Archive

All entries

The Department of Defense has issued comprehensive guidance requiring all organizational units to implement zero-trust security principles across operational technology (OT) systems, marking a fundamental shift in how the military secures critical infrastructure from power grids to manufacturing control systems.
Zero Trust
Operational Technology
Cyber Resilience
Federal

Pentagon Mandates Zero Trust Security Framework for Operational Technology Environments

George V. Hulme
IT cybersecurity teams inheriting operational technology security and cyber-physical systems protection programs often come into these situations with competing incentives. This dynamic creates gaps in protecting OT and CPS that must be assessed and addressed.
Risk Management
Operational Resilience
Industrial
Operational Technology
Cyber Resilience

Competing Incentives Create IT/OT Security Gaps

Jon Holzbauer
Connected process control technologies force asset owners to change their perceptions of risk, cyber resilience, and operational resilience.
Operational Technology
Operational Resilience
Cyber Resilience
Risk Management

Nexus Reflections and Predictions: Steven Sim

Steven Sim
ASL Roma 1, a public health provider in Rome, has distinguished itself in the global healthcare landscape over the past two years by implementing advanced cybersecurity strategies, moving toward a hyper convergent security model, the so-called HyperSOC, in response to the growing cyber attacks in the global healthcare sector.
Healthcare
Risk Management
Cyber Resilience

Nexus Reflections and Predictions: Stefano Scaramuzzino

Stefano Scaramuzzino
nexus_secure-by-design-labonty-1731623724.jpg
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management

Nexus Reflections and Predictions: Jim LaBonty

Jim LaBonty
Compensating controls are often the only cybersecurity options available to offset risk in operational technology environments still supporting legacy technology or end-of-life industrial control systems or field devices.
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

Nexus Reflections and Predictions: Don C. Weber

Don C. Weber
nexus_hulme-ai-in-ot.jpg
Cyber Resilience
Operational Resilience
Operational Technology
Risk Management

CISA Warns: AI Integration Exposes OT to ‘Unsolved’ Semantic Threats

George V. Hulme
Industrial cybersecurity expert Danielle Jablanski reflects on market shifts around operational technology (OT) and industrial control systems (ICS) cybersecurity and predicts a newfound emphasis and approach to security metrics in 2026.
Operational Technology
Operational Resilience
Cyber Resilience
Risk Management

Nexus Reflections and Predictions: Danielle Jablanski

Danielle Jablanski
umbelino_prediction.jpg
Operational Technology
Cyber Resilience
Vulnerability Management

Nexus Reflections and Predictions: Pedro Umbelino

Pedro Umbelino
Jay Catherine, a security architect for a major retailer, joins the Nexus Podcast to discuss best practices for logistics cybersecurity within the retail space. This includes securing not only distribution, but also the operational technology involved in these manufacturing processes.
Industrial
Internet of Things
Cyber Resilience
Operational Resilience
Operational Technology

Nexus Podcast: Jay Catherine on Securing Logistics, OT in Retail

Michael Mimoso
Congress' failure to reauthorize the Cybersecurity Information Sharing Act of 2015 (CISA 2015) signals a fundamental shift in threat intelligence sharing and overall risk management strategies.
Vulnerability Management
Risk Management
Cyber Resilience
Industrial
Healthcare
Internet of Things

CISO Survival Guide: 4 Steps to Prepare for CISA 2015 Expiration

George V. Hulme
Jason Elrod, VP and CISO at Multicare Health System, discusses how artificial intelligence and machine learning can help security leaders have high confidence assertions around identity and privileges, and making authentication as frictionless as possible. The journey at his not-for-profit healthcare organization includes offloading certain manual processes to AI-led automation such as provisioning reviews and managing a trouble ticket queue.
Nexus Conference
Healthcare
Risk Management

Jason Elrod on Bringing AI to Identity Management

Jason Elrod, VP and CISO at Multicare Health System, discusses how artificial intelligence and machine learning can help security leaders have high confidence…
Michael Mimoso
Latest on Nexus Podcast