Articles

Recent articles

nexus_labonty-manuf-checklist.jpg
Industrial
Cyber Resilience
Operational Technology
Operational Resilience
Risk Management

An Operational Checklist for Securing the IT/OT Ecosystem

Jim LaBonty
nexus_convergence_rogers.jpg
Industrial
Operational Technology
Operational Resilience

Has IT/OT Convergence Improved Critical Infrastructure Cybersecurity?

ADM. Michael S. Rogers, USN (Ret.)
nexus_visibility-ricci.jpg
Industrial
Operational Resilience
Cyber Resilience
Risk Management

The Power of Complete OT Asset Visibility: Transforming Security and Efficiency

Dan Ricci
nexus_secure-access-visibility.jpg
Zero Trust
Operational Resilience
Operational Technology
Industrial

Poor Visibility Still a Drag on Secure Third-Party Remote Access

George V. Hulme
nexus_quantum.jpg
Cyber Resilience
Operational Resilience
Risk Management

The Quantum Compliance Leap: Preparing for Q-Day

Cristin Flynn Goodwin
The European Union Agency for Cybersecurity (ENISA)'s NIS360 report identifies gaps in the current state of NIS2 compliance readiness and provides recommendations to lawmakers and affected industry verticals on what they need to do to become NIS2 compliant.
Cyber Resilience
Healthcare
Industrial
Operational Resilience
Operational Technology
Zero Trust

ENISA Attempts to Move NIS2 Forward with NIS360 Findings

George V. Hulme
A diversified operational technology (OT) cybersecurity monitoring platform plays a key role in strengthening the protection of cyber-physical systems by providing clear visibility, real-time threat detection, and proactive risk mitigation. By integrating multiple monitoring tools and technologies, organizations can build a layered security approach that minimizes vulnerabilities, improves response times, and keeps critical systems resilient against cyber threats.
Operational Resilience
Operational Technology
Federal

Diversified Monitoring Essential to a Strong OT Cybersecurity Foundation

John Ballentine
Building management or automation systems are increasingly being connected online. Each connection to the internet introduces a new risk. Attackers looking for an entry point onto an internal network or to disrupt operations within a building could target a vulnerability in an internet-facing system and put the physical safety of occupants—or patients at a hospital, for example—at risk.
Vulnerability Management
Risk Management
Operational Resilience
Operational Technology

Reducing the Cybersecurity Risks of Connected BMS

Alessio Rosas
EU software and IoT device manufacturers must begin their efforts to come into compliance with the EU's Cyber Resilience Act (CRA). The CRA aims to protect consumers and businesses buying software or hardware products with a digital component from vulnerabilities and improve secure software development practices.
Cyber Resilience
Operational Resilience
Industrial
Healthcare
Risk Management

Software Security is Aim of EU Cyber Resilience Act Compliance

George V. Hulme
Exploitable cybersecurity vulnerabilities in Contec's CMS8000 patient monitors may be an insecure design choice rather than a backdoor as labeled by CISA. But regardless, the risk of leaked patients' protected health information (PHI) and remote code execution remains a real possibility.
Risk Management
Operational Resilience
Cyber Resilience

Outgoing Biden EO Takes Aim at Improved Software Security

George V. Hulme
Five cybersecurity trends for operational technology (OT) figure to dominate in 2025. They include: increased government and regulatory scrutiny on OT, the need for new strategies to secure once air-gapped OT, and OT specialization for CISOs and others in cybersecurity leadership roles.
Cyber Resilience
Operational Technology
Operational Resilience
Risk Management

Five Trends Driving OT Cybersecurity in 2025

George V. Hulme
nexus_rogers-reflection.jpg
Cyber Resilience
Operational Resilience
Risk Management
Vulnerability Management

Nexus Reflections and Predictions: Adm. Michael Rogers

ADM. Michael S. Rogers, USN (Ret.)
Latest on Nexus Podcast