Adopting a Prevention-First Approach to Cybersecurity in Critical Infrastructure
As seen at CS4CA World, this panel aims to discuss a proactive cybersecurity approach for critical infrastructure organizations.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
As seen at CS4CA World, this panel aims to discuss a proactive cybersecurity approach for critical infrastructure organizations.
Read moreTo meet growing regulatory requirements and defend our critical infrastructure from growing attacks, we need an approach that goes beyond perimeter segmentation or network detection.
Read moreFor the cybercrime group Conti, every operational and critical infrastructure company based in the United States or one of the many allied countries could be their next target.
Read moreThe growing threats to our critical infrastructure require a new way of thinking about OT cybersecurity.
Read moreIn the spring and summer of 2021, the United States and global governments issued several new regulatory initiatives in response to several very public ransomware attacks on critical infrastructure such as Colonial Pipeline, as well as lesser-known, government-tracked hacking attempts of other entities. The writing is on the wall that the future of OT cyber security is one of greater…
Read moreWith almost half of the world’s known oil and gas reserves and much of the capacity to process or utilize them, the Middle East and North Africa (MENA) region is a cornerstone of today’s global energy and industrial system. As the region’s energy and utility industries continue to digitalize their assets, they have increasingly become targets of cyber threats. In…
Read moreWhat are the benefits of the Top CIS Controls and how are they implemented in OT or ICS cyber security environments?
Read moreDerek Harp interviews Rick Kaun about his career, the decisions he made that led him to where he is today, and some gold nuggets of career advice.
Read moreHow endpoint OT security asset management improves a CISO’s ability to deliver measurable and rapid improvements to OT cybersecurity.
Read moreThese five adaptations of traditional IT XDR allow IT security teams to achieve effective and efficient multi-telemetry detection and response in OT environments.
Read moreLearn what patch management in operational technology entails and a multi-staged approach that streamlines the patch management process.
Read moreLearn the steps asset owners should take to mitigate the Log4j vulnerability in OT environments with OT-safe practices.
Read more