OT Security Resources

Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.

2022 ICS Advisory Year in Review

Learn More
Filter By:
  • Reset Filter
Blog January 28, 2020

Cyber Conference: 9 Trends from S4x20's ICS Event

The world of industrial cybersecurity is evolving, and S4x20 offers a place for open discussion and debate around OT best practices, trends and threats.

Read more
Blog January 16, 2020

RDP Access: 8 Ways to Protect Against Remote Vulnerabilities

With remote desktop vulnerabilities on the rise, we’re sharing eight actions you can take to secure your OT assets from exposure.

Read more
Blog December 31, 2019

IT OT Convergence: 3 Things OT Should Immediately Adopt from Current IT Trends

OT teams should adopt IT trends like real-time inventory databases, automation of security remediation and centralized support teams for OT environments.

Read more
Blog December 19, 2019

The Value of Empirical Evidence to Quantify OT Cyber Risk

Providing OT or system-specific context to true, ICS Cyber Security Risk

Read more
Blog December 12, 2019

Endpoint Protection and its Effect on Cyber Security Risk and Intel

99% of cyber incidents happen in the critical infrastructure and Industrial Control System (ICS) space through commodity systems such as Microsoft Windows.

Read more
Blog December 11, 2019

USB Device Controls Using Verve Asset Management and BigFix Software

Reducing OT cyber security attack surface by disabling USB ports as a best practice system hardening task

Read more
Blog December 7, 2019

Quantifying Cyber Risk

Driving empirical analysis of OT cyber security risk in providing effective OT asset management practices.

Read more
Blog November 27, 2019

Virtual Twins in a Compensating Control Process for Windows 7 & Server 2008 EOL

Converting physical systems to virtual representations when Microsoft End of Lifes (EOLs) Occur on an Operating System

Read more
Blog November 21, 2019

Quantifying Risk in OT Cyber Security

An initial process on Risk management and vulnerability management in terms of probabilities of successful cyber attacks on Operational Technology (OT)

Read more