How to Protect Your OT Network — Without Disrupting Operations

How to Protect Your OT Network — Without Disrupting Operations

A good portion of existing operational technology (OT) networks were originally built during the air gap days, where isolation from other enterprise systems made for sufficient security. As digital transformation initiatives drive IT and OT networks…

BMS Security: 3 Tips for OEMs to Better Protect Their Devices

BMS Security: 3 Tips for OEMs to Better Protect Their Devices

Connected Building Management Systems (BMS) definitely make a difference in terms of increasing operational performance, reducing energy and maintenance costs, and improving building health and safety. None of this could happen if it weren’t for Original…

Q&A on Cyber Resiliency for Operational Technology

Q&A on Cyber Resiliency for Operational Technology

As recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments, resilience readiness today has evolved. It is more than a cybersecurity strategy and involves the enforcement of rules and policies that…

A priority investment: cyber security

A priority investment: cyber security

The accelerating transition to digital transformation, with much data and information being processed on the cloud, has opened up exciting new business opportunities, but it has also increased the risk that manufacturing companies may suffer in…

Should You Start with Network or Endpoint in OT Security?

Should You Start with Network or Endpoint in OT Security?

OT/ICS security teams hear different perspectives from different groups and are often left confused as to the best place to begin. In Verve’s 30 years of experience in OT/ICS cyber security and reliability services, we often…

OT Cybersecurity Best Practices

OT Cybersecurity Best Practices

Some of the OT security best practices for implementing a reliable protection system include: Network mapping and connectivity analysis Detection of suspicious activities, exposures, and malware attacks Implementing a zero-trust framework Aligning the right remote access tools Controlling identity and…