Articles

Recent articles

nexus_eu-flag-hulme-update.jpg
Risk Management

NIS2 Directive Must Be More Than a Compliance Exercise

George V. Hulme
nexus_sbom-practical.jpg
Vulnerability Management
Risk Management

Putting SBOMs to Practical Use

George V. Hulme
Healthcare delivery organizations using open-source software experience a balance of development advantages and security tradeoffs. Visibility, oversight, and tracking the use of OSS is critical to reducing risks it introduces. SBOMs, meanwhile, can be an advantage, in particular with regard to vulnerability management.
Cyber Resilience
Healthcare
Vulnerability Management
Risk Management

Understanding the Risks of Open Source Software in Healthcare

George V. Hulme
CISOs remain at risk for potential securities fraud charges as public ‘security statements’ can still be used against them despite a New York judge's ruling that all but ended the SEC's case against SolarWinds and its CISO Tim Brown.
Risk Management

Judge Dismisses Most of SEC Case vs. SolarWinds; CISOs Must Remain Wary

George V. Hulme
On Nexus, former NSA Director Adm. Michael Rogers writes about the current legislative and personal liability changes that are impacting the CISO office. But Rogers urges security leaders to view these times as an opportunity to refine their business acumen and ensure cybersecurity is a priority across the enterprise.
Risk Management
Operational Resilience
Cyber Resilience

CISO Unrest is an Opportunity

ADM. Michael S. Rogers, USN (Ret.)
nexus_converge-june-4.jpg
Operational Technology
Risk Management

How to Unify Colliding IT/OT Worlds

George V. Hulme
nexus_wh-resets-direction.jpg
Cyber Resilience
Risk Management

White House Resets Direction for Critical Infrastructure Protection

Cristin Flynn Goodwin
Cybersecurity experts are cautious about the new National Security Memorandum (NSM), which replaces the decade-old Presidential Policy Directive. Proponents say, will help strengthen the security of critical infrastructure within the United States, but because it's short on prescriptive details, security experts are unsure of the path forward.
Cyber Resilience
Risk Management

White House Signs Critical Infrastructure Memorandum, Details Remain Unclear

George V. Hulme
OT and ICS asset owners must consider non-traditional OT exposures beyond software vulnerabilities—a comprehensive exposure management approach to risk reduction—to understand the multifaceted challenges and the proactive measures necessary to safeguard critical infrastructure.
Cyber Resilience
Operational Technology
Risk Management

Operational Technology Exposure: Beyond Software Vulnerabilities

Dan Ricci
The UK's National Cyber Security Centre (NCSC) reacts to growing cloud implementations for operational technology, SCADA, and industrial control systems. The shift to cloud computing has caused the NCSC to be concerned that organizations aren't properly managing the new connectivity, including security boundaries and access control mechanisms.
Risk Management
Cyber Resilience
Operational Technology

UK NCSC Urges OT/ICS Operators to Secure Cloud Migrations

George V. Hulme
nexus_fda-mdms.jpg
Healthcare
Vulnerability Management
Risk Management

FDA Sets Sights on Medical Device Vulnerability Management

George V. Hulme
nexus_frushour-frogger.jpg
Cyber Resilience
Operational Resilience
Risk Management

Think Like an Attacker: Be Frogger

John Frushour

Latest on Nexus Podcast