrial control system...

Introducing Bedrock OSA® Remote

  • Intrinsically-secure PLC and RTU control
  • 10 or 20 channels of universal I/O
  • Free IEC 61131-3 engineering software
  • -40ºC to +80ºC temperature range
  • Rugged, all-metal case 5.4 in x 8.9 in x 2.3 in
Learn More

Industry News

Cyber Attacks

Hackers halt plant operations in watershed cyber attack

December 18, 2017
Robert Bergman

It was only a matter of time. “Triton” has emerged as third computer virus discovered to date that is capable of disrupting industrial processes. The first, Stuxnet, was discovered in 2010 and was used to attack Iran’s nuclear program. The second, known as Crash Override or Industroyer, was discovered last year by researchers who said it was likely used in a December 2016 attack that cut power in Ukraine. In this case, the virus was used to attack Triconex safety systems in an undisclosed Saudi Arabian facility.
According to cyber investigators and the firm whose systems were targeted, the hackers were likely working for a nation-state to invade the safety system of a critical infrastructure facility in a watershed attack that halted plant operations. Department of Homeland Security spokesman Scott McConnell said the agency was looking into the matter “to assess the potential impact on critical infrastructure.”
Not to put too fine a point on it, but Bedrock Automation controllers with Cybershield™ were designed from the ground up specifically to stop this kind of attack in its tracks. Installing a Bedrock Secure Proxy solution “in front” of your existing ICS is a simple, cost effective way to introduce this powerful capability without replacing your entire ICS. A small investment that can pay huge dividends. Contact our sales team to learn more.

Cyber Attacks

Supply Chains Under Attack

June 27, 2019
Robert Bergman

More proof that the instrumentation and control industry is concerned about supply chain security is evident in the fact that […]

Cyber Attacks

ICS and Supply Chain Security Gaining National Attention

June 27, 2019
Albert Rooyakkers

On the heels of its recent delineation of key components of the critical infrastructure, the U.S. Cybersecurity and Infrastructure Security […]

Cyber Attacks

How Locally-Sourced, Intrinsically-Secure Components Keep the Supply Chain Secure

June 27, 2019
Sam Galpin

Bedrock Automation anticipated the possibility of supply chain counterfeiting and contamination when we designed the system five years ago and […]