Articles

Recent articles

Mike Ratliff, CISO at Providence, one of the country's largest not-for-profit healthcare providers, writes about his organization's attempt to re-think GRC as Governance, Risk, Attack Surface Management, and Compliance (GRAC). Ratliff describes five areas GRAC improves the overall security program, including the quantification and prioritization of risk, the integration of attack surface management, and an architecture that supports secure-by-design principles.
Healthcare
Risk Management
Cyber Resilience
Operational Resilience

Rebuilding Legacy GRC from the Ground Up

Mike Ratliff
ASL Roma 1’s HOPE (Healthcare Operational Protection & Excellence) project stands as a cutting-edge initiative in healthcare cybersecurity, leveraging advanced technologies and innovative methodologies to strengthen organizational resilience. Here we lay the foundation for explaining how our CMDB becomes a key tool for proactively managing vulnerabilities, especially during waves of CVEs (Common Vulnerabilities and Exposures) that can quickly disrupt complex environments.
Healthcare
Operational Resilience
Cyber Resilience
Vulnerability Management

ASL Roma 1’s HOPE: Innovation and Resilience to Vulnerability Waves

Stefano Scaramuzzino
Fabio Battelli
U.S. critical infrastructure operators are urged to be vigilant in hardening operational technology and ICS cybersecurity in expectation of a retaliatory response from Iran for last week’s missile strikes.
Cyber Resilience
Operational Technology
Industrial
Internet of Things
Healthcare
Risk Management

Experts: Expect Iran’s Cyber Tactics to be Disruptive

George V. Hulme
nexus_underfunded-healthcare.jpg
Healthcare
Risk Management
Vulnerability Management
Cyber Resilience

Bridging the Cybersecurity Gap Among America's Underfunded Healthcare Providers

George V. Hulme
nexus_terlizzi-weaponize-hc.jpg
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

How Hackers Exploit Healthcare Technology to Turn Life-Saving Systems into Weapons

Francesco Terlizzi
nexus_secure-by-default-hulme.jpg
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

Secure by Default: The Necessary Prescription for Secure Healthcare Delivery

George V. Hulme
nexus_hypersoc-hope.jpg
Healthcare
Cyber Resilience
Risk Management

ASL Roma 1: From HyperSOC to H.O.P.E.

Stefano Scaramuzzino
Fabio Battelli
The European Union Agency for Cybersecurity (ENISA)'s NIS360 report identifies gaps in the current state of NIS2 compliance readiness and provides recommendations to lawmakers and affected industry verticals on what they need to do to become NIS2 compliant.
Cyber Resilience
Healthcare
Industrial
Operational Resilience
Operational Technology
Zero Trust

ENISA Attempts to Move NIS2 Forward with NIS360 Findings

George V. Hulme
Reactive cybersecurity programs are destined for a fate similar to the story of the boiling frog, one that doesn’t know it’s in trouble until it’s too late. Proactive and predictive approaches to cybersecurity are a must because they act as early warning systems that alert organizations before disaster strikes.
Risk Management
Industrial
Healthcare

‘The Boiled Frog’: A Cybersecurity Lesson for Organizations

Francesco Terlizzi
EU software and IoT device manufacturers must begin their efforts to come into compliance with the EU's Cyber Resilience Act (CRA). The CRA aims to protect consumers and businesses buying software or hardware products with a digital component from vulnerabilities and improve secure software development practices.
Cyber Resilience
Operational Resilience
Industrial
Healthcare
Risk Management

Software Security is Aim of EU Cyber Resilience Act Compliance

George V. Hulme
Former NSA Director Adm. Michael S. Rogers shares three priorities the Trump Administration should pursue with regard to cybersecurity and critical infrastructure protection. Those include resuming the Cybersecurity Review Board, urging enterprises to focus on basic security hygiene, and exert its influence on vendors to secure their products.
Cyber Resilience
Risk Management
Industrial
Healthcare

3 Cybersecurity Priorities for the New Administration

ADM. Michael S. Rogers, USN (Ret.)
Exploitable cybersecurity vulnerabilities in Contec's CMS8000 patient monitors may be an insecure design choice rather than a backdoor as labeled by CISA. But regardless, the risk of leaked patients' protected health information (PHI) and remote code execution remains a real possibility.
Healthcare
Risk Management
Vulnerability Management
Cyber Resilience

Insecure Design Choice Puts Patient Safety, Data at Risk

George V. Hulme
Latest on Nexus Podcast