Network Stack Fuzzing: Amnesia 33 and MCUs (siblings to CPUs in most IACS devices)
MCU-based devices are not really the same as a PLC with an MMU and stack-to-device vulnerability matching isn’t as bad as it seems.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
MCU-based devices are not really the same as a PLC with an MMU and stack-to-device vulnerability matching isn’t as bad as it seems.
Read moreMake informed cybersecurity investments in Operational Technology to maximize benefits and avoid waste of resources.
Read moreWith ransomware cyber security attacks on the rise, it’s important to understand why attackers use this method, what its impacts are for an OT/ICS environment, and how to minimize risk for your organization. By 2021, a ransomware attack will take place every 11 seconds. In the last year, 51% of businesses were impacted by ransomware – just ask Maersk, Mondelez,…
Read moreA presentation by VP Solutions, Rick Kaun during Bsides Calgary 2020
Read moreEndpoint protection is a critical element of all cybersecurity programs but has traditionally been hard to execute in industrial control systems (or operating technology) environments. Leveraging our 25-year experience in ICS engineering, Verve Industrial Protection built an endpoint protection solution that addresses the unique criteria and challenges of OT environments. This paper summarizes that solution.
Read moreOur extensive experience in patch management security led us to develop a range of learnings that we leverage in our work, and that others in industrial environments can benefit from when it comes to patching OT systems.
Read moreRon Brash joined The CyberWire podcast to discuss how he started his career in industrial cyber security, what he’s working on now, and advice for others in ICS security.
Read moreRon Brash’s response to Public Safety Canada’s recent guidance to an OT and IT Cyber Incident Response Plan (CIRP)
Read moreWhat is OT/ICS vulnerability management, why is it critical in cyber security, and what role does it play in ransomware defense and protection?
Read moreHow Verve Industrial serves the distributed generation energy industry with asset management and centralized reporting for effective OT security.
Read moreWhen you can’t patch, or rip and replace your ICS equipment or software, control your environment to control your risk.
Read moreFrom an asset owner’s perspective: Defining firmware and discovering embedded vulnerabilities to protect devices from exploitation.
Read more