OT cyber security expertise, trends and best practices to protect your industrial systems

Stay up to date with the latest OT cyber security expertise, trends and best practices to protect your industrial systems

The Ultimate Guide to Protecting OT Systems with IEC 62443

Learn More
Filter By:
  • Reset Filter
Blog July 18, 2022

Should You Start with Network or Endpoint in OT Security?

OT/ICS security teams hear different perspectives from different groups and are often left confused as to the best place to begin.

Read more
Blog July 5, 2022

Attack Surface Management: 6 Steps for Success in OT/ICS

Most attack surface management tools and approaches do not understand the technical complexities and operational requirements of these OT systems. But there is a way to effectively and efficiently conduct ASM in OT.

Read more
Blog June 10, 2022

What is MITRE ATT&CK? The Definitive Guide.

This article is intended to explain what the MITRE ATT&CK framework is, how it should be applied for ICS, and how it compares to other cyber security frameworks.

Read more
Blog June 1, 2022

What is the NIST Cybersecurity Framework?

What are the goals of the NIST Cybersecurity Framework, what do you need to know for your business, and what impact does it have for OT?

Read more
Blog May 18, 2022

Respond to Growing OT Vulnerabilities with Endpoint Systems Management

While there has been a string of alerts and buzz around naming the various threats, the recommendations remain the same: Manage your OT systems through core security fundamentals.

Read more
Blog April 14, 2022

What Critical Infrastructure Can Learn From Conti Ransomware Leaks

For the cybercrime group Conti, every operational and critical infrastructure company based in the United States or one of the many allied countries could be their next target.

Read more
Blog April 4, 2022

What are the Top CIS Controls?

What are the benefits of the Top CIS Controls and how are they implemented in OT or ICS cyber security environments?

Read more
Blog March 29, 2022

4 Benefits of OT Endpoint Security Asset Management

How endpoint OT security asset management improves a CISO’s ability to deliver measurable and rapid improvements to OT cybersecurity.

Read more
Blog March 10, 2022

Adapting XDR for OT Cybersecurity

These five adaptations of traditional IT XDR allow IT security teams to achieve effective and efficient multi-telemetry detection and response in OT environments.

Read more
Blog March 4, 2022

6 Steps for Effective Patch Management

To combat the challenges with patch management, Verve Industrial Protection developed a multi-staged approach to streamline the patch management process.

Read more
Blog February 17, 2022

4 Ways to Manage the Impact of Log4j in OT Environments

Learn the steps asset owners should take to mitigate the Log4j vulnerability in OT environments with OT-safe practices.

Read more
Blog January 5, 2022

4 Components to Rapidly Improve & Measure OT Security

The current approaches to OT cyber security lack the ability to demonstrate progress and improvement on key security metrics over time. Here’s how to change that.

Read more