<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:atom="http://www.w3.org/2005/Atom" version="2.0">
    <channel>
        <title>Nexus</title>
        <description>A community of security leaders specializing in cyber-physical systems. Engage with innovative experts, stay ahead of threats, and collaborate with peers on risk mitigation and remediation strategies.</description>
        <link>https://nexusconnect.io</link>
        <atom:link href="https://nexusconnect.io/feed" rel="self" type="application/rss+xml"/>
        <lastBuildDate>Wed, 15 Apr 2026 19:32:23 +0000</lastBuildDate>
        <language>en</language>
        <generator>Feedamic: the Atom and RSS Feed generator for Statamic</generator>
        <item>
            <title><![CDATA[Nexus Podcast: Joe Slowik on Securing Exposed Internet-Facing Assets]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-joe-slowik-on-securing-exposed-internet-facing-assets</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-joe-slowik-on-securing-exposed-internet-facing-assets</guid>
            <pubDate>Tue, 14 Apr 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Dataminr Director of Cybersecurity Alerting Strategy, joins to discuss how hacktivism has shifted from nuisance activities online to targeting of exposed internet-facing assets and critical infrastructure. Many of these groups are aligned geopolitically with adversaries, and are acting in support of them, or on behalf of them.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Health-ISAC's Phil Englert on Medical Device Cybersecurity]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-health-isacs-phil-englert-on-medical-device-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-health-isacs-phil-englert-on-medical-device-cybersecurity</guid>
            <pubDate>Wed, 08 Apr 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Health-ISAC VP of Medical Device Cybersecurity Phil Englert discusses the cybersecurity risks introduced by legacy technology in healthcare and how it impacts patient care and safety. He also brought context and insight into the U.S. Food and Drug Administration's (FDA) updated guidance on cybersecurity requirements for medical devices aimed at manufacturers and premarket product submissions.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[At ASL Roma 1, Canonical Risk Informs Governance, Remediation Actions]]></title>
            <link>https://nexusconnect.io/articles/at-asl-roma-1-canonical-risk-informs-governance-remediation-actions</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/at-asl-roma-1-canonical-risk-informs-governance-remediation-actions</guid>
            <pubDate>Tue, 07 Apr 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[ASL Roma 1 CISO Stefano Scaramuzzino and Deloitte’s Fabio Battelli explain the next evolution of cybersecurity and risk governance at Italy’s largest public health authority: canonical risk. The hospital's HOPE framework is the decision layer for this concept, a governed, explainable, and auditable synthesis of technical signals, operational context, and explicit priority logic that inform remediation and mitigation actions.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Raphael Arakelian on Operation Grim Beeper]]></title>
            <link>https://nexusconnect.io/podcasts/raphael-arakelian-on-operation-grim-beeper</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/raphael-arakelian-on-operation-grim-beeper</guid>
            <pubDate>Tue, 31 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Raphael Arakelian, the OT/IoT Cybersecurity Manager for Accenture, joins to discuss the inner workings of Operation Grim Beepeer, a 2024 Israeli operation that used booby-trapped pagers and walkie talkies to injure or kill Hezbollah members. Raphael studied the technical, cybersecurity, and supply-chain risks involved in this operation, and shares how those lessons can be applied to operational technology.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Adm. Michael Rogers on the Job of NSA Director]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-adm-michael-rogers-on-the-job-of-nsa-director</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-adm-michael-rogers-on-the-job-of-nsa-director</guid>
            <pubDate>Thu, 26 Mar 2026 07:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Adm. Michael S. Rogers (Ret. USN) talked extensively about his time as National Security Agency (NSA) director and also simultaneously as the second commander of U.S. Cyber Command. Rogers describes what prepared him to succeed in the role, and the relationship- and team-building required to navigate the demands of both offices, especially how those change from administration to administration.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Digest: Megan Stifel on National Cyber Strategy’s Pivot to Offensive Security]]></title>
            <link>https://nexusconnect.io/videos/nexus-digest-megan-stifel-on-national-cyber-strategys-pivot-to-offensive-security</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/nexus-digest-megan-stifel-on-national-cyber-strategys-pivot-to-offensive-security</guid>
            <pubDate>Wed, 25 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Megan Stifel, Chief Strategy Officer for the Institute for Security and Technology, joins the first episode of the Nexus Digest to discuss an article she wrote about the Trump Administration’s current cybersecurity strategy. Megan is concerned the strategy is too far a pivot toward shaping adversaries' behavior in cyberspace via a more aggressive approach to deterrence at the expense of defending critical networks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Michael Pyle on Securing Internet-Facing OT, ICS Assets]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-michael-pyle-on-securing-internet-facing-ot-ics-assets</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-michael-pyle-on-securing-internet-facing-ot-ics-assets</guid>
            <pubDate>Tue, 24 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Michael Pyle, Director of Product Cybersecurity at Schneider Electric (SE), joins the Nexus Podcast to discuss Internet Exposure Prevention, a new SE approach to preventing illicit connections to internet facing OT and industrial control systems (ICS) that are insecurely connected to the internet.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Administration Takes Aggressive Cyber Posture with New Strategy, Cybercrime Executive Order]]></title>
