Archive

All entries

cassie-crossley.jpeg
Federal
Cyber Resilience
Operational Resilience
Vulnerability Management
Risk Management

Nexus Podcast: Cassie Crossley on Hardware Security, HBOMs

Michael Mimoso
nexus_labonty-manuf-checklist.jpg
Industrial
Cyber Resilience
Operational Technology
Operational Resilience
Risk Management

An Operational Checklist for Securing the IT/OT Ecosystem

Jim LaBonty
On this episode of the Nexus Podcast, Rapid7 Senior Director of Threat Analytics Christiaan Beek explores the economics of ransomware and the continued profitability and success of it as an attack vector.
Ransomware
Cyber Resilience
Risk Management

Nexus Podcast: Christiaan Beek on Ransomware’s Continued Profitability

Michael Mimoso
nexus_secure-by-default-hulme.jpg
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

Secure by Default: The Necessary Prescription for Secure Healthcare Delivery

George V. Hulme
nexus_visibility-ricci.jpg
Industrial
Operational Resilience
Cyber Resilience
Risk Management

The Power of Complete OT Asset Visibility: Transforming Security and Efficiency

Dan Ricci
nexus_hypersoc-hope.jpg
Healthcare
Cyber Resilience
Risk Management

ASL Roma 1: From HyperSOC to H.O.P.E.

Stefano Scaramuzzino
Fabio Battelli
nexus_quantum.jpg
Cyber Resilience
Operational Resilience
Risk Management

The Quantum Compliance Leap: Preparing for Q-Day

Cristin Flynn Goodwin
florence-hudson-picture_edit.jpg
Healthcare
Internet of Things
Risk Management
Cyber Resilience

Nexus Podcast: Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard

Michael Mimoso
Reactive cybersecurity programs are destined for a fate similar to the story of the boiling frog, one that doesn’t know it’s in trouble until it’s too late. Proactive and predictive approaches to cybersecurity are a must because they act as early warning systems that alert organizations before disaster strikes.
Risk Management
Industrial
Healthcare

‘The Boiled Frog’: A Cybersecurity Lesson for Organizations

Francesco Terlizzi
Enterprises often are blind to the use of open source software in commercial and homegrown software development. Vulnerabilities and other weaknesses in OSS deployments are significant exposures that must be managed and mitigated.
Vulnerability Management
Risk Management
Technical Debt

Visibility, Governance Key to Managing Open Source Risk

George V. Hulme
Building management or automation systems are increasingly being connected online. Each connection to the internet introduces a new risk. Attackers looking for an entry point onto an internal network or to disrupt operations within a building could target a vulnerability in an internet-facing system and put the physical safety of occupants—or patients at a hospital, for example—at risk.
Vulnerability Management
Risk Management
Operational Resilience
Operational Technology

Reducing the Cybersecurity Risks of Connected BMS

Alessio Rosas
Ron Fabela joins the Nexus podcast to discuss his research into low-skilled threat actors targeting operational technology and industrial control systems. Many of these groups operate as hacktivists and carry out less sophisticated defacements and intrusions. While less of a risk, these incidents are still a drain on human resources required to investigate them and decided on mitigation strategies.
Industrial
Vulnerability Management
Risk Management
Operational Technology

Nexus Podcast: Ron Fabela on Low-Skilled OT/ICS Threat Actors

Michael Mimoso
Latest on Nexus Podcast