OT cyber security expertise, trends and best practices to protect your industrial systems

Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems

The Ultimate Guide to Protecting OT Systems with IEC 62443

Learn More
Filter By:
  • Reset Filter
Blog November 10, 2022

Prioritizing Vulnerability Remediation in OT Cybersecurity

Respond to growing OT vulnerabilities and put CISA’s guidance to improve ICS security into action for critical infrastructure industries.

Read more
Blog October 26, 2022

What is Critical Infrastructure Cyber Security?

Public and private organizations need to adapt their approach to cyber security for critical infrastructure. In this article, we’ll address the bigger risks and challenges associated with these complex environments and cyber-physical systems.

Read more
Blog October 17, 2022

CISA's ICS Advisories - September 2022

Amid CISA’s cybersecurity awareness month, Verve researchers analyzed the latest ICS advisories from September 2022.

Read more
Blog October 12, 2022

What is Endpoint Security?

OT endpoint management is necessary to protect the world’s critical infrastructure from cyber-related threats. The unique characteristics of these networks, combined with the processes they control, make running traditional endpoint protection solutions very difficult. As a result of these challenges, organizations often see OT endpoint security as too time-consuming or even impossible. However, there is a way to approach endpoint…

Read more
Blog September 15, 2022

CISA’s ICS Advisories – August 2022

To provide more information on the evolving threat landscape for ICS, Verve’s research team analyzed the various ICS advisories and CVEs that were released in August 2022.

Read more
Blog September 6, 2022

Q&A with Rick Kaun: Managing OT Regulatory Requirements

In this Q&A, Rick answers nine questions from our webinar audience about their concerns around preparing for unseen audits, applying OT-safe remediation tactics, and how Verve managed regulatory requirements.

Read more
Blog July 18, 2022

Should You Start with Network or Endpoint in OT Security?

OT/ICS security teams hear different perspectives from different groups and are often left confused as to the best place to begin.

Read more
Blog July 5, 2022

Attack Surface Management: 6 Steps for Success in OT/ICS

Most attack surface management tools and approaches do not understand the technical complexities and operational requirements of these OT systems. But there is a way to effectively and efficiently conduct ASM in OT.

Read more
Blog June 10, 2022

What is MITRE ATT&CK? The Definitive Guide.

This article is intended to explain what the MITRE ATT&CK framework is, how it should be applied for ICS, and how it compares to other cyber security frameworks.

Read more
Blog June 1, 2022

What is the NIST Cybersecurity Framework?

What are the goals of the NIST Cybersecurity Framework, what do you need to know for your business, and what impact does it have for OT?

Read more
Blog May 18, 2022

Respond to Growing OT Vulnerabilities with Endpoint Systems Management

While there has been a string of alerts and buzz around naming the various threats, the recommendations remain the same: Manage your OT systems through core security fundamentals.

Read more
Blog April 14, 2022

What Critical Infrastructure Can Learn From Conti Ransomware Leaks

For the cybercrime group Conti, every operational and critical infrastructure company based in the United States or one of the many allied countries could be their next target.

Read more