OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Blog July 8, 2020

Challenges of Using Anomaly Detection Tools for Asset Inventory

Use a contextual IT OT asset inventory management tool to build a foundation to propel your ICS cyber security journey.

Read more
Blog June 23, 2020

7 Steps to Protect Against Ripple20 Vulnerabilities in OT/ICS

What is Ripple20, how does it affect vulnerable systems in OT environments, and how can you manage vulnerabilities in ICS cyber security?

Read more
Blog June 16, 2020

Why is OT Systems Management Critical to ICS Systems Security?

How OT security leaders such as the CIO and CISO can apply IT Systems Management into ICS systems security into a new approach called OT Systems Management

Read more
Blog June 2, 2020

OT Systems Management: Defining Policies and Procedures

To conduct OT cyber security with effective OT systems management, establish policies and procedures that match the specific OT environment of your organization.

Read more
Blog May 28, 2020

How to Be Selective About Remote Access in OT Cyber

Remote access is not just about using a VPN or user accounts, but both remote endpoints, portals and systems contained within site infrastructure

Read more
Blog May 24, 2020

Managing ICS Endpoint Security During COVID-19

4 steps for greater OT endpoint protection during the novel coronavirus pandemic

Read more
Blog May 19, 2020

What is OT Endpoint Security Management?

Minimize the attack surface across all assets in industrial environments through OT endpoint management and a pharmaceutical endpoint management case study.

Read more
Blog May 14, 2020

CISA's Top 10 Routinely Exploited Vulnerabilities

A perspective on what the CISA’s Top 10 Routinely Exploited Vulnerabilities report is missing and how it could become more useful for OT cyber security professionals.

Read more
Blog May 12, 2020

Improve OT Cyber Security Maturity in 30 Days

Demonstrate meaningful OT cyber security maturity in 30 days with rapid deployment, a closed-loop remediation platform, and OT expert engineer services.

Read more
Blog May 7, 2020

Secure Remote Access: Combining Network & Endpoint Security

The same rigor applied to IT endpoints should be applied to OT environments to secure remote access, combining network and endpoint security.

Read more
Blog May 5, 2020

The Air Gap is Gone - Now What?

A programmatic industrial cyber security approach ensures the tools and procedures applied in the time of crisis are foundational for a long-term solution.

Read more
Blog May 3, 2020

Cyber Ransomware: Cyber Security's Nemesis & A Disappointing NIST Standard

A quick look at NIST Special Publication 1800-26A, detecting and responding to cyber ransomware and other destructive events.

Read more