Articles

Recent articles

ASL Roma 1, a public health provider in Rome, has distinguished itself in the global healthcare landscape over the past two years by implementing advanced cybersecurity strategies, moving toward a hyper convergent security model, the so-called HyperSOC, in response to the growing cyber attacks in the global healthcare sector.
Healthcare
Cyber Resilience

The Cybersecurity Revolution at ASL Roma 1: From Traditional Solutions to HyperSOC

Stefano Scaramuzzino
Secure remote access for third parties is a growing demand within OT and ICS environments. CISOs must understand and mitigate the risk third-party access introduces by having visibility into these connections, limiting access when appropriate, and applying other mitigations.
Operational Technology

Closing the Door on Third-Party Access Risks

George V. Hulme
Operational Technology
Risk Management

How to Unify Colliding IT/OT Worlds

George V. Hulme
Healthcare

Revolution, Risks of AI’s Transformation of Pharma Manufacturing

Juan Piacquadio
Tim Hall
Operational Technology
Cyber Resilience

EPA Cybersecurity Warning to Water Systems Faces Challenges

George V. Hulme
Cyber Resilience
Risk Management

White House Resets Direction for Critical Infrastructure Protection

Cristin Flynn Goodwin
It’s incumbent upon the enterprise to manage third-party supply-chain relationships with cybersecurity as a foremost priority, in particular locking down access to critical systems and adequately managing and assigning privileged access to third parties.
Operational Technology

Examining Third-Party Supply-Chain Risks Around Secure Access

Jim LaBonty
Operational technology’s (OT) exposure to cyber threats extends beyond the confines of technical software and firmware vulnerabilities. The supply chain and insiders are two significant areas of concern, where risks can originate from third-party vendors or suppliers with inadequate cybersecurity measures or those inside the firewall with similarly privileged access.
Cyber Resilience
Operational Resilience

Mitigating Exposures the Key to Cyber Resilience

Dan Ricci
Cybersecurity experts are cautious about the new National Security Memorandum (NSM), which replaces the decade-old Presidential Policy Directive. Proponents say, will help strengthen the security of critical infrastructure within the United States, but because it's short on prescriptive details, security experts are unsure of the path forward.
Cyber Resilience
Risk Management

White House Signs Critical Infrastructure Memorandum, Details Remain Unclear

George V. Hulme
Expert Don C. Weber writes that safety devices are within scope for cybersecurity risk assessments. This includes conducting high-level risk assessments to assemble documentation for specific Systems-under-Consideration (SuC) of the safety solution, performing a vulnerability assessment of the SuC, feeding the results into the detailed risk assessment to allow the risk management team to identify and address residual risks.
Operational Technology
Operational Resilience
Vulnerability Management

Architecting Safety Using Cybersecurity Requirements and Assessments

Don C. Weber
OT and ICS asset owners must consider non-traditional OT exposures beyond software vulnerabilities—a comprehensive exposure management approach to risk reduction—to understand the multifaceted challenges and the proactive measures necessary to safeguard critical infrastructure.
Cyber Resilience
Operational Technology
Risk Management

Operational Technology Exposure: Beyond Software Vulnerabilities

Dan Ricci
The Change Healthcare cyberattack has spurred the proposal of new legislation from Sen. Mark Warner to demand minimum cybersecurity standards of hospitals and healthcare delivery organizations, or face financial penalties.
Healthcare

Change Healthcare Attack May Spur New Cybersecurity Laws

George V. Hulme

Latest on Nexus Podcast