Archive

All entries

Project Glasswing and the Claude Mythos Preview have caused an upheaval related to vulnerability discovery and exploit development. On Nexus, former NSA Director Adm. Michael S. Rogers introduces some nuance to the discussion. The nuance that isn’t being articulated enough, he says, is that Project Glasswing is largely a defensive effort that does more to level the playing field between threat actors and defenders than we may realize.
Cyber Resilience
Federal
Operational Resilience
Vulnerability Management

Exploring Some Nuance on Project Glasswing

ADM. Michael S. Rogers, USN (Ret.)
Rapid7 Principal Security Research (IoT) lead Deral Heiland joins the Nexus Podcast to discuss work his team did on how attackers might weaponize cellular-based IoT.  Rapid7 conducted three phases of this research, with the most recent digging into how attackers with access to these systems can abuse them to gain unauthorized access, potentially exfiltrate critical data, or pivot into backend network infrastructure.
Internet of Things
Vulnerability Management
Risk Management
Operational Resilience

Nexus Podcast: Deral Heiland on Weaponizing Cellular-Based IoT

Michael Mimoso
rob-king.jpg
Industrial
Operational Technology
Vulnerability Management

Nexus Podcast: Rob King on OT Asset Exposures, Mitigations

Michael Mimoso
Former Pfizer global head of automation engineering Jim LaBonty is featured in Episode 2 of Nexus Digest. Jim discusses a recent article he wrote on the interlock between data centers and modern manufacturing facilities. He describes their dependencies and how cybersecurity fits in these relationships.
Vulnerability Management
Risk Management

Nexus Digest: Jim LaBonty on Data Center and Manufacturing Cybersecurity

Former Pfizer global head of automation engineering Jim LaBonty is featured in Episode 2 of Nexus Digest. Jim discusses a recent article he wrote on the…
Michael Mimoso
On this episode of the Nexus Podcast, Health-ISAC VP of Medical Device Cybersecurity Phil Englert discusses the cybersecurity risks introduced by legacy technology in healthcare and how it impacts patient care and safety. He also brought context and insight into the U.S. Food and Drug Administration's (FDA) updated guidance on cybersecurity requirements for medical devices aimed at manufacturers and premarket product submissions.
Healthcare
Cyber Resilience
Vulnerability Management
Risk Management
Technical Debt

Nexus Podcast: Health-ISAC's Phil Englert on Medical Device Cybersecurity

Michael Mimoso
On this episode of the Nexus Podcast, Michael Pyle, Director of Product Cybersecurity at Schneider Electric (SE), joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to internet facing OT and industrial control systems (ICS) that are insecurely connected to the internet.
Operational Technology
Operational Resilience
Risk Management
Cyber Resilience
Industrial
Vulnerability Management

Nexus Podcast: Michael Pyle on Securing Internet-Facing OT, ICS Assets

Michael Mimoso
gus.jpg
Industrial
Cyber Resilience
Vulnerability Management
Operational Technology
Operational Resilience

Nexus Podcast: Gus Serino on the Efforts of a Massachusetts Water Cybersecurity Collaborative

Michael Mimoso
Data centers have been targeted for kinetic attacks during the ongoing Iran war, and given their strategic prioritization during the conflict, they could be targeted for cyberattacks as well. Nexus contributor James LaBonty explains the risk and potential vulnerabilities, including building management systems and other cyber-physical systems.
Cyber Resilience
Operational Technology
Risk Management
Vulnerability Management
Operational Resilience
Industrial

Protecting Physical, Digital Security of Data Centers During Conflict

Jim LaBonty
Rui Mella Jr., Cybersecurity Manager at Ascenty, explains how Latin American data center operators have achieved continuous, granular visibility into their critical assets and potential vulnerabilities, resulting in effective risk mitigation. This improved oversight is essential for maintaining complete control and security of their infrastructure.
Nexus Conference
Cyber Resilience
Risk Management
Vulnerability Management

Rui Mella on Data Center Risk Mitigation through Visibility

Rui Mella Jr., Cybersecurity Manager at Ascenty, explains how Latin American data center operators have achieved continuous, granular visibility into their…
Michael Mimoso
ricci-s4pod.jpeg
Vulnerability Management
Operational Technology
Operational Resilience
Cyber Resilience
Industrial

Nexus Podcast: Dan Ricci on Four Years of the ICS Advisory Project

Michael Mimoso
nexus_rogers-edge-alert.jpg
Cyber Resilience
Federal
Risk Management
Vulnerability Management

CISA Alert on EOL Edge Devices Should Also Spark Enhanced CPS Defenses

ADM. Michael S. Rogers, USN (Ret.)
In this episode of the Nexus Podcast, CISA ICS Cybersecurity Lead Matthew Rogers discusses new guidance from the agency on the use of security operational technology (OT) protocols, titled “Barriers to Secure OT Communication: Why Johnny Can’t Authenticate.” The paper advocates for the use of secure versions of legacy OT protocols, or the adoption of open standards by OEMs, in order to bring authentication and integrity to OT protocol communication.
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management
Vulnerability Management

Nexus Podcast: CISA’s Matthew Rogers on Secure OT Protocol Communication

Michael Mimoso
Latest on Nexus Podcast