Archive

All entries

steven-sim-ot-isac.jpeg
Operational Technology
Operational Resilience
Cyber Resilience
Vulnerability Management

Nexus Podcast: Steven Sim on OT-ISAC and Cybersecurity Information Sharing

Michael Mimoso
nexus_underfunded-healthcare.jpg
Healthcare
Risk Management
Vulnerability Management
Cyber Resilience

Bridging the Cybersecurity Gap Among America's Underfunded Healthcare Providers

George V. Hulme
Sarah Fluchs revisits the progress and adoption of the Top 20 Secure PLC Coding Practices list.
Cyber Resilience
Risk Management
Vulnerability Management

Nexus Podcast Episode 100: Sarah Fluchs on the Cyber Resilience Act

Michael Mimoso
shutterstock_1489100678-(3)-(1).jpg
Industrial
Operational Technology
Vulnerability Management

Managing Serial-to-Ethernet Exposures in Modern OT Networks

Alessio Rosas
nexus_cloud-and-ot.jpg
Cyber Resilience
Industrial
Operational Technology
Risk Management
Vulnerability Management

Cloud's Double-Edged Sword: Transforming OT Exposure Management

George V. Hulme
nexus_terlizzi-weaponize-hc.jpg
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

How Hackers Exploit Healthcare Technology to Turn Life-Saving Systems into Weapons

Francesco Terlizzi
cassie-crossley.jpeg
Federal
Cyber Resilience
Operational Resilience
Vulnerability Management
Risk Management

Nexus Podcast: Cassie Crossley on Hardware Security, HBOMs

Michael Mimoso
nexus_secure-by-default-hulme.jpg
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

Secure by Default: The Necessary Prescription for Secure Healthcare Delivery

George V. Hulme
On this episode of the Claroty Nexus Podcast, Mike Holcomb, global lead for ICS and OT cybersecurity at engineering and construction solution provider Fluor, discusses his advocacy and efforts to educate engineers and IT cybersecurity professionals in the nuances of protecting operational technology and industrial control systems.
Operational Technology
Operational Resilience
Vulnerability Management
Industrial

Nexus Podcast: Mike Holcomb on Starting and Succeeding in OT Cybersecurity

Michael Mimoso
Enterprises often are blind to the use of open source software in commercial and homegrown software development. Vulnerabilities and other weaknesses in OSS deployments are significant exposures that must be managed and mitigated.
Vulnerability Management
Risk Management
Technical Debt

Visibility, Governance Key to Managing Open Source Risk

George V. Hulme
Building management or automation systems are increasingly being connected online. Each connection to the internet introduces a new risk. Attackers looking for an entry point onto an internal network or to disrupt operations within a building could target a vulnerability in an internet-facing system and put the physical safety of occupants—or patients at a hospital, for example—at risk.
Vulnerability Management
Risk Management
Operational Resilience
Operational Technology

Reducing the Cybersecurity Risks of Connected BMS

Alessio Rosas
Ron Fabela joins the Nexus podcast to discuss his research into low-skilled threat actors targeting operational technology and industrial control systems. Many of these groups operate as hacktivists and carry out less sophisticated defacements and intrusions. While less of a risk, these incidents are still a drain on human resources required to investigate them and decided on mitigation strategies.
Industrial
Vulnerability Management
Risk Management
Operational Technology

Nexus Podcast: Ron Fabela on Low-Skilled OT/ICS Threat Actors

Michael Mimoso
Latest on Nexus Podcast