Archive

All entries

Enterprise CISOs must consider disinformation and misinformation campaigns targeting their companies and industries as part of their threat model. Organizations must also develop disinformation response plans, similar to incident response actions.
Operational Resilience
Cyber Resilience
Risk Management

CISOs Urged to Prepare for Evolving Disinformation Tactics

George V. Hulme
Securing connectivity in operational technology (OT) environments is crucial for the safety of critical infrastructure and maintaining the uninterrupted service it provides. Leaving unnecessary open ports, protocols, and services exposed, along with directly connected devices to the internet, such as programmable logic controllers (PLCs) and human machine interfaces (HMIs), greatly increases the risks of cyberattacks.
Industrial
Operational Technology
Risk Management

Explaining the Importance of Secure Connectivity in OT

Dan Ricci
nexus_sec.jpg
Risk Management

Court Ruling on SEC v. SolarWinds Good News for CISOs—For Now

Cristin Flynn Goodwin
nexus_med-dev-classification.jpg
Healthcare
Vulnerability Management
Risk Management

Better Medical Device Classification for Enhanced Risk Management

Manan Kakkar
Sam Templeton
nexus_red-lines-rogers-deterrence.jpg
Cyber Resilience
Healthcare
Industrial
Risk Management

Deterrence in Cyberspace Proving to be a Difficult Exercise

ADM. Michael S. Rogers, USN (Ret.)
nexus_cranes-hulme.jpg
Cyber Resilience
Risk Management
Industrial

US Government Expands Tech Restrictions to Safeguard Critical Infrastructure

George V. Hulme
nexus_sign.jpg
Cyber Resilience
Healthcare
Industrial
Operational Technology
Risk Management

CPS Security Leaders Convene on One Goal: Protect Mission-Critical Infrastructure

Upa Campbell
nexus_eu-flag-hulme-update.jpg
Risk Management

NIS2 Directive Must Be More Than a Compliance Exercise

George V. Hulme
nexus_sbom-practical.jpg
Vulnerability Management
Risk Management

Putting SBOMs to Practical Use

George V. Hulme
In this episode of the Nexus Podcast, Alethe Denis, a senior security consultant at Bishop Fox, joins to discuss the ongoing effectiveness of open-source intelligence analysis and social engineering tactics as a precursor to larger intrusions against critical infrastructure.
Cyber Resilience
Healthcare
Industrial
Risk Management

Nexus Podcast: Alethe Denis on Social Engineering, Red-Teaming

Michael Mimoso
Healthcare delivery organizations using open-source software experience a balance of development advantages and security tradeoffs. Visibility, oversight, and tracking the use of OSS is critical to reducing risks it introduces. SBOMs, meanwhile, can be an advantage, in particular with regard to vulnerability management.
Cyber Resilience
Healthcare
Vulnerability Management
Risk Management

Understanding the Risks of Open Source Software in Healthcare

George V. Hulme
In this episode of the Claroty Nexus Podcast, Alexander Antukh, the chief information security officer at AboitizPower, the Philippines’ largest owner and operator of renewable energy, discusses one path toward translating risk and losses into business terms: cyber risk quantification (CRQ).
Risk Management

Nexus Podcast: Alexander Antukh on Cyber Risk Quantification

Michael Mimoso
Latest on Nexus Podcast