Articles

Recent articles

nexus_red-lines-rogers-deterrence.jpg
Cyber Resilience
Healthcare
Industrial
Risk Management

Deterrence in Cyberspace Proving to be a Difficult Exercise

ADM. Michael S. Rogers, USN (Ret.)
nexus_cranes-hulme.jpg
Cyber Resilience
Risk Management
Industrial

US Government Expands Tech Restrictions to Safeguard Critical Infrastructure

George V. Hulme
nexus_sign.jpg
Cyber Resilience
Healthcare
Industrial
Operational Technology
Risk Management

CPS Security Leaders Convene on One Goal: Protect Mission-Critical Infrastructure

Upa Campbell
Mike Ratliff, AVP Security Engineering and Operations at Providence, writes about five steps healthcare delivery organizations should take to mitigate the risk of ransomware and extortion-based attacks.
Ransomware
Healthcare
Cyber Resilience

5 Things Hospitals Can Do to Mitigate Threats of Ransomware

Mike Ratliff
Sam Templeton
Healthcare delivery organizations using open-source software experience a balance of development advantages and security tradeoffs. Visibility, oversight, and tracking the use of OSS is critical to reducing risks it introduces. SBOMs, meanwhile, can be an advantage, in particular with regard to vulnerability management.
Cyber Resilience
Healthcare
Vulnerability Management
Risk Management

Understanding the Risks of Open Source Software in Healthcare

George V. Hulme
In OT and ICS cybersecurity, living off the land (LOTL) techniques refer to the practice of attackers using the existing tools and processes in a target system to carry out their malicious activities. This approach is particularly dangerous because it allows the attacker to blend in with everyday activities, making detection significantly more challenging.
Operational Technology
Cyber Resilience
Industrial

How Living-Off-The-Land Techniques Impact OT and ICS

Dan Ricci
If we are indeed at the full outset of Industry 4.0, the fourth industrial revolution, initiatives such as smart manufacturing will not truly succeed without keen awareness of new cybersecurity risks introduced by IT/OT connectivity and advanced technologies.
Cyber Resilience
Internet of Things
Operational Resilience
Operational Technology

Smart Manufacturing Requires Proactive Cybersecurity

Jim LaBonty
On Nexus, former NSA Director Adm. Michael Rogers writes about the current legislative and personal liability changes that are impacting the CISO office. But Rogers urges security leaders to view these times as an opportunity to refine their business acumen and ensure cybersecurity is a priority across the enterprise.
Risk Management
Operational Resilience
Cyber Resilience

CISO Unrest is an Opportunity

ADM. Michael S. Rogers, USN (Ret.)
ASL Roma 1, a public health provider in Rome, has distinguished itself in the global healthcare landscape over the past two years by implementing advanced cybersecurity strategies, moving toward a hyper convergent security model, the so-called HyperSOC, in response to the growing cyber attacks in the global healthcare sector.
Healthcare
Cyber Resilience

The Cybersecurity Revolution at ASL Roma 1: From Traditional Solutions to HyperSOC

Stefano Scaramuzzino
nexus_water-epa.jpg
Operational Technology
Cyber Resilience

EPA Cybersecurity Warning to Water Systems Faces Challenges

George V. Hulme
nexus_wh-resets-direction.jpg
Cyber Resilience
Risk Management

White House Resets Direction for Critical Infrastructure Protection

Cristin Flynn Goodwin
Operational technology’s (OT) exposure to cyber threats extends beyond the confines of technical software and firmware vulnerabilities. The supply chain and insiders are two significant areas of concern, where risks can originate from third-party vendors or suppliers with inadequate cybersecurity measures or those inside the firewall with similarly privileged access.
Cyber Resilience
Operational Resilience

Mitigating Exposures the Key to Cyber Resilience

Dan Ricci
Latest on Nexus Podcast