Search
Close this search box.

IIoT & Cloud

How cyberattacks take down critical infrastructure

How cyberattacks take down critical infrastructure

The recent high-profile attacks against Colonial Pipeline and JBS Foods highlight that operational technology (OT) — the devices that drive gas flows and food processing, along with essentially all other machine-driven physical processes — does […]

Courtesy: GlobalData Distruptor Intelligence Center

GlobalData predicts future cybersecurity unicorns

Right from the network and data security to identity management and unified threat management (UTM), startups are offering cybersecurity solutions to identify vulnerabilities, thwart attacks and secure networks. Against this backdrop, the unicorn prediction model […]

Key takeaways from 2020 ICS-CERT vulnerabilities

Key takeaways from 2020 ICS-CERT vulnerabilities

In 2020, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued 248 cybersecurity advisories for public consumption on the Cybersecurity and Infrastructure Security Agency’s (CISA) ICS-CERT portal. Verve analyzed all these advisories, regardless of whether […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Securing cloud data is a challenge for many companies

To accommodate remote work and improve efficiency, 85% of IT organizations are considering or already using the public cloud. However, with some of their most crucial data still located within the corporate perimeter, NetOps must come up […]

How cyberattacks take down critical infrastructure

How cyberattacks take down critical infrastructure

The recent high-profile attacks against Colonial Pipeline and JBS Foods highlight that operational technology (OT) — the devices that drive gas flows and food processing, along with essentially all other machine-driven physical processes — does […]

Courtesy: GlobalData Distruptor Intelligence Center

GlobalData predicts future cybersecurity unicorns

Right from the network and data security to identity management and unified threat management (UTM), startups are offering cybersecurity solutions to identify vulnerabilities, thwart attacks and secure networks. Against this backdrop, the unicorn prediction model […]

Key takeaways from 2020 ICS-CERT vulnerabilities

Key takeaways from 2020 ICS-CERT vulnerabilities

In 2020, the Industrial Control Systems Cyber Emergency Response Team (ICS-CERT) issued 248 cybersecurity advisories for public consumption on the Cybersecurity and Infrastructure Security Agency’s (CISA) ICS-CERT portal. Verve analyzed all these advisories, regardless of whether […]

Many wonder where to start when attempting to protect embedded systems in OT cybersecurity? Here are some great places to start.

Securing cloud data is a challenge for many companies

To accommodate remote work and improve efficiency, 85% of IT organizations are considering or already using the public cloud. However, with some of their most crucial data still located within the corporate perimeter, NetOps must come up […]

SUBSCRIBE

GET ON THE BEAT

 

Keep your finger on the pulse of top industry news

RECENT NEWS
HACKS & ATTACKS
RESOURCES