All Articles

Log4j: Panic or lesson? How to protect deployed assets

Nearly every week, the cybersecurity community buzzes around a newly discovered vulnerability or breach. December’s alert for the CVE-2021-4428 vulnerability in Apache Foundation’s Log4j software is no different. Also known as the Log4Shell vulnerability, it is present […]

Key takeaways from 2020 ICS-CERT vulnerabilities

In 2020, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued 248 cybersecurity advisories for public consumption on the Cybersecurity and Infrastructure Security Agency’s (CISA) ICS-CERT portal. Verve analyzed all these advisories, regardless of whether […]

Lessons learned from the Colonial Pipeline attack

Over the weekend, Colonial Pipeline, owner of 5,500 miles of pipeline carrying natural gas, gasoline, and diesel from Texas to New Jersey, shut down its operations in response to what it said was a ransomware […]

How to protect embedded systems in OT cybersecurity

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are two pieces of information that can help guide you when understanding cybersecurity issues for embedded devices and the never-ending […]

Ron Brash
Ron Brash
Ron Brash is the VP of Technical Research & Integrations at aDolus Technology Inc. AS Information Technology & Applied Systems, Vancouver Island University, BS Technology, Security & Network Administration, British Columbia Institute of Technology, MS Computer Science, Concordia University