Rising Demand for OT Attack Surface Management
Learn how to apply Attack Surface Management in industrial environments in an OT-safe and efficient way.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Keep informed with the latest ICS cyber security blogs, white papers, webinars and more from Verve Industrial Protection.
Learn how to apply Attack Surface Management in industrial environments in an OT-safe and efficient way.
Read moreThis article is intended to explain what the MITRE ATT&CK framework is, how it should be applied for ICS, and how it compares to other cyber security frameworks.
Read moreLearn how organizations successfully build consistent cyber practices that address existing and emerging threats.
Read moreMake sense of the MITRE ATT&CK framework and create additional value through reporting and SIEM capabilities.
Read moreDiscover the NIST Cybersecurity Framework’s five key functions: Identify, Protect, Detect, Respond, and Recover. Customize your strategy with Profiles and assess readiness using Implementation Tiers for robust cybersecurity practices.
Read moreWhile there has been a string of alerts and buzz around naming the various threats, the recommendations remain the same: Manage your OT systems through core security fundamentals.
Read moreRegardless of where you are in your security maturity journey, getting asset inventory right is critical to the effectiveness of your program.
Read moreFor the cybercrime group Conti, every operational and critical infrastructure company based in the United States or one of the many allied countries could be their next target.
Read moreThe growing threats to our critical infrastructure require a new way of thinking about OT cybersecurity.
Read moreIn the spring and summer of 2021, the United States and global governments issued several new regulatory initiatives in response to several very public ransomware attacks on critical infrastructure such as Colonial Pipeline, as well as lesser-known, government-tracked hacking attempts of other entities. The writing is on the wall that the future of OT cyber security is one of greater…
Read moreWith almost half of the world’s known oil and gas reserves and much of the capacity to process or utilize them, the Middle East and North Africa (MENA) region is a cornerstone of today’s global energy and industrial system. As the region’s energy and utility industries continue to digitalize their assets, they have increasingly become targets of cyber threats. In…
Read moreWhat are the benefits of the Top CIS Controls and how are they implemented in OT or ICS cyber security environments?
Read more