• February 1, 2023

    The Importance of Protecting Smart Building Technology from Cyber Threats

    Key Points Smart Buildings Are Rapidly Expanding: With over 115 million buildings expected to use smart technologies by 2026, these [...]

  • January 24, 2023

    How Malware Can Impact OT Networks

    Malware Impact on OT Networks Malware, or malicious software, can have a serious impact on operational technology (OT) networks, which [...]

  • January 18, 2023

    Differences between Zero Trust, Network Segmentation, and Microsegmentation for OT Cybersecurity

    Zero Trust, Network Segmentation, and Microsegmentation important OT cybersecurity strategies, but they have different goals and approach to security. This [...]

  • January 13, 2023

    AHR Expo 2023 Event Preview

    Veridify Security will be exhibiting at the AHR Expo 2023 in booth C5455. Our demo shown below is ready to [...]

  • January 11, 2023

    Benefits of Zero Trust for OT Cybersecurity

    Operational technology (OT) refers to the hardware and software systems that are used to control and monitor physical devices, processes, [...]

  • December 6, 2022

    Why you need device-level endpoint protection for improving OT security

    Challenges in transferring IT security methods to protect OT devices leave commercial and industrial facilities open to attacks. These attacks [...]

  • October 28, 2022

    77% Increase in Malware Attacks for IoT/Connected Devices in 1H22

    There was an increase in malware attacks on IoT/Connected Devices of 77% in the first half of 2022, according to [...]

  • October 13, 2022

    Cybersecurity in the Workplace: 4 Tips to Keep Your Business Safe and Secure

    Keeping information safe and secure is a challenging development for businesses of all sizes over the last few years. Expeditious [...]

  • October 6, 2022

    Anatomy of a Data Breach

    What are They and What to do When You Spot One? Arguably no phrase has dominated the tech world the [...]

  • October 3, 2022

    Concerned About Cybersecurity? 4 Easy Steps for Staying Secure

    Cybersecurity - 4 Steps for Staying Secure Cybersecurity has become one of the biggest hot topics both inside and outside [...]