Ransomware Disrupts Operations at Packaging Giant WestRock
Incident is another reminder of how vulnerable OT environments are to attack, security experts say.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
The latest news, press releases and mentions of Verve Industrial Protection.
Incident is another reminder of how vulnerable OT environments are to attack, security experts say.
Read moreThis article showcases Threat.Technology’s top picks for the best Security Management solutions.
Read moreOperational technology security products and services continue to evolve rapidly. Gartner provides security and risk management leaders with an overview of the state of the OT security market and recommendations to leverage the evolving landscape of available OT security offerings.
Read moreHear from 16 industry experts, including Ron Brash on topics such as which security incident was most relevant, how the ICS security scene was perceived, best guess on next year’s threat/incident landscape, and how security should adapt to new developments.
Read moreThe snowbank is inevitable, detection is too late, but proper proactive prevention and recovery strategies reduce the impact and likelihood. And it’s the same with ransomware.
Read moreRon Brash joined The CyberWire podcast to discuss how he started his career in industrial cyber security, what he’s working on now, and advice for others in ICS security.
Read moreAnyone who has heard me (Jennifer Lyn Walker) speak (on the Cyber Threat Briefing, at a conference, or podcast) knows that I like to focus on the human side of cybersecurity. Therefore, it should come as no surprise that this post – Tackle the Human Side of Incident Response with SOAR and Threat Intelligence – by Flashpoint resonates with me.
Read morePatching in the OT environment is a perpetual predicament, but passing over patches is permanently problematic. Simply ignoring a patch because it is impractical or impossible to implement is profoundly poor policy. So what are the preferred practices when patching isn’t possible? According to Verve Industrial, the options greatly depend on whether the system you intend to remediate has embedded…
Read moreA cyberattack such as ransomware, especially one that causes downtime or shutdowns, can have reverberations throughout the infrastructure of a manufacturing or oil and gas company for months afterward.
Read moreAfter its recent webinar on Understanding Embedded Devices and Firmware in OT, Verve Industrial took to its blog to address many questions posed during the event. Verve responds in detail and provides “pro-tips” to six important questions for understanding cybersecurity and vulnerability management issues for embedded devices.
Read moreWhat is OT systems management and why is it so critical to protecting our critical infrastructure? What are the necessary controls to ensure ICS/OT cybersecurity? A comprehensive program includes a range of controls and design efforts, In this podcast, industry leaders will discuss the challenges and requirements of protecting Operating Information Technology systems, which includes the need for establishing OT…
Read moreIt is not uncommon for OT/ICS cybersecurity to fall under the authority of IT. This isn’t necessarily a bad thing, unless IT is taking responsibility/action and lacks OT-specific knowledge.
Read more