Archive

All entries

U.S. critical infrastructure operators are urged to be vigilant in hardening operational technology and ICS cybersecurity in expectation of a retaliatory response from Iran for last week’s missile strikes.
Cyber Resilience
Operational Technology
Industrial
Internet of Things
Healthcare
Risk Management

Experts: Expect Iran’s Cyber Tactics to be Disruptive

George V. Hulme
nexus_underfunded-healthcare.jpg
Healthcare
Risk Management
Vulnerability Management
Cyber Resilience

Bridging the Cybersecurity Gap Among America's Underfunded Healthcare Providers

George V. Hulme
nexus_fabela-ur-e26.jpg
Cyber Resilience
Risk Management

E26: More Than Just a Maritime Cybersecurity Regulation—It's a Fundamental Shift

Ron Fabela
Sarah Fluchs revisits the progress and adoption of the Top 20 Secure PLC Coding Practices list.
Cyber Resilience
Risk Management
Vulnerability Management

Nexus Podcast Episode 100: Sarah Fluchs on the Cyber Resilience Act

Michael Mimoso
new_nexus_podcast.png
Healthcare
Industrial
Operational Technology
Internet of Things
Risk Management

Looking Back at 100 Episodes of the Nexus Podcast

Michael Mimoso
nexus_andrew-ohrt.png
Cyber Resilience
Operational Resilience
Operational Technology
Industrial
Risk Management

Nexus Podcast: Andrew Ohrt on Starting Cyber-Informed Engineering Projects

Michael Mimoso
nexus_cloud-and-ot.jpg
Cyber Resilience
Industrial
Operational Technology
Risk Management
Vulnerability Management

Cloud's Double-Edged Sword: Transforming OT Exposure Management

George V. Hulme
nexus_terlizzi-weaponize-hc.jpg
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

How Hackers Exploit Healthcare Technology to Turn Life-Saving Systems into Weapons

Francesco Terlizzi
Joe Slowik, threat intelligence and detections lead at Gigamon, joins the Nexus podcast to discuss a Virus Bulletin paper and presentation he gave recently on XENOTIME.
Federal
Risk Management
Cyber Resilience
Operational Resilience

Nexus Podcast: Joe Slowik on Identifying Truly ‘Critical’ Infrastructure

Michael Mimoso
The NSA's Cybersecurity Technical Report on securing smart OT controllers champions secure-by-design and cyber-informed engineering, stating they prioritize “engineering controls to mitigate the worst consequences of cyberattacks”-like physical damage or loss of life. CIE moves cybersecurity from a design afterthought to a core engineering discipline. Traditional OT security often relied on air-gapping or retrofitting defenses, but CIE mandates designing systems that inherently resist attacks.
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management

How Cyber-Informed Engineering Shapes NSA’s Blueprint for OT Cyber Resilience

George V. Hulme
danielle-jablanski.png
Cyber Resilience
Operational Resilience
Operational Technology
Risk Management
Federal

Nexus Podcast: Danielle Jablanski on Critical Infrastructure Protection

Michael Mimoso
cassie-crossley.jpeg
Federal
Cyber Resilience
Operational Resilience
Vulnerability Management
Risk Management

Nexus Podcast: Cassie Crossley on Hardware Security, HBOMs

Michael Mimoso
Latest on Nexus Podcast