Articles

Recent articles

Expert Don C. Weber writes that safety devices are within scope for cybersecurity risk assessments. This includes conducting high-level risk assessments to assemble documentation for specific Systems-under-Consideration (SuC) of the safety solution, performing a vulnerability assessment of the SuC, feeding the results into the detailed risk assessment to allow the risk management team to identify and address residual risks.
Operational Technology
Operational Resilience
Vulnerability Management

Architecting Safety Using Cybersecurity Requirements and Assessments

Don C. Weber
Healthcare
Vulnerability Management
Risk Management

FDA Sets Sights on Medical Device Vulnerability Management

George V. Hulme
Understanding the nuances of OT cybersecurity vulnerabilities becomes imperative for IT cybersecurity teams to develop comprehensive defense strategies that safeguard both IT and OT environments.
Operational Technology
Operational Resilience
Vulnerability Management
Risk Management

What IT Cybersecurity Teams Need to Know about OT Vulnerabilities (Part 1)

Dan Ricci
Risk Management
Vulnerability Management
Zero Trust
Operational Technology

A Strategic Necessity: Compensating Controls in ICS, OT

George V. Hulme
Operational Technology
Vulnerability Management
Operational Resilience

OT Patch Management Truths

George V. Hulme
Healthcare
Vulnerability Management

Hardening Medical Devices’ Soft and Risky Security Underbelly: Firmware

George V. Hulme
Healthcare
Vulnerability Management

Recapping Recent Strides in Medical Device Cybersecurity

George V. Hulme
Operational Technology
Vulnerability Management

Why ICS Vulnerabilities Do Matter

Dan Ricci
Assessing known medical device vulnerabilities and patches in order to minimize operational disruption and lessen negative impacts to patient care is a must in connected healthcare organizations.
Healthcare
Vulnerability Management

Considerations for Medical Device Vulnerability Remediation

Skip Sorrels
Take a pragmatic approach to patching operational technology environments; doing so addresses OT's unique vulnerability management challenges.
Industrial
Vulnerability Management
Operational Technology

‘One Does Not Simply Patch OT’

Dan Ricci

Latest on Nexus Podcast