Archive

All entries

nexusdig_megan.png
Risk Management
Cyber Resilience
Operational Resilience

Nexus Digest: Megan Stifel on National Cyber Strategy’s Pivot to Offensive Security

Megan Stifel, Chief Strategy Officer for the Institute for Security and Technology, joins the first episode of the Nexus Digest to discuss an article she wrote…
Michael Mimoso
On this episode of the Nexus Podcast, Michael Pyle, Director of Product Cybersecurity at Schneider Electric (SE), joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to internet facing OT and industrial control systems (ICS) that are insecurely connected to the internet.
Operational Technology
Operational Resilience
Risk Management
Cyber Resilience
Industrial
Vulnerability Management

Nexus Podcast: Michael Pyle on Securing Internet-Facing OT, ICS Assets

Michael Mimoso
nexus_goodwin-strategy.jpg
Cyber Resilience
Risk Management
Operational Technology
Operational Resilience

Administration Takes Aggressive Cyber Posture with New Strategy, Cybercrime Executive Order

Cristin Flynn Goodwin
Data centers have been targeted for kinetic attacks during the ongoing Iran war, and given their strategic prioritization during the conflict, they could be targeted for cyberattacks as well. Nexus contributor James LaBonty explains the risk and potential vulnerabilities, including building management systems and other cyber-physical systems.
Cyber Resilience
Operational Technology
Risk Management
Vulnerability Management
Operational Resilience
Industrial

Protecting Physical, Digital Security of Data Centers During Conflict

Jim LaBonty
Rui Mella Jr., Cybersecurity Manager at Ascenty, explains how Latin American data center operators have achieved continuous, granular visibility into their critical assets and potential vulnerabilities, resulting in effective risk mitigation. This improved oversight is essential for maintaining complete control and security of their infrastructure.
Nexus Conference
Cyber Resilience
Risk Management
Vulnerability Management

Rui Mella on Data Center Risk Mitigation through Visibility

Rui Mella Jr., Cybersecurity Manager at Ascenty, explains how Latin American data center operators have achieved continuous, granular visibility into their…
Michael Mimoso
On this episode of the Claroty Nexus Podcast, Dan Gunter, CEO and founder of Insane Cyber, lays out the challenges—and sometimes steep costs—of generating data that’s truly representative of the production environment rather than exclusively relying on a lab environment or emulation.
Operational Technology
Operational Resilience
Cyber Resilience
Risk Management

Nexus Podcast: Dan Gunter on Generating OT Data to Train Security Products

Michael Mimoso
nexus_rogers-edge-alert.jpg
Cyber Resilience
Federal
Risk Management
Vulnerability Management

CISA Alert on EOL Edge Devices Should Also Spark Enhanced CPS Defenses

ADM. Michael S. Rogers, USN (Ret.)
nexus_stifel-offensive-sec.jpg
Risk Management
Operational Resilience
Cyber Resilience
Federal
Healthcare
Industrial

Imminent National Cyber Strategy May Lean on Offense at the Expense of Defense

Megan Stifel
OT cybersecurity expert Mike Holcomb joins the Nexus Podcast live from S4 Conference in Miami to discuss how state actors may be leveraging hacktivists to target operational technology (OT). Holcomb has delineated these groups in what he calls a Converged Actor Framework that categorizes threat actors by the impact and frequency of their incidents. A converged actor is potentially the riskiest given the potential for high frequency high impact incidents.
Operational Technology
Risk Management
Cyber Resilience

Nexus Podcast: Mike Holcomb on the Intersection of Hacktivists and State Actors

Michael Mimoso
nexus-vid_debora-boriel.png
Nexus Conference
Healthcare
Cyber Resilience
Risk Management

Debora Borel on IT/OT Convergence in Hospitals

In this interview from Nexus Conference 2025, Debora Borel, Cyber Security Coordinator, Einstein Hospital Israelita in Sao Paolo, Brazil, explains how the…
Michael Mimoso
In this episode of the Nexus Podcast, CISA ICS Cybersecurity Lead Matthew Rogers discusses new guidance from the agency on the use of security operational technology (OT) protocols, titled “Barriers to Secure OT Communication: Why Johnny Can’t Authenticate.” The paper advocates for the use of secure versions of legacy OT protocols, or the adoption of open standards by OEMs, in order to bring authentication and integrity to OT protocol communication.
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management
Vulnerability Management

Nexus Podcast: CISA’s Matthew Rogers on Secure OT Protocol Communication

Michael Mimoso
OT cybersecurity expert Dan Ricci writes about what OT asset management and visibility can reveal about an industrial environments, including the surfacing of risk signals, exposure of hidden dependencies, and insight about the efficacy virtual network segmentation policies and practices.
Industrial
Operational Resilience
Operational Technology
Cyber Resilience
Risk Management

From OT Asset Management to Insight: Turning Visibility Into Something That Matters

Dan Ricci
Latest on Nexus Podcast