Embedded OT Vulnerabilities: An Asset Owner Perspective
What should asset owners be aware of with embedded OT systems and buried vulnerabilities, and what remediation tactics are available?
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
What should asset owners be aware of with embedded OT systems and buried vulnerabilities, and what remediation tactics are available?
Read moreOT endpoint management is necessary to protect the world’s infrastructure, but it is often not deployed due to several key challenges. Find out how to overcome those hurdles. Verve Security Center offers a complete solution for Endpoint Management, specifically designed for Operating Technology in Industrial Control Systems
Read moreVerve Industrial Protection assessed the history of OT cyber attacks and determined where they are likely headed based on twenty-five years of industrial cyber security experience in ICS environments. Most predictions from ten years ago about a rapid rise in cyber-physical attacks did not come true. Certainly, there has been significant financial damage to many firms resulting from powerful intrusions…
Read moreURG11 and network stack flaws are not anything new. They are miscreants leftover from the 90’s and early 2000’s – a period where these types of software flaws were rampant. For the most part, these flaws represent an era where devices lacked proper robustness testing and customers were obligated to trust the vendor’s security practices. While most of these were…
Read moreVulnerability management goes beyond threat detection. It safeguards your operational technology (OT) against cyber risks and helps prioritize action for remediation. But where should you start, and how can you ensure safe practices for OT environments? During this webinar, you will learn: The components of a robust OT vulnerability management program How a 360-degree view of your assets provides OT…
Read moreWhile there has been significant emphasis on the pursuit of asset inventory as a starting point for many OT cybersecurity programs, asset inventory is the first and most important step in your cybersecurity journey. But many industrial organizations fail to recognize it is only one component of security maturity and end up falling short of their end goal. Hear from…
Read moreSecuring Operational Technology (OT) systems is an increasingly important, but challenging task. IT cyber security has had the advantage of building on a strong foundation of IT Systems Management processes and technologies over the past decade or more – and even those assets are often left insecure. Unfortunately for OT environments, processes such as accurate and updated hardware and software…
Read moreOT cyber security is not a destination, it’s a journey. While there is no silver bullet or one-size-fits-all approach, effective cyber security programs are composed of people, processes and technology that work together to advance the maturity of an organization’s security over time. With numerous cyber security frameworks and governance models out there, it feels daunting to get started. If…
Read moreVerve Industrial aggregated information from ten years of vulnerability assessments across industries ranging from power, pharmaceuticals, CPG manufacturing, water utilities, and oil & gas. Several common themes emerged from the findings, but the most apparent takeaway was the growing need for integrated risk management in ICS security. Across all findings, we’ll share what remediation actions should be applied, how to…
Read moreOnce you’ve finished a vulnerability assessment in OT/ICS cyber security, you’ll start securing OT endpoints. But how can a security blueprint assist?
Read moreAs Director of Cyber Security Insights at Verve Industrial, Ron Brash leads research on vulnerabilities, cyber risk, and firmware in OT/critical infrastructure.
Read moreWhat ten years of vulnerability assessments can teach the OT/ICS cyber security industry about vulnerability exposure and risk prioritization and remediation.
Read more