Articles

Recent articles

nexus_labonty-manuf-checklist.jpg
Industrial
Cyber Resilience
Operational Technology
Operational Resilience
Risk Management

An Operational Checklist for Securing the IT/OT Ecosystem

Jim LaBonty
nexus_secure-by-default-hulme.jpg
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

Secure by Default: The Necessary Prescription for Secure Healthcare Delivery

George V. Hulme
nexus_visibility-ricci.jpg
Industrial
Operational Resilience
Cyber Resilience
Risk Management

The Power of Complete OT Asset Visibility: Transforming Security and Efficiency

Dan Ricci
nexus_hypersoc-hope.jpg
Healthcare
Cyber Resilience
Risk Management

ASL Roma 1: From HyperSOC to H.O.P.E.

Stefano Scaramuzzino
Fabio Battelli
nexus_quantum.jpg
Cyber Resilience
Operational Resilience
Risk Management

The Quantum Compliance Leap: Preparing for Q-Day

Cristin Flynn Goodwin
The European Union Agency for Cybersecurity (ENISA)'s NIS360 report identifies gaps in the current state of NIS2 compliance readiness and provides recommendations to lawmakers and affected industry verticals on what they need to do to become NIS2 compliant.
Cyber Resilience
Healthcare
Industrial
Operational Resilience
Operational Technology
Zero Trust

ENISA Attempts to Move NIS2 Forward with NIS360 Findings

George V. Hulme
EU software and IoT device manufacturers must begin their efforts to come into compliance with the EU's Cyber Resilience Act (CRA). The CRA aims to protect consumers and businesses buying software or hardware products with a digital component from vulnerabilities and improve secure software development practices.
Cyber Resilience
Operational Resilience
Industrial
Healthcare
Risk Management

Software Security is Aim of EU Cyber Resilience Act Compliance

George V. Hulme
As shop floors and factories get smarter, there is an unprecedented surge in, and demand for, remote access to manufacturing systems. Former Pfizer global head of automation engineering Jim LaBonty writes for Claroty Nexus about the need to secure remote access to manufacturing environments to reduce risk and improve efficiency.
Cyber Resilience
Operational Technology
Zero Trust

Secure Remote Access for Smart Factory Environments

Jim LaBonty
Former NSA Director Adm. Michael S. Rogers shares three priorities the Trump Administration should pursue with regard to cybersecurity and critical infrastructure protection. Those include resuming the Cybersecurity Review Board, urging enterprises to focus on basic security hygiene, and exert its influence on vendors to secure their products.
Cyber Resilience
Risk Management
Industrial
Healthcare

3 Cybersecurity Priorities for the New Administration

ADM. Michael S. Rogers, USN (Ret.)
Exploitable cybersecurity vulnerabilities in Contec's CMS8000 patient monitors may be an insecure design choice rather than a backdoor as labeled by CISA. But regardless, the risk of leaked patients' protected health information (PHI) and remote code execution remains a real possibility.
Healthcare
Risk Management
Vulnerability Management
Cyber Resilience

Insecure Design Choice Puts Patient Safety, Data at Risk

George V. Hulme
Exploitable cybersecurity vulnerabilities in Contec's CMS8000 patient monitors may be an insecure design choice rather than a backdoor as labeled by CISA. But regardless, the risk of leaked patients' protected health information (PHI) and remote code execution remains a real possibility.
Risk Management
Operational Resilience
Cyber Resilience

Outgoing Biden EO Takes Aim at Improved Software Security

George V. Hulme
IT cybersecurity team members bring a fresh set of experience and perspective to the protection of cyber-physical systems and industrial and automation control system production environments.
Industrial
Operational Technology
Cyber Resilience

Accelerating IACS/OT Cybersecurity Improvements

Don C. Weber
Latest on Nexus Podcast