            <link>https://nexusconnect.io/articles/administration-takes-aggressive-cyber-posture-with-new-strategy-cybercrime-executive-order</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/administration-takes-aggressive-cyber-posture-with-new-strategy-cybercrime-executive-order</guid>
            <pubDate>Mon, 23 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[The release of President Trump’s Cyber Strategy for America and a new Executive Order on Combating Cybercrime, Fraud, and Predatory Schemes Against American Citizens mark a shift in tone and intent, even as many details remain to be defined through implementation. Taken together, the documents frame cyberspace less as a regulatory challenge and more as an active domain of competition, deterrence, and consequence. Both emphasize speed, attribution, and retaliation, directed not only at nation states, but also at cybercriminal groups operating with state tolerance or support.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Gus Serino on the Efforts of a Massachusetts Water Cybersecurity Collaborative]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-gus-serino-on-the-efforts-of-a-massachusetts-water-cybersecurity-collaborative</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-gus-serino-on-the-efforts-of-a-massachusetts-water-cybersecurity-collaborative</guid>
            <pubDate>Wed, 18 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Gus Serino, president and I&C Secure explains how he helped organize a collaborative of six water and wastewater utilities in Massachusetts to share resources and cybersecurity information to help reduce risk across the facilities.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Protecting Physical, Digital Security of Data Centers During Conflict]]></title>
            <link>https://nexusconnect.io/articles/protecting-physical-digital-security-of-data-centers-during-conflict</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/protecting-physical-digital-security-of-data-centers-during-conflict</guid>
            <pubDate>Tue, 17 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Data centers have been targeted for kinetic attacks during the ongoing Iran war, and given their strategic prioritization during the conflict, they could be targeted for cyberattacks as well. Nexus contributor James LaBonty explains the risk and potential vulnerabilities, including building management systems and other cyber-physical systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Rui Mella on Data Center Risk Mitigation through Visibility]]></title>
            <link>https://nexusconnect.io/videos/rui-mella-on-data-center-risk-mitigation-through-visibility</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/rui-mella-on-data-center-risk-mitigation-through-visibility</guid>
            <pubDate>Thu, 12 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Rui Mella Jr., Cybersecurity Manager at Ascenty, explains how Latin American data center operators have achieved continuous, granular visibility into their critical assets and potential vulnerabilities, resulting in effective risk mitigation. This improved oversight is essential for maintaining complete control and security of their infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Dan Ricci on Four Years of the ICS Advisory Project]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-dan-ricci-on-four-years-of-the-ics-advisory-project</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-dan-ricci-on-four-years-of-the-ics-advisory-project</guid>
            <pubDate>Wed, 11 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, ICS Advisory Project founder Dan Ricci explains how in four years the project has become one of the most trusted resources for OT and ICS vulnerability information. More than 30 dashboards are available on the site that parse vulnerability data in unique ways. Ricci describes his favorite dashboards and some of the unique ways he's heard of how organizations are using the dashboards in SOCs and elsewhere.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Bruno Carvalho on How Visibility Enables Healthcare Cybersecurity]]></title>
            <link>https://nexusconnect.io/videos/bruno-carvalho-on-how-visibility-enables-healthcare-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/bruno-carvalho-on-how-visibility-enables-healthcare-cybersecurity</guid>
            <pubDate>Thu, 05 Mar 2026 08:47:00 +0000</pubDate>
            <description><![CDATA[At Nexus 2025, we sat down with Bruno Carvalho, IT manager for the Hospital Felicio Rocho in Belo Horizonte, Brazil, who describes the need to achieve greater granular visibility, ensuring the integrity of all aspects encompassing hospitals and the healthcare sector as a whole.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Dan Gunter on Generating OT Data to Train Security Products]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-dan-gunter-on-generating-ot-data-to-train-security-products</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-dan-gunter-on-generating-ot-data-to-train-security-products</guid>
            <pubDate>Wed, 04 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Claroty Nexus Podcast, Dan Gunter, CEO and founder of Insane Cyber, lays out the challenges—and sometimes steep costs—of generating data that’s truly representative of the production environment rather than exclusively relying on a lab environment or emulation.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CISA Alert on EOL Edge Devices Should Also Spark Enhanced CPS Defenses]]></title>
            <link>https://nexusconnect.io/articles/cisa-alert-on-eol-edge-devices-should-also-spark-enhanced-cps-defenses</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cisa-alert-on-eol-edge-devices-should-also-spark-enhanced-cps-defenses</guid>
            <pubDate>Tue, 03 Mar 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Former NSA Director Adm. Michael S. Rogers writes about a recent CISA alert urging critical infrastructure operators to take defensive action in order to protect internet-facing edge devices. Attackers target these devices in order to gain an initial network foothold. Cyber-physical systems (CPS) operators would do well to heed the agency's advice to lock down these assets, especially if they're internet-facing.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Imminent National Cyber Strategy May Lean on Offense at the Expense of Defense]]></title>
