Addressing Operational Technology Equipment Flaws with Zero-Trust Controls
A new report on Operational Technology (OT) equipment flaws from automated cybersecurity software company Forescout outlines the alarming state of OT security. The report titled OT:ICEFALL was crafted by researchers at the company’s Vedere lab. It…
Q&A on Cyber Resiliency for Operational Technology
As recent cyberattacks have demonstrated increased risk to both IT and operational technology (OT) environments, resilience readiness today has evolved. It is more than a cybersecurity strategy and involves the enforcement of rules and policies that…
A priority investment: cyber security
The accelerating transition to digital transformation, with much data and information being processed on the cloud, has opened up exciting new business opportunities, but it has also increased the risk that manufacturing companies may suffer in…
IT vs OT: Information Technology (IT) vs. Operational Technology (OT) Cybersecurity
What is OT? Understanding Operational Technology (OT) Operational Technology (OT) refers to the technology and systems used to monitor, control, and manage physical processes and devices in various industrial and infrastructure sectors. Operational technology (OT) uses…
Should You Start with Network or Endpoint in OT Security?
OT/ICS security teams hear different perspectives from different groups and are often left confused as to the best place to begin. In Verve’s 30 years of experience in OT/ICS cyber security and reliability services, we often…
OT Cybersecurity Best Practices
Some of the OT security best practices for implementing a reliable protection system include: Network mapping and connectivity analysis Detection of suspicious activities, exposures, and malware attacks Implementing a zero-trust framework Aligning the right remote access tools Controlling identity and…
September 2022 Industrial IoT & ICS Cybersecurity Events
September is here. It’s not the new year, but it’s a new season. I guess it’s time to say goodbye to summer and hello to autumn! For this month, we’ve curated the list – and timeline…
How to Protect Your Business Against the Cybersecurity Labor Shortage
The cybersecurity world is currently grappling with a significant labor shortage. And that’s a problem with deep impacts. In fact, the Department of Homeland Security has cited the cybersecurity labor shortage as a major national security…
Defending OT Networks with Secure SD-WAN
As attacks against OT systems increase, so does the need for secure SD-WAN. Learn what it takes to gain visibility, control and awareness. Experts are predicting that there will be an increasing number of attacks against…
3 Protocol Trends You Should Know About
Since the introduction of Modbus in the late 1970s, network protocols for critical infrastructure and industrial automation have continually evolved. It’s only been in the past few years, though, that we’ve seen things go from slow…