News

Protecting Industrial Control Systems Against Cyberattacks – Part 1 (Virsec Blog)

Now decades later, SCADA control systems are running on legacy software and operating systems. Air gapping is not a reliable protection due to widespread Internet connectivity. The class of cyberattacks aimed at Industry Control Systems (ICS) networks is particularly dangerous because the attack takes place in the system’s runtime memory....

versiondog 8.5.1 Available Now

We are excited to announce that versiondog 8.5.1 is available today! Customers with an active update and support agreement can download versiondog 8.5.1 on my.versiondog.com....

AVEVA Insight | Advanced Analytics (Part 3)

AVEVA is redefining the predictive analytics market through the intersection of AI and human insights. Combining intelligence with the digital twin enables customers to maximize profitability and drive risk out of their operations, while reducing downtime up to 25 per cent and maintenance costs by 30 per cent....

Take a Risk-Free, Incremental Approach to Modernize Your Automation Software

The ability to deploy a flexible, incremental approach to modernization and overlay new technologies with existing systems without delay, is more vital than ever as we strive to help businesses reallocate cash flow, re-calibrate operations and most importantly support their people through the current climate, ensuring their viability, success and sustainability in the longer term....

Overcoming Patching Pitfalls (Virsec blog)

Patching is often easier said than done. In fact, if there is a patching dilemma, less than half of organizations can patch quickly enough to defend against zero-day attacks. The good news? Virsec can reduce urgency for patching and help bridge the gap between when exploits arrive....

Four Tenets of Zero Trust Workload Protection (Virsec blog)

To better protect our enterprise systems, the Zero Trust model must be re-defined and expanded to cover applications and cloud workloads during runtime. This is the only way to ensure that the right code and processes can execute and nothing else, regardless of the threat environment....