            <link>https://nexusconnect.io/articles/imminent-national-cyber-strategy-may-lean-on-offense-at-the-expense-of-defense</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/imminent-national-cyber-strategy-may-lean-on-offense-at-the-expense-of-defense</guid>
            <pubDate>Thu, 26 Feb 2026 09:08:00 +0000</pubDate>
            <description><![CDATA[Reports suggest that the Trump administration's imminent National Cyber Strategy would prioritize cyber offense in order to shape adversary behavior and relegate cyber defense to the back burner. If implemented, expert Megan Stifel writes, this is a shift that threatens to compromise our national security.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Mike Holcomb on the Intersection of Hacktivists and State Actors]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mike-holcomb-on-the-intersection-of-hacktivists-and-state-actors</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mike-holcomb-on-the-intersection-of-hacktivists-and-state-actors</guid>
            <pubDate>Wed, 25 Feb 2026 17:12:00 +0000</pubDate>
            <description><![CDATA[OT cybersecurity expert Mike Holcomb joins the Nexus Podcast live from S4 Conference in Miami to discuss how state actors may be leveraging hacktivists to target operational technology (OT). Holcomb has delineated these groups in what he calls a Converged Actor Framework that categorizes threat actors by the impact and frequency of their incidents. A converged actor is potentially the riskiest given the potential for high frequency high impact incidents.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Debora Borel on IT/OT Convergence in Hospitals]]></title>
            <link>https://nexusconnect.io/videos/debora-borel-on-itot-convergence-in-hospitals</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/debora-borel-on-itot-convergence-in-hospitals</guid>
            <pubDate>Thu, 19 Feb 2026 09:59:00 +0000</pubDate>
            <description><![CDATA[In this interview from Nexus Conference 2025, Debora Borel, Cyber Security Coordinator, Einstein Hospital Israelita in Sao Paolo, Brazil, explains how the intersection of IT and OT within hospitals presents a constant challenge for the infrastructure and for those responsible for crucial areas. There is a constant need for operational resilience, network segmentation, secure remote access, and identity protection, among other security practices.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: CISA’s Matthew Rogers on Secure OT Protocol Communication]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-cisas-matthew-rogers-on-secure-ot-protocol-communication</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-cisas-matthew-rogers-on-secure-ot-protocol-communication</guid>
            <pubDate>Wed, 18 Feb 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, CISA ICS Cybersecurity Lead Matthew Rogers discusses new guidance from the agency on the use of security operational technology (OT) protocols, titled “Barriers to Secure OT Communication: Why Johnny Can’t Authenticate.” The paper advocates for the use of secure versions of legacy OT protocols, or the adoption of open standards by OEMs, in order to bring authentication and integrity to OT protocol communication.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[From OT Asset Management to Insight: Turning Visibility Into Something That Matters]]></title>
            <link>https://nexusconnect.io/articles/from-ot-asset-management-to-insight-turning-visibility-into-something-that-matters</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/from-ot-asset-management-to-insight-turning-visibility-into-something-that-matters</guid>
            <pubDate>Tue, 17 Feb 2026 09:12:00 +0000</pubDate>
            <description><![CDATA[OT cybersecurity expert Dan Ricci writes on what OT asset management and visibility can reveal about an industrial environments, including the surfacing of risk signals, exposure of hidden dependencies, and insight about the efficacy of virtual network segmentation policies and practices.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Moving from Visibility to Governance of CPS]]></title>
            <link>https://nexusconnect.io/articles/moving-from-visibility-to-governance-of-cps</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/moving-from-visibility-to-governance-of-cps</guid>
            <pubDate>Tue, 03 Feb 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Cyber-physical systems cybersecurity is a maturing practice, which means protection of these critical systems must become more programmatic. Stefano Scaramuzzino CISO of ASL Roma-1 and Fabio Battelli of Deloittte explain the first steps on this journey using ASL Roma-1's HOPE program as the model.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Adam Jurgensen on Medical Device Cybersecurity]]></title>
            <link>https://nexusconnect.io/videos/adam-jurgensen-on-medical-device-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/adam-jurgensen-on-medical-device-cybersecurity</guid>
            <pubDate>Thu, 29 Jan 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Adam Jurgensen, Medical Device Security Engineer at Valley Health Systems, brings us inside the roles and responsibilities of those experts overseeing connected devices inside healthcare organizations. Jurgensen describes the restrictions his role faces when it comes to updating and patching connected medical devices, the gamut of which may run from MRIs, CT, ultrasounds, to patient monitors, and defibrillators. Compensating controls, segmentation, and other cybersecurity strategies are key for keeping devices secure and patients safe in the event of an incident.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Noam Moshe on Hacking Enterprise-Grade IP Cameras]]></title>
            <link>https://nexusconnect.io/videos/noam-moshe-on-hacking-enterprise-grade-ip-cameras</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/noam-moshe-on-hacking-enterprise-grade-ip-cameras</guid>
