OT Security Resources
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
How to map Department of Defense CMMC to NIST CSF
Exploring how to map Department of Defense CMMC to NIST CSF, 800-82 and 800-171 for enhanced target security levels and controls.
Read moreBuilding the Technical Case for Validated Asset Profiles
OT cyber security requires a wider and deeper understanding of what assets are in an OT environment to proactively plan and execute much-needed security practices.
Read moreVulnerability and Risk Monitoring in OT Cyber Security
Focus on the aspects of monitoring as they practically apply to an OT environment, and look at challenges with alternatives to vulnerability scanning.
Read moreVulnerability Remediation and Prioritization
A unique approach for the most effective, OT-safe approach to remediation cyber risks in a vulnerability management program.
Read moreBigFix Software Integration
How BigFix software helps manage IT/OT convergence by safely applying proven technology safely into OT environments.
Read more4 Steps to Think Global, Act Local in OT Vulnerability Management
The Think Global, Act Local concept emerged to describe how to scale vulnerability analysis, remediation design, and audit in industrial control systems
Read more