OT/ICS Cyber Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

OT Systems Management Whitepaper

Learn More
Filter By:
  • Reset Filter

Asset Inventory: The Foundation to a Successful OT Security Program

Regardless of where you are in your security maturity journey, getting asset inventory right is critical to the effectiveness of your program.

Read more
Blog April 14, 2022

What Critical Infrastructure Can Learn From Conti Ransomware Leaks

For the cybercrime group Conti, every operational and critical infrastructure company based in the United States or one of the many allied countries could be their next target.

Read more

Taking a Proactive Approach to OT Cybersecurity Protection

The growing threats to our critical infrastructure require a new way of thinking about OT cybersecurity.

Read more

Addressing New ICS/OT Cybersecurity Regulations

In the spring and summer of 2021, the United States and global governments issued several new regulatory initiatives in response to several very public ransomware attacks on critical infrastructure such as Colonial Pipeline, as well as lesser-known, government-tracked hacking attempts of other entities. The writing is on the wall that the future of OT cyber security is one of greater…

Read more

Build an effective risk & governance OT security platform

With almost half of the world’s known oil and gas reserves and much of the capacity to process or utilize them, the Middle East and North Africa (MENA) region is a cornerstone of today’s global energy and industrial system. As the region’s energy and utility industries continue to digitalize their assets, they have increasingly become targets of cyber threats. In…

Read more
Blog April 4, 2022

What are the Top CIS Controls?

What are the benefits of the Top CIS Controls and how are they implemented in OT or ICS cyber security environments?

Read more
Blog March 29, 2022

4 Benefits of OT Endpoint Security Asset Management

How endpoint OT security asset management improves a CISO’s ability to deliver measurable and rapid improvements to OT cybersecurity.

Read more
Blog March 10, 2022

Adapting XDR for OT Cybersecurity

These five adaptations of traditional IT XDR allow IT security teams to achieve effective and efficient multi-telemetry detection and response in OT environments.

Read more
Blog March 4, 2022

6 Steps for Effective Patch Management

To combat the challenges with patch management, Verve Industrial Protection developed a multi-staged approach to streamline the patch management process.

Read more
Blog February 17, 2022

4 Ways to Manage the Impact of Log4j in OT Environments

Learn the steps asset owners should take to mitigate the Log4j vulnerability in OT environments with OT-safe practices.

Read more

How to Remediate Log4j and Other Supply Chain Vulnerabilities in OT

Learn how to efficiently safeguard against supply chain vulnerabilities like Log4j without the risk of aggressive scanning.

Read more
Case Study

Power Case Study for Securing Different Asset Types

Find out how a leading power company reduced time to threat detection and response actions across the entire OT environment.

Read more