            <pubDate>Thu, 22 Jan 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Team82 vulnerability research lead Noam Moshe discusses his team’s expansive look into IP-based surveillance cameras manufactured by Sweden’s Axis Communications, a leading company in this space. Companies like Axis are selling more and more into Western enterprises given bans on certain Chinese technologies. Moshe’s research uncovered a number of vulnerabilities in the management framework used to oversee these devices, as well as the communication protocol in play. Attackers can exploit these issues to gain control of cameras, move onto the corporate network, and disrupt the safety of a business.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[5 Trends Driving OT Security in 2026: From State-Sponsored Attacks to AI-Powered Threats]]></title>
            <link>https://nexusconnect.io/articles/5-trends-driving-ot-security-in-2026-from-state-sponsored-attacks-to-ai-powered-threats</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/5-trends-driving-ot-security-in-2026-from-state-sponsored-attacks-to-ai-powered-threats</guid>
            <pubDate>Wed, 21 Jan 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Cybersecurity experts identify five trends that leaders responsible for cyber-physical systems protection programs and OT security must strategize around.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Leandro Ribeiro Sobre Segurança de Dispositivos Médicos e Cuidado com o Paciente]]></title>
            <link>https://nexusconnect.io/videos/leandro-ribeiro-sobre-seguranca-de-dispositivos-medicos-e-cuidado-com-o-paciente</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/leandro-ribeiro-sobre-seguranca-de-dispositivos-medicos-e-cuidado-com-o-paciente</guid>
            <pubDate>Tue, 20 Jan 2026 16:12:00 +0000</pubDate>
            <description><![CDATA[Leandro Ribeiro, Security Manager of Hospital Sírio Libanês, explains how patient care is intrinsically linked to protecting all the medical devices and equipment used in their treatment. Ensuring the security of all associated processes, and preventing vulnerabilities that could compromise patient integrity and safety are the key.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Gustavo Berber sobre la Ciber Resiliencia en la Industria de Alimentos y Bebidas]]></title>
            <link>https://nexusconnect.io/videos/gustavo-berber-sobre-la-ciber-resiliencia-en-la-industria-de-alimentos-y-bebidas</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/gustavo-berber-sobre-la-ciber-resiliencia-en-la-industria-de-alimentos-y-bebidas</guid>
            <pubDate>Tue, 20 Jan 2026 16:09:00 +0000</pubDate>
            <description><![CDATA[Gustavo Berber, OT Cybersecurity Manager for Sigma, discusses the importance of providing  flexible deployment options that consolidate multiple solutions, such as OT remote access or OT vulnerability management, into a single, comprehensive platform that allows for a low total cost of ownership.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[José Emmanuel Galeana Sobre la Ciber Resiliencia en la Industria de Materiales de Construcción]]></title>
            <link>https://nexusconnect.io/videos/jose-emmanuel-galeana-sobre-la-ciber-resiliencia-en-la-industria-de-materiales-de-construccion</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/jose-emmanuel-galeana-sobre-la-ciber-resiliencia-en-la-industria-de-materiales-de-construccion</guid>
            <pubDate>Tue, 20 Jan 2026 16:05:00 +0000</pubDate>
            <description><![CDATA[Jose Emmanuel Galeana, OT Cybersecurity Manager for Cemex, a large building materials company in Mexico, discusses the importance of a comprehensive, up-to-date, centralized inventory of all OT assets in an industrial environment, and why it’s integral to effective asset management.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Arturo Montiel Sobre la Resiliencia Cibernética en la Manufactura]]></title>
            <link>https://nexusconnect.io/videos/arturo-montiel-sobre-la-resiliencia-cibernetica-en-la-manufactura</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/arturo-montiel-sobre-la-resiliencia-cibernetica-en-la-manufactura</guid>
            <pubDate>Tue, 20 Jan 2026 16:01:00 +0000</pubDate>
            <description><![CDATA[Arturo Montiel, IoT/OT Global Solution Architect, with Xignux, talks about why increasing connectivity for previously air-gapped assets in manufacturing could benefit plant managers. Each new asset, however, also creates a potential entry point for attackers, so threats must be detected as early as possible.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[David Ruzicka on Bridging the Gap Between Engineers and Security]]></title>
            <link>https://nexusconnect.io/videos/david-ruzicka-on-bridging-the-gap-between-engineers-and-security</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/david-ruzicka-on-bridging-the-gap-between-engineers-and-security</guid>
            <pubDate>Thu, 15 Jan 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[David Ruzicka, OT Security Director at Clarios, a top manufacturing organization, explains why it’s important for enterprises integrating and converging IT and OT to involve engineers and asset operators in cybersecurity strategy. Ruzicka explains the advantages engineers can introduce into this integration, and how a collaborative approach secures the shop floor and brings value to the business.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Pentagon Mandates Zero Trust Security Framework for Operational Technology Environments]]></title>
            <link>https://nexusconnect.io/articles/pentagon-mandates-zero-trust-security-framework-for-operational-technology-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/pentagon-mandates-zero-trust-security-framework-for-operational-technology-environments</guid>
            <pubDate>Mon, 12 Jan 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[The Department of War has issued comprehensive guidance requiring all organizational units to implement zero-trust security principles across operational technology (OT) systems, marking a fundamental shift in how the military secures critical infrastructure from power grids to manufacturing control systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Competing Incentives Create IT/OT Security Gaps]]></title>
