Articles

Recent articles

nexus_refusetoaccept.jpg
Healthcare

FDA's Refuse to Accept Policy is Here

George V. Hulme
nexus_career-success.jpg
Risk Management

How to Get a Job in Cybersecurity–A Survival Guide

John Frushour
nexus_secure-design.jpg
Operational Technology
Industrial
Operational Resilience

Overcoming Inherent Design and Security Limitations of OT Devices

Juan Piacquadio
Tim Hall
nexus_medical-device-sec-improvments.jpg
Healthcare
Vulnerability Management

Recapping Recent Strides in Medical Device Cybersecurity

George V. Hulme
nexus_flowchart.jpg
Healthcare

SBOMs Promise Big Improvements in Healthcare Security, but Challenges Remain

George V. Hulme
nexus_weber-cloud.jpg
Industrial

Conducting Gap Assessments to Secure Control Environments’ Cloud-based Solutions

Don C. Weber
nexus_poor-visibility.jpg
Operational Technology
Industrial

OT Asset Visibility a Foundation for Secure Operations

George V. Hulme
nexus_extortion.jpg
Ransomware

Resilience, Recovery Strategies to Combat Ransomware and Extortion

ADM. Michael S. Rogers, USN (Ret.)
nexus_ics-vulns-matter.jpg
Operational Technology
Vulnerability Management

Why ICS Vulnerabilities Do Matter

Dan Ricci
nexus_sec-rule.jpg
Risk Management

CISOs Play a Critical Role in Compliance with New SEC Cybersecurity Disclosure Rules

George V. Hulme
nexus_bulk-power-vulns.jpg
Industrial
Operational Technology

Bulk Power System Risks Span Complexity, Vulnerabilities, Advanced Actors

George V. Hulme
nexus_med-device-visibility.jpg
Healthcare
Operational Resilience

Medical Device Visibility: Tracking What Must Be Secured

George V. Hulme

Latest on Nexus Podcast