Attacks on industrial production
Ron Brash shares key takeaways from his 2020 ICS Vulnerabilities report with the Cyberwire podcast.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
Ron Brash shares key takeaways from his 2020 ICS Vulnerabilities report with the Cyberwire podcast.
Read moreVerve research featured in ICS-CERT warning on GE’s popular line of advanced protection and control relays. Here’s what asset owners need to know.
Read moreDownload the whitepaper to learn how the CMMC applies to both IT and OT systems, what compliance entails and how to meet requirements.
Read moreStrong OT systems management and a robust security program are key when faced with dire warnings like ICS-CERT’s recent Rockwell red flags.
Read moreRon Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry — and not worry — about.
Read moreDuring our last webinar, “IT is from Mars, OT is from Venus,” we shared how to bring IT and OT together to solve the critical challenges of OT security. This webinar continues this storyline but focuses on the practical aspects of ”how-to” deliver the same functionalities as expected in IT in an OT environment. Download this on-demand webinar to hear…
Read moreVerve is honored to receive four gold awards and two silver awards in the 2021 Cybersecurity Excellence Awards and to be recognized as a leading cyber security product or service across six different categories.
Read moreIf recent cyberattacks like SolarWinds and Oldsmar have demonstrated anything, it’s the vulnerability landscape in operational technology (OT) and manufacturing is changing rapidly – and not necessarily for the better.
Read moreJohn Livingston, CEO of Verve Industrial Protection, discussed how the industry should respond to increasing threats and vulnerabilities in a video interview with CFE Media and Technology.
Read moreIT-based vulnerability detection solutions often miss more OT vulnerabilities than they detect – or they generate an unmanageable flood of false positives, wasting your already over-stretched cyber resources. This webinar aims to show how decades of OT product naming inconsistency limits the ability of traditional vulnerability tools to determine which of your assets are affected by a vulnerability – or…
Read moreLearn why OT systems management is a better solution than passive anomaly detection for managing OT security environments.
Read moreLearn why there’s an increasing need for OT security to adopt the core elements of IT Systems & Security Management in the coming years.
Read more