            <link>https://nexusconnect.io/articles/competing-incentives-create-itot-security-gaps</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/competing-incentives-create-itot-security-gaps</guid>
            <pubDate>Tue, 06 Jan 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[IT cybersecurity teams inheriting operational technology security and cyber-physical systems protection programs often come into these situations with competing incentives. This dynamic creates gaps in protecting OT and CPS that must be assessed and addressed.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Steven Sim]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-steven-sim</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-steven-sim</guid>
            <pubDate>Mon, 05 Jan 2026 10:00:00 +0000</pubDate>
            <description><![CDATA[Steven Sim, chair of the OT ISAC advisory committee, reflects on how generative AI automates cyberattacks, and predicts difficult financial choices for CISO in the coming year.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Stefano Scaramuzzino]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-stefano-scaramuzzino</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-stefano-scaramuzzino</guid>
            <pubDate>Wed, 31 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[ASL Roma 1 CISO Stefano Scaramuzzino reflects the rapid acceleration of connectivity in healthcare, and predicts stringent cybersecurity regulations are coming for the industry.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Jim LaBonty]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-jim-labonty</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-jim-labonty</guid>
            <pubDate>Tue, 30 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Jim LaBonty, former global head of automation engineering at Pfizer, reflects on cyberattacks against manufacturing enterprises, and predicts better outcomes against ransomware in the sector.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Don C. Weber]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-don-c-weber</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-don-c-weber</guid>
            <pubDate>Mon, 29 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Don C. Weber, principal consultant and founder of Cutaway Security LLC, reflects on the speed of AI-enabled cyberattacks, and predicts 2026 will bring the emergence of the ICS script kiddie.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CISA Warns: AI Integration Exposes OT to ‘Unsolved’ Semantic Threats]]></title>
            <link>https://nexusconnect.io/articles/cisa-warns-ai-integration-exposes-ot-to-unsolved-semantic-threats</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cisa-warns-ai-integration-exposes-ot-to-unsolved-semantic-threats</guid>
            <pubDate>Mon, 29 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Artificial intelligence deployments within operational technology environments are taking hold. Asset owners and operators must understand that AI introduces new classes of risk to OT because it accelerates both the speed and scale of attacks against systems that were never designed to adapt dynamically.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Danielle Jablanski]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-danielle-jablanski</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-danielle-jablanski</guid>
            <pubDate>Tue, 23 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Industrial cybersecurity expert Danielle Jablanski reflects on market shifts around operational technology (OT) and industrial control systems (ICS) cybersecurity and predicts a newfound emphasis and approach to security metrics in 2026.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Pedro Umbelino]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-pedro-umbelino</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-pedro-umbelino</guid>
            <pubDate>Mon, 22 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Pedro Umbelino, Principal Research Scientist at Bitsight Technologies reflects on the fragility of industrial ecosystems, and anticipates what will happen as Industry 4.0 and 5.0 collide.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Jay Catherine on Securing Logistics, OT in Retail]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-jay-catherine-on-securing-logistics-ot-in-retail</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-jay-catherine-on-securing-logistics-ot-in-retail</guid>
            <pubDate>Mon, 22 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Jay Catherine, a security architect for a major retailer, joins the Nexus Podcast to discuss best practices for logistics cybersecurity within the retail space. This includes securing not only distribution, but also the operational technology involved in these manufacturing processes.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CISO Survival Guide: 4 Steps to Prepare for CISA 2015 Expiration]]></title>
            <link>https://nexusconnect.io/articles/ciso-survival-guide-4-steps-to-prepare-for-cisa-2015-expiration</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/ciso-survival-guide-4-steps-to-prepare-for-cisa-2015-expiration</guid>
            <pubDate>Mon, 15 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Congress' failure to reauthorize the Cybersecurity Information Sharing Act of 2015 (CISA 2015) signals a fundamental shift in threat intelligence sharing and overall risk management strategies.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Jason Elrod on Bringing AI to Identity Management]]></title>
            <link>https://nexusconnect.io/videos/jason-elrod-on-bringing-ai-to-identity-management</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/jason-elrod-on-bringing-ai-to-identity-management</guid>
            <pubDate>Wed, 10 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Jason Elrod, VP and CISO at Multicare Health System, discusses how artificial intelligence and machine learning can help security leaders have high confidence assertions around identity and privileges, and making authentication as frictionless as possible. The journey at his not-for-profit healthcare organization includes offloading certain manual processes to AI-led automation such as provisioning reviews and managing a trouble ticket queue.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Adversaries' Adaptability is Bad News for Cyber-Physical Systems]]></title>
