The world's most capable, rugged and secure
industrial control system...

Introducing Bedrock OSA® Remote

  • Intrinsically-secure PLC and RTU control
  • 10 or 20 channels of universal I/O
  • Free IEC 61131-3 engineering software
  • -40ºC to +80ºC temperature range
  • Rugged, all-metal case 5.4 in x 8.9 in x 2.3 in
Learn More

Industry News

Cyber Attacks
 

Hackers halt plant operations in watershed cyber attack

December 18, 2017
Robert Bergman

It was only a matter of time. “Triton” has emerged as third computer virus discovered to date that is capable of disrupting industrial processes. The first, Stuxnet, was discovered in 2010 and was used to attack Iran’s nuclear program. The second, known as Crash Override or Industroyer, was discovered last year by researchers who said it was likely used in a December 2016 attack that cut power in Ukraine. In this case, the virus was used to attack Triconex safety systems in an undisclosed Saudi Arabian facility.
 
According to cyber investigators and the firm whose systems were targeted, the hackers were likely working for a nation-state to invade the safety system of a critical infrastructure facility in a watershed attack that halted plant operations. Department of Homeland Security spokesman Scott McConnell said the agency was looking into the matter “to assess the potential impact on critical infrastructure.”
 
Not to put too fine a point on it, but Bedrock Automation controllers with Cybershield™ were designed from the ground up specifically to stop this kind of attack in its tracks. Installing a Bedrock Secure Proxy solution “in front” of your existing ICS is a simple, cost effective way to introduce this powerful capability without replacing your entire ICS. A small investment that can pay huge dividends. Contact our sales team to learn more.

 
Cyber Attacks

New OT Cyber Security Training and Information Resources Now Available from Bedrock

June 25, 2020
Robert Bergman

Bedrock Automation is announcing that the OT cyber security resources developed over the past few months are now available for […]

Cyber Attacks

Cut the cards: Zero Trust in the Critical Infrastructure.

June 25, 2020
Robert Bergman

“Trust everyone — but cut the cards,”   is essentially the premise of Zero Trust cyber security. Zero Trust assumes that […]

Cyber Attacks

Trust factors in COVID-19 pandemic recovery

June 25, 2020
Robert Bergman

As countries, states and businesses begin to reopen, we do so with cause and some anticipation. Deloitte & Touche explores […]