• June 26, 2025

    Zero Trust Security for Microgrids and Energy Control Systems

    Key Points Growing Cyber Risk in Microgrids: The distributed nature, two-way data flows, and device diversity in microgrids greatly expand [...]

  • August 14, 2024

    Zero Trust for OT Security: Cyber Defense Inside the Perimeter

    Inside the Perimeter Defense is a Crucial Part of Defense in Depth for OT Security Firewalls for OT Security Perimeter [...]

  • May 31, 2024

    DNP3 Cybersecurity Risks: How to Protect ICS & SCADA Systems

    DNP3 Cybersecurity Risks Quick Summary DNP3 is widely used in ICS and SCADA but faces significant security gaps, especially in [...]

  • January 11, 2023

    Benefits of Zero Trust for OT Cybersecurity

    Operational technology (OT) refers to the hardware and software systems that are used to control and monitor physical devices, processes, [...]

  • December 6, 2022

    Why you need device-level endpoint protection for improving OT security

    Challenges in transferring IT security methods to protect OT devices leave commercial and industrial facilities open to attacks. These attacks [...]

  • October 5, 2022

    Scaling at the Edge – Making Industrial IoT and Smart Buildings Cyber Safe

      Making Industrial IoT and Smart Buildings Cyber Safe Veridify's cybersecurity uses technology from Intel and industrial computing hardware from [...]