            <link>https://nexusconnect.io/articles/adversaries-adaptability-is-bad-news-for-cyber-physical-systems</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/adversaries-adaptability-is-bad-news-for-cyber-physical-systems</guid>
            <pubDate>Mon, 08 Dec 2025 15:00:00 +0000</pubDate>
            <description><![CDATA[China-nexus threat actors are targeting edge devices that do not support EDR. Adm. Michael Rogers writes that cyber-physical systems could be next since many of the connected OT, IoT, and IoMT devices and sensors also lack EDR protection.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Jon Holzbauer on Converging IT and OT Security Teams]]></title>
            <link>https://nexusconnect.io/videos/jon-holzbauer-on-converging-it-and-ot-security-teams</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/jon-holzbauer-on-converging-it-and-ot-security-teams</guid>
            <pubDate>Wed, 03 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Jon Holzbauer, OT Systems Manager at Silgan Containers, explains his experience facilitating the journey to OT security for IT security professionals. Coming from an IT perspective with an OT background, he has navigated the differing incentives, terminology and communication challenges, and overall connectivity and convergence of different technologies that are core to the business. Bridging the gap relies on finding overlaps between IT and OT, encouraging learning from each others’ day-to-day responsibilities, and encouraging effective communication.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Scaling Disruption: What the Next Cyber Strategy Must Get Right]]></title>
            <link>https://nexusconnect.io/articles/scaling-disruption-what-the-next-cyber-strategy-must-get-right</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/scaling-disruption-what-the-next-cyber-strategy-must-get-right</guid>
            <pubDate>Tue, 02 Dec 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The forthcoming National Cyber Strategy must aims to scale cyber disruptions of malicious threat actor activity, reduce friction points, and incentivize public-private collaboration that are essential to securing critical infrastructure and protecting American innovation.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Greg Garcia on the Sector Mapping and Risk Toolkit for Healthcare]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-greg-garcia-on-the-sector-mapping-and-risk-toolkit-for-healthcare</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-greg-garcia-on-the-sector-mapping-and-risk-toolkit-for-healthcare</guid>
            <pubDate>Tue, 25 Nov 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Greg Garcia, Executive Director of The Health Sector Coordinating Council Cybersecurity Working Group, discusses the Sector Mapping and Risk Toolkit (SMART). SMART contains a set of 17 templates that enable healthcare organizations to map and visualize workflows, identify areas of risk, and where mitigations are most desperately needed.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Automation Inroads Bring Urgency to CPS Protection]]></title>
            <link>https://nexusconnect.io/articles/automation-inroads-bring-urgency-to-cps-protection</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/automation-inroads-bring-urgency-to-cps-protection</guid>
            <pubDate>Mon, 24 Nov 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Amazon's intent to replace humans with robots represents a wave of cyber-physical systems (CPS) security that will need to be implemented not only in the logistics and warehousing industries but also for work-in-process (WIP) inventory in manufacturing and other critical industries.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Chris Inglis on the Effectiveness of US Cyber Deterrence Policy]]></title>
            <link>https://nexusconnect.io/videos/chris-inglis-on-the-effectiveness-of-us-cyber-deterrence-policy</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/chris-inglis-on-the-effectiveness-of-us-cyber-deterrence-policy</guid>
            <pubDate>Thu, 20 Nov 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Former U.S. National Cyber Director Chris Inglis explains how state-sponsored threat actor groups are ramping up aggression against U.S. critical infrastructure. He also examines the effectiveness of U.S. deterrence policies, and whether we’ve done enough to impose consequences on adversaries.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Christopher Frenz on Evidence-Based Security]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-christopher-frenz-on-evidence-based-security</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-christopher-frenz-on-evidence-based-security</guid>
            <pubDate>Tue, 18 Nov 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[On the Nexus Podcast, Christopher Frenz discussed how his background in science is foundational to the cybersecurity program he’s instituted as chief information security officer for a hospital system. Frenz, an O'Reilly coauthor of "Evidence-Based Security," takes an evidence-based approach to protecting life-saving medical systems and devices by systematically testing and measuring the efficacy of controls.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[EPA Launches Comprehensive Cybersecurity Resources as Water Sector Faces Escalating Threats]]></title>
            <link>https://nexusconnect.io/articles/epa-launches-comprehensive-cybersecurity-resources-as-water-sector-faces-escalating-threats</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/epa-launches-comprehensive-cybersecurity-resources-as-water-sector-faces-escalating-threats</guid>
            <pubDate>Mon, 17 Nov 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The U.S. Environmental Protection Agency recently released a set of new planning and response tools designed to strengthen the cybersecurity defenses of the nation's at-risk water treatment systems. The move marks the latest in a series of federal actions aimed at bolstering the protection of drinking water and wastewater infrastructure in the U.S. from nation-state-driven cyberattacks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Samantha Jacques on Cyber Risk Mitigation in Healthcare]]></title>
