Virtual Twins in a Compensating Control Process for Windows 7 & Server 2008 EOL
Converting physical systems to virtual representations when Microsoft End of Lifes (EOLs) Occur on an Operating System
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
Converting physical systems to virtual representations when Microsoft End of Lifes (EOLs) Occur on an Operating System
Read moreAn initial process on Risk management and vulnerability management in terms of probabilities of successful cyber attacks on Operational Technology (OT)
Read moreAchieve remediation in 90 minutes! A real-life case study tackling challenges of large and complex assets, coupled with scarce OT security resources.
Read moreIT and OT worlds continue to run into one another – why is that a challenge? Because good intentions without proper context can lead to disaster!
Read morePragmatically examining exposure as part of the risk reduction process to prevent and mitigate risks without fear-uncertainty-and-doubt (FUD).
Read moreExploring how to map Department of Defense CMMC to NIST CSF, 800-82 and 800-171 for enhanced target security levels and controls.
Read moreOT cyber security requires a wider and deeper understanding of what assets are in an OT environment to proactively plan and execute much-needed security practices.
Read moreFocus on the aspects of monitoring as they practically apply to an OT environment, and look at challenges with alternatives to vulnerability scanning.
Read more