Archive

All entries

On this episode of the Nexus Podcast, Michael Pyle, Director of Product Cybersecurity at Schneider Electric (SE), joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to internet facing OT and industrial control systems (ICS) that are insecurely connected to the internet.
Operational Technology
Operational Resilience
Risk Management
Cyber Resilience
Industrial
Vulnerability Management

Nexus Podcast: Michael Pyle on Securing Internet-Facing OT, ICS Assets

Michael Mimoso
gus.jpg
Industrial
Cyber Resilience
Vulnerability Management
Operational Technology
Operational Resilience

Nexus Podcast: Gus Serino on the Efforts of a Massachusetts Water Cybersecurity Collaborative

Michael Mimoso
Data centers have been targeted for kinetic attacks during the ongoing Iran war, and given their strategic prioritization during the conflict, they could be targeted for cyberattacks as well. Nexus contributor James LaBonty explains the risk and potential vulnerabilities, including building management systems and other cyber-physical systems.
Cyber Resilience
Operational Technology
Risk Management
Vulnerability Management
Operational Resilience
Industrial

Protecting Physical, Digital Security of Data Centers During Conflict

Jim LaBonty
Rui Mella Jr., Cybersecurity Manager at Ascenty, explains how Latin American data center operators have achieved continuous, granular visibility into their critical assets and potential vulnerabilities, resulting in effective risk mitigation. This improved oversight is essential for maintaining complete control and security of their infrastructure.
Nexus Conference
Cyber Resilience
Risk Management
Vulnerability Management

Rui Mella on Data Center Risk Mitigation through Visibility

Rui Mella Jr., Cybersecurity Manager at Ascenty, explains how Latin American data center operators have achieved continuous, granular visibility into their…
Michael Mimoso
ricci-s4pod.jpeg
Vulnerability Management
Operational Technology
Operational Resilience
Cyber Resilience
Industrial

Nexus Podcast: Dan Ricci on Four Years of the ICS Advisory Project

Michael Mimoso
nexus_rogers-edge-alert.jpg
Cyber Resilience
Federal
Risk Management
Vulnerability Management

CISA Alert on EOL Edge Devices Should Also Spark Enhanced CPS Defenses

ADM. Michael S. Rogers, USN (Ret.)
In this episode of the Nexus Podcast, CISA ICS Cybersecurity Lead Matthew Rogers discusses new guidance from the agency on the use of security operational technology (OT) protocols, titled “Barriers to Secure OT Communication: Why Johnny Can’t Authenticate.” The paper advocates for the use of secure versions of legacy OT protocols, or the adoption of open standards by OEMs, in order to bring authentication and integrity to OT protocol communication.
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management
Vulnerability Management

Nexus Podcast: CISA’s Matthew Rogers on Secure OT Protocol Communication

Michael Mimoso
Adam Jurgensen, Medical Device Security Engineer at Valley Health Systems, brings us inside the roles and responsibilities of those experts overseeing connected devices inside healthcare organizations. Jurgensen describes the restrictions his role faces when it comes to updating and patching connected medical devices, the gamut of which may run from MRIs, CT, ultrasounds, to patient monitors, and defibrillators. Compensating controls, segmentation, and other cybersecurity strategies are key for keeping devices secure and patients safe in the event of an incident.
Nexus Conference
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

Adam Jurgensen on Medical Device Cybersecurity

Adam Jurgensen, Medical Device Security Engineer at Valley Health Systems, brings us inside the roles and responsibilities of those experts overseeing…
Michael Mimoso
Team82 vulnerability research lead Noam Moshe discusses his team’s expansive look into IP-based surveillance cameras manufactured by Sweden’s Axis Communications, a leading company in this space. Companies like Axis are selling more and more into Western enterprises given bans on certain Chinese technologies. Moshe’s research uncovered a number of vulnerabilities in the management framework used to oversee these devices, as well as the communication protocol in play. Attackers can exploit these issues to gain control of cameras, move onto the corporate network, and disrupt the safety of a business.
Nexus Conference
Internet of Things
Vulnerability Management

Noam Moshe on Hacking Enterprise-Grade IP Cameras

Team82 vulnerability research lead Noam Moshe discusses his team’s expansive look into IP-based surveillance cameras manufactured by Sweden’s Axis…
Michael Mimoso
Cybersecurity experts identify five trends that leaders responsible for cyber-physical systems protection programs and OT security must strategize around.
Cyber Resilience
Industrial
Operational Technology
Operational Resilience
Vulnerability Management
Risk Management

5 Trends Driving OT Security in 2026: From State-Sponsored Attacks to AI-Powered Threats

George V. Hulme
Compensating controls are often the only cybersecurity options available to offset risk in operational technology environments still supporting legacy technology or end-of-life industrial control systems or field devices.
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

Nexus Reflections and Predictions: Don C. Weber

Don C. Weber
umbelino_prediction.jpg
Operational Technology
Cyber Resilience
Vulnerability Management

Nexus Reflections and Predictions: Pedro Umbelino

Pedro Umbelino
Latest on Nexus Podcast