            <link>https://nexusconnect.io/videos/samantha-jacques-on-cyber-risk-mitigation-in-healthcare</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/samantha-jacques-on-cyber-risk-mitigation-in-healthcare</guid>
            <pubDate>Thu, 13 Nov 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Samantha Jacques, VP Clinical Engineering, at McLaren Health Care, explains the technology complexity hospitals and clinical environment cybersecurity teams encounter and how it impacts risk management and mitigation. While there are standardized IT systems, the medical devices and operational technology prevalent in hospitals are far from it. Myriad manufacturers and configurations significantly complicate risk mitigation efforts. Jacques explains how to best navigate those waters in order to reduce overall cyber risk.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Providence Cybersecurity AI Up-Skilling Program: Building Smarter Defenses for a Digital Future]]></title>
            <link>https://nexusconnect.io/articles/providence-cybersecurity-ai-up-skilling-program-building-smarter-defenses-for-a-digital-future</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/providence-cybersecurity-ai-up-skilling-program-building-smarter-defenses-for-a-digital-future</guid>
            <pubDate>Wed, 12 Nov 2025 09:23:00 +0000</pubDate>
            <description><![CDATA[Providence CISO Mike Ratliff shares the results and initial impact of an AI up-skilling program implemented at the Washington-based hospital system for its cybersecurity team. The benefits are already being seen in terms of operational efficiency and cross-functional collaboration.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CPS Security Leaders Establish Priorities for Resilience at Nexus 2025]]></title>
            <link>https://nexusconnect.io/articles/cps-security-leaders-establish-priorities-for-resilience-at-nexus-2025</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cps-security-leaders-establish-priorities-for-resilience-at-nexus-2025</guid>
            <pubDate>Mon, 10 Nov 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[More than 250 influential cybersecurity leaders from industrial companies, healthcare delivery organizations, and the highest levels of government convened for Claroty’s fourth annual thought leadership conference to share best practices on cyber-physical systems cybersecurity, protection, and resilience strategies.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Charles Carmakal on China's Cyber Threat to Critical Infrastructure]]></title>
            <link>https://nexusconnect.io/videos/charles-carmakal-on-chinas-cyber-threat-to-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/charles-carmakal-on-chinas-cyber-threat-to-critical-infrastructure</guid>
            <pubDate>Tue, 04 Nov 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Charles Carmakal, Chief Technology Officer at Mandiant (Part of Google Cloud), explains how China-nexus threat actors such as Volt Typhoon, Salt Typhoon, and Silk Typhoon are carrying out a high level of intrusions against U.S.-based critical infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Threat Intelligence Goes Dark, CISA Crisis Leaves Enterprise Security Blind]]></title>
            <link>https://nexusconnect.io/articles/threat-intelligence-goes-dark-cisa-crisis-leaves-enterprise-security-blind</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/threat-intelligence-goes-dark-cisa-crisis-leaves-enterprise-security-blind</guid>
            <pubDate>Mon, 03 Nov 2025 16:05:00 +0000</pubDate>
            <description><![CDATA[The congressional delay in hammering out a federal budget has added another layer of pain to the ongoing crisis for the Cybersecurity and Infrastructure Security Agency (CISA). Not only are there funding concerns., but it's the expiration of critical information-sharing legislation and a regulatory compliance vacuum that has left enterprises unsure about their next steps.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[HOPE: Intelligent Governance Transforming Healthcare Cybersecurity at ASL Roma 1]]></title>
            <link>https://nexusconnect.io/articles/hope-intelligent-governance-transforming-healthcare-cybersecurity-at-asl-roma-1</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/hope-intelligent-governance-transforming-healthcare-cybersecurity-at-asl-roma-1</guid>
            <pubDate>Tue, 28 Oct 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[ASL Roma 1 CISO Stefano Scaramuzzino and Deloitte analyst Fabio Battelli write about how Italy's largest public healthcare system's HOPE initiative adds automated intelligence to its cybersecurity governance program. HOPE reimagines cybersecurity not as a defensive function, but as a living cognitive system that learns, correlates, and reasons across every layer of the healthcare ecosystem. It marks the birth of a new discipline for digital public health: operational intelligence for healthcare governance.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[ENISA Warns of Escalating OT Threats]]></title>
            <link>https://nexusconnect.io/articles/enisa-warns-of-escalating-ot-threats</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/enisa-warns-of-escalating-ot-threats</guid>
            <pubDate>Wed, 22 Oct 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[ENISA's newly released Threat Landscape 2025 report, analyzing nearly 4,900 cybersecurity incidents between July 2024 and June 2025, identifies critical infrastructure and industrial control systems (ICS) as prime targets for both state-aligned threat groups and hacktivist organizations.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[The Overlooked Cyber Risk: Building Management Systems in Critical Infrastructure]]></title>
            <link>https://nexusconnect.io/articles/the-overlooked-cyber-risk-building-management-systems-in-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-overlooked-cyber-risk-building-management-systems-in-critical-infrastructure</guid>
            <pubDate>Wed, 15 Oct 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Building management systems (BMS) are centralized platforms that oversee a building’s mechanical, electrical, and environmental systems. Yet they are often overlooked with regard to an organization’s cybersecurity planning. Expert Dan Ricci explains why and provides six strategies for securing BMS.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Bridging the Divide: Overcoming Security Deadlocks in IT/OT Convergence]]></title>
