Rapidly Reduce OT Cyber Risk Through OT Endpoint Management
Hear from Rick Kaun as he shares the OT safe, scalable, accurate, and automated way to rapidly reduce risk in industrial security.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
Learn how to assess threats, calculate risks, and implement practical mitigation strategies to protect your OT systems.
Hear from Rick Kaun as he shares the OT safe, scalable, accurate, and automated way to rapidly reduce risk in industrial security.
Read moreSweat it or forget it: An ICS insider’s guide to navigating ICS advisories
Read moreFor 20 years, IT teams have applied foundational techniques to improve IT system security, reliability, lower operating costs, and create better customer satisfaction with IT as an organization. But these types of tools, techniques and processes are missing in OT environments – and for good reason. OT environments are inherently different from IT, requiring a unique approach to systems management.…
Read moreIn this episode of The Tool Belt, Thomas Wilk sits down with Ron Brash, director of Cyber Security Insights at Verve Industrial, to discuss cybersecurity trends in 2021. The conversation took on added urgency as last year’s data breach of the U.S. federal government came increasingly to light.
Read moreRon Brash shares key takeaways from his 2020 ICS Vulnerabilities report with the Cyberwire podcast.
Read moreRon Brash joins Ryan Naraine on the show to talk about the recent water supply hack, the state of security in ICS/SCADA installations, the checklist of affordable things for critical infrastructure defenders, and the things we should worry — and not worry — about.
Read moreDuring our last webinar, “IT is from Mars, OT is from Venus,” we shared how to bring IT and OT together to solve the critical challenges of OT security. This webinar continues this storyline but focuses on the practical aspects of ”how-to” deliver the same functionalities as expected in IT in an OT environment. Download this on-demand webinar to hear…
Read moreIf recent cyberattacks like SolarWinds and Oldsmar have demonstrated anything, it’s the vulnerability landscape in operational technology (OT) and manufacturing is changing rapidly – and not necessarily for the better.
Read moreJohn Livingston, CEO of Verve Industrial Protection, discussed how the industry should respond to increasing threats and vulnerabilities in a video interview with CFE Media and Technology.
Read moreIT-based vulnerability detection solutions often miss more OT vulnerabilities than they detect – or they generate an unmanageable flood of false positives, wasting your already over-stretched cyber resources. This webinar aims to show how decades of OT product naming inconsistency limits the ability of traditional vulnerability tools to determine which of your assets are affected by a vulnerability – or…
Read moreThere is no shortage of security solutions that aim to protect the perimeter, the network and to provide alerting and monitoring. What is sorely missing, however, is significant risk reduction on the endpoints themselves. This has traditionally been due to ‘poorly fitting’ security tools, gaps in traditional IT security tools, and the inability to scale what is usually a manual…
Read moreLearn how to get ahead of asset management in the rail transport industry to ensure operational safety and reliability. Using what we have learned in oil and gas, mining datasets, and aviation with e-Enabled aircraft – we are going to take you on an educational tour on how to tackle inventories of connected (but potentially not always on) distributed…
Read more