What is Stuxnet?
The game-changing malware that shocked the ICS/OT world is back in the news and still has lessons to share.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
The game-changing malware that shocked the ICS/OT world is back in the news and still has lessons to share.
Read moreLearn how to overcome industrial security challenges with embedded devices in OT/ICS security environments.
Read moreSANS ICS Security Summit 2021 with Ron Brash As a technical follow up to my SANS oil & gas session – tale of the lost RTUs, I am going to discuss how a Software Bill of Materials (SBOM) for two commonly used cellular Remote Terminal Units (RTUs) resulted in disclosures using merely their firmware to guide a research process to…
Read moreHere’s why industrial manufacturing companies should adhere to CMMC guidelines but think broader for overall security maturity.
Read moreCyber security in operational technology (OT) is a challenge in almost any industry. The combination of devices aging, embedded proprietary software, 24×7 operations, etc. makes managing security a difficult task. In pharmaceuticals and medical device manufacturing, those challenges are exacerbated by regulatory burdens and risks to patient safety and personal information in some cases. The pharma/med device CISO’s job is…
Read moreAs the DoD’s Cybersecurity Maturity Model Certification (CMMC) gains momentum, it’s important to understand how the standard applies to both OT and IT systems, what compliance entails, and how to meet requirements. Partnering with the DoD’s cybersecurity hub for manufacturing, Verve helped define the necessary capabilities, education, and tools necessary to improve ICS cyber security for the defense industrial base.…
Read moreSee how Verve aligns with OFGEM’s new set of cyber security resilience guidelines (RIIO-2) for electricity and gas distribution networks
Read moreDefending critical infrastructure environments requires 360-degree visibility into asset and network vulnerabilities
Read moreSupply chain cybersecurity in ICS: what’s going on, why it matters, and where we are going
Read moreHear from Rick Kaun as he shares the OT safe, scalable, accurate, and automated way to rapidly reduce risk in industrial security.
Read moreDiscover what ICS security is, why it’s crucial for industrial environments, and how it differs from traditional IT security. Learn essential strategies for protecting your critical infrastructure.
Read moreSweat it or forget it: An ICS insider’s guide to navigating ICS advisories
Read more