Security Breach: SBOMs, AI and the Crown Jewels
Learn how prioritizing the wrong data and assets is leading to more OT cyber risk.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Watch the latest videos, webinars, interviews and podcasts by OT/ICS cyber security industry thought leaders.
Learn how prioritizing the wrong data and assets is leading to more OT cyber risk.
Read moreLearn about the latest OT cybersecurity capabilities from Rockwell Automation and Verve.
Read morePresented at SecurityWeek’s ICS Cybersecurity Conference 2023
Read moreIn this panel discussion from 2023 Critical Infrastructure Cyber Security Summit, experts discuss industrial cybersecurity, covering attack surface reduction, tool deployment, OT attacks, security tools, and awareness.
Read morePart 3 in a 3-Part Series: Start, Build & Maintain an OT Security Program
Read moreCEO John Livingston discusses how Verve addresses manufacturing cybersecurity challenges in this interview from Rockwell Automation Fair.
Read moreLearn to uncover OT risks effectively. Join Verve Industrial’s Rick Kaun & Julia Pitlik for expert insights on prioritizing and managing vulnerabilities in sensitive OT environments.
Read morePart 2 of a 3-Part Series: Start, Build & Maintain an OT Cyber Security Program
Read morePart 1 of a 3-Part Series: Start, Build, and Maintain an OT Cyber Program
Read moreEnsure you are ready to recover from a cyber-related incident with comprehensive backup capabilities for OT systems.
Read moreRick Kaun takes us deep into the world of patching OT systems, how it drastically differs from IT patching, and what the process looks like in action. We also have a look at how to quantify risk in OT, as that’s part of the process of deciding what to patch first, and how to prioritize a large workload of patching…
Read morePassive and perimeter detection technology provides a limited view into the entire OT risk landscape. And it’s failing you. Watch the 20 minute video to learn why.
Read more