Articles

Recent articles

nexus_secure-by-design-labonty-1731623724.jpg
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management

Nexus Reflections and Predictions: Jim LaBonty

Jim LaBonty
Compensating controls are often the only cybersecurity options available to offset risk in operational technology environments still supporting legacy technology or end-of-life industrial control systems or field devices.
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

Nexus Reflections and Predictions: Don C. Weber

Don C. Weber
nexus_hulme-ai-in-ot.jpg
Cyber Resilience
Operational Resilience
Operational Technology
Risk Management

CISA Warns: AI Integration Exposes OT to ‘Unsolved’ Semantic Threats

George V. Hulme
Industrial cybersecurity expert Danielle Jablanski reflects on market shifts around operational technology (OT) and industrial control systems (ICS) cybersecurity and predicts a newfound emphasis and approach to security metrics in 2026.
Operational Technology
Operational Resilience
Cyber Resilience
Risk Management

Nexus Reflections and Predictions: Danielle Jablanski

Danielle Jablanski
umbelino_prediction.jpg
Operational Technology
Cyber Resilience
Vulnerability Management

Nexus Reflections and Predictions: Pedro Umbelino

Pedro Umbelino
Amazon's intent to replace humans with robots represents a wave of cyber-physical systems (CPS) security that will need to be implemented not only in the logistics and warehousing industries but also for work-in-process (WIP) inventory in manufacturing and other critical industries.
Cyber Resilience
Industrial
Internet of Things
Operational Resilience
Operational Technology
Vulnerability Management
Risk Management

Automation Inroads Bring Urgency to CPS Protection

Jim LaBonty
The U.S. Environmental Protection Agency recently released a set of new planning and response tools designed to strengthen the cybersecurity defenses of the nation's at-risk water treatment systems. The move marks the latest in a series of federal actions aimed at bolstering the protection of drinking water and wastewater infrastructure in the U.S. from nation-state-driven cyberattacks.
Operational Technology
Operational Resilience
Cyber Resilience
Industrial
Risk Management

EPA Launches Comprehensive Cybersecurity Resources as Water Sector Faces Escalating Threats

George V. Hulme
nexus_enisa-report.jpg
Operational Technology
Industrial
Vulnerability Management
Risk Management

ENISA Warns of Escalating OT Threats

George V. Hulme
Building management systems (BMS) are centralized platforms that oversee a building’s mechanical, electrical, and environmental systems. Yet they are often overlooked with regard to an organization’s cybersecurity planning. Expert Dan Ricci explains why and provides six strategies for securing BMS.
Operational Resilience
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

The Overlooked Cyber Risk: Building Management Systems in Critical Infrastructure

Dan Ricci
Converged IT/OT operations often run into decision-making gridlock when it comes to exposure management and vulnerability management of OT. Without clearly established governance, organizations are experiencing prolonged periods of time exposed to attacks.
Cyber Resilience
Industrial
Operational Technology
Operational Resilience
Risk Management

Bridging the Divide: Overcoming Security Deadlocks in IT/OT Convergence

George V. Hulme
Vulnerability scoring models such as CVSS 3.1 and CVSS 4.0 must evolve to include contextual information that helps network and systems analysts and security teams better prioritize remediation, mitigation, and patching processes.
Vulnerability Management
Risk Management
Operational Technology
Cyber Resilience

CVSS Scores No Longer Enough: The Move to Context-Driven Vulnerability Management

George V. Hulme
Experts weigh in on the recent Cybersecurity and Infrastructure Security Agency (CISA) guidance aimed at addressing the risks associated with the convergence of OT/IT in modern industrial organizations. CISA recommends enhanced asset inventories and taxonomies as foundational cybersecurity pieces of an OT security program.
Operational Technology
Vulnerability Management
Risk Management

Asset Management Key to Mitigating OT/IT Convergence Cybersecurity Risks

George V. Hulme
Latest on Nexus Podcast