Ratchet Down Risk With a Strategic Approach to Fearsome Vuln Advisories
Strong OT systems management and a robust security program are key when faced with dire warnings like ICS-CERT’s recent Rockwell red flags.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
Strong OT systems management and a robust security program are key when faced with dire warnings like ICS-CERT’s recent Rockwell red flags.
Read moreRon Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry — and not worry — about.
Read moreDuring our last webinar, “IT is from Mars, OT is from Venus,” we shared how to bring IT and OT together to solve the critical challenges of OT security. This webinar continues this storyline but focuses on the practical aspects of ”how-to” deliver the same functionalities as expected in IT in an OT environment. Download this on-demand webinar to hear…
Read moreVerve is honored to receive four gold awards and two silver awards in the 2021 Cybersecurity Excellence Awards and to be recognized as a leading cyber security product or service across six different categories.
Read moreIf recent cyberattacks like SolarWinds and Oldsmar have demonstrated anything, it’s the vulnerability landscape in operational technology (OT) and manufacturing is changing rapidly – and not necessarily for the better.
Read moreJohn Livingston, CEO of Verve Industrial Protection, discussed how the industry should respond to increasing threats and vulnerabilities in a video interview with CFE Media and Technology.
Read moreIT-based vulnerability detection solutions often miss more OT vulnerabilities than they detect – or they generate an unmanageable flood of false positives, wasting your already over-stretched cyber resources. This webinar aims to show how decades of OT product naming inconsistency limits the ability of traditional vulnerability tools to determine which of your assets are affected by a vulnerability – or…
Read moreLearn why OT systems management is a better solution than passive anomaly detection for managing OT security environments.
Read moreLearn why there’s an increasing need for OT security to adopt the core elements of IT Systems & Security Management in the coming years.
Read moreHow winter weather highlighted a key cyber risk to the Texas power grid
Read moreIn relation to supply chain security issues, Verve predicts many asset owners and researchers will assess more device firmware for inherently insecure components.
Read moreThere is no shortage of security solutions that aim to protect the perimeter, the network and to provide alerting and monitoring. What is sorely missing, however, is significant risk reduction on the endpoints themselves. This has traditionally been due to ‘poorly fitting’ security tools, gaps in traditional IT security tools, and the inability to scale what is usually a manual…
Read more