Defending Against Ransomware: Expert Interview Series, Ron Brash
Ransomware attacks have been surging, with hackers striking major pieces of critical infrastructure. But large companies are far from alone.
Read moreSubscribe to stay in the loop with the latest OT cyber security best practices.
The latest news, press releases and mentions of Verve Industrial Protection.
Ransomware attacks have been surging, with hackers striking major pieces of critical infrastructure. But large companies are far from alone.
Read moreThe U.S. Department of Homeland Security’s TSA division released second security directive for critical pipeline owners and operators.
Read moreU.S. homeland security officials unveiled new pipeline cybersecurity rules yesterday alongside a rare warning about a nearly decade-old hacking threat.
Read moreThe U.S. Department of Homeland Security’s TSA division released second security directive for critical pipeline owners and operators.
Read moreA separate advisory from the CISA this week resurfaced details of a 2011–2013 Chinese campaign against energy industry targets and warned that same tactics and techniques still remain effective.
Read moreDefending critical infrastructure requires 360-degree visibility into network vulnerabilities, which is why a vulnerability assessment is key.
Read moreIn the days following the incident, we solicited perspective on the crisis from a handful of cybersecurity thought-leaders who discussed how the incident happened, why we should all be concerned, and ways we can learn from this hack to work more safely in the future.
Read moreThe International Society of Automation (ISA) and the ISAGCA released a white paper that provides an overview of the ISA 62443-3-2 standard.
Read moreSoftware bills of materials may soon be used to improve security, by more easily identifying outdated libraries with known vulnerabilities
Read moreThose looking to join the fight might want to polish up or acquire some (or all) of these hottest skills on the market.
Read moreA software bill of materials would document third-party software components, including open source and commercial code.
Read moreAs the Cybersecurity Maturity Model Certification (CMMC) rolls out, it’s important for manufacturing companies to think more broadly than just CMMC.
Read more