OT cyber security expertise, trends and best practices to protect your industrial systems

Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems

4 Elements for Developing a Mature OT Systems Management Process

Learn More
Filter By:
  • Reset Filter
Blog November 18, 2020

Ransomware Protection: How to Prevent & Detect OT/ICS Ransomware

Reduce the risk of a ransomware infection, leverage existing technology investments and improve recovery

Read more
Blog November 13, 2020

Protecting Embedded Systems in OT Cyber Security

Learn how to protect OT embedded devices and firmware in OT/ICS cyber security environments.

Read more
Blog November 5, 2020

5 Questions a CISO Should Ask About OT/ICS Cyber Security

These are 5 questions CISOs should ask as they pursue an OT or ICS cyber security program and establish an effective industrial organization and technical approach.

Read more
Blog October 30, 2020

5 Steps to Improve Cyber Security Awareness in Manufacturing and OT/ICS

Don't wait to tackle cyber security until it's too late. Here are five ways you can proactively prepare your organization with cyber security awareness.

Read more
Blog October 21, 2020

What are the NERC CIP Standards in ICS Security?

What is NERC CIP, what's covered in these cyber security standards for OT environments, and how is a successful NERC CIP compliance program structured?

Read more
Blog October 13, 2020

How to Close the OT Cyber Security Talent Gap

With a national skills shortage and gap of OT cyber security professionals, how do we leverage our current resources and develop the right jobs to improve the future?

Read more
Blog October 7, 2020

What are the Top CIS Controls?

What are the benefits of the CIS Top 20 Controls and how are they implemented in OT or ICS cyber security environments?

Read more
Blog October 1, 2020

Embedded OT Vulnerabilities: An Asset Owner Perspective

What should asset owners be aware of with embedded OT systems and buried vulnerabilities, and what remediation tactics are available?

Read more
Blog September 24, 2020

So Your Vulnerability Assessment is Finished... Now What?

Once you've finished a vulnerability assessment in OT/ICS cyber security, you'll start securing OT endpoints. But how can a security blueprint assist?

Read more
Blog September 22, 2020

Getting Started with Vulnerability Management in OT Cyber

Vulnerability Management in OT or ICS cyber security is a challenge, but with new thinking and existing IT OT cyber security tools, we can make a significant change.

Read more
Blog September 17, 2020

Ron Brash Recognized in CFE's Engineering Leaders Under 40

As Director of Cyber Security Insights at Verve Industrial, Ron Brash leads research on vulnerabilities, cyber risk, and firmware in OT/critical infrastructure.

Read more
Blog September 9, 2020

Top 5 Learnings from a Decade of OT/ICS Vulnerability Assessments

What ten years of vulnerability assessments can teach the OT/ICS cyber security industry about vulnerability exposure and risk prioritization and remediation.

Read more