            <link>https://nexusconnect.io/articles/bridging-the-divide-overcoming-security-deadlocks-in-itot-convergence</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/bridging-the-divide-overcoming-security-deadlocks-in-itot-convergence</guid>
            <pubDate>Tue, 07 Oct 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Converged IT/OT operations often run into decision-making gridlock when it comes to exposure management and vulnerability management of OT. Without clearly established governance, organizations are experiencing prolonged periods of time exposed to attacks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Adm. Michael Rogers on Deterrence in Cyberspace]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-adm-michael-rogers-on-deterrence-in-cyberspace</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-adm-michael-rogers-on-deterrence-in-cyberspace</guid>
            <pubDate>Thu, 02 Oct 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, former NSA Director Adm. Michael Rogers discusses deterrence in cyberspace and examines adversarial tactics and strategies. Adm. Rogers explains that deterrence relies on having the will to employ tactics that will reshape the choices adversaries are making in the targeting of U.S. critical infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CVSS Scores No Longer Enough: The Move to Context-Driven Vulnerability Management]]></title>
            <link>https://nexusconnect.io/articles/cvss-scores-no-longer-enough-the-move-to-context-driven-vulnerability-management</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cvss-scores-no-longer-enough-the-move-to-context-driven-vulnerability-management</guid>
            <pubDate>Thu, 25 Sep 2025 11:58:00 +0000</pubDate>
            <description><![CDATA[Vulnerability scoring models such as CVSS 3.1 and CVSS 4.0 must evolve to include contextual information that helps network and systems analysts and security teams better prioritize remediation, mitigation, and patching processes.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Bob Maley on Critical Infrastructure Resource Challenges]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-bob-maley-on-critical-infrastructure-resource-challenges</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-bob-maley-on-critical-infrastructure-resource-challenges</guid>
            <pubDate>Wed, 17 Sep 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[On the Nexus Podcast, former Commonwealth of Pennsylvania CISO and current Black Kite CSO Bob Maley discussed the resource challenges facing not only critical infrastructure asset owners and operators, but also how those challenges are impacting risk-management efforts in critical industries.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Reauthorization of CISA ’15: 10 Years Later, New Threats, Exigent Urgency]]></title>
            <link>https://nexusconnect.io/articles/reauthorization-of-cisa-15-10-years-later-new-threats-exigent-urgency</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/reauthorization-of-cisa-15-10-years-later-new-threats-exigent-urgency</guid>
            <pubDate>Mon, 15 Sep 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Nexus contributor Megan Stifel, Chief Strategy Officer of the Institute for Security and Technology, writes about the upcoming expiration of the Cybersecurity Information Sharing Act of 2015 (CISA '15). She urges Congress to reauthorize CISA '15 because failing to do so will put national security and personal privacy at risk, and threaten innovation.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Pankaj Goyal on Cyber Insurance for OT Environments]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-pankaj-goyal-on-cyber-insurance-for-ot-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-pankaj-goyal-on-cyber-insurance-for-ot-environments</guid>
            <pubDate>Thu, 04 Sep 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Pankaj Goyal, Chief Operating Officer of Safe Security, joins the Nexus Podcast to discuss the nuances of protecting OT environments, and how cyber insurance must adapt as OT and cyber-physical systems are connected online and increasingly exposed to attackers.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Asset Management Key to Mitigating OT/IT Convergence Cybersecurity Risks]]></title>
            <link>https://nexusconnect.io/articles/asset-management-key-to-mitigating-otit-convergence-cybersecurity-risks</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/asset-management-key-to-mitigating-otit-convergence-cybersecurity-risks</guid>
            <pubDate>Tue, 02 Sep 2025 17:00:00 +0000</pubDate>
            <description><![CDATA[Experts weigh in on the recent Cybersecurity and Infrastructure Security Agency (CISA) guidance aimed at addressing the risks associated with the convergence of OT/IT in modern industrial organizations. CISA recommends enhanced asset inventories and taxonomies as foundational cybersecurity pieces of an OT security program.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Rui Ataide on Ransomware Negotiations and Recovery]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-rui-ataide-on-ransomware-negotiations-and-recovery</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-rui-ataide-on-ransomware-negotiations-and-recovery</guid>
            <pubDate>Thu, 28 Aug 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Rui Adaite, Managing Security Consultant at GuidePoint Security, joined the Nexus Podcast recently to discuss the nuances of ransomware negotiations, how negotiations work, and the ins and outs of interacting with ransomware gangs.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[As Medicaid Cuts Take Hold, Rural Healthcare Cybersecurity Hangs by a Thread]]></title>
            <link>https://nexusconnect.io/articles/as-medicaid-cuts-take-hold-rural-healthcare-cybersecurity-hangs-by-a-thread</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/as-medicaid-cuts-take-hold-rural-healthcare-cybersecurity-hangs-by-a-thread</guid>
            <pubDate>Tue, 26 Aug 2025 15:00:00 +0000</pubDate>
            <description><![CDATA[Rural hospital leaders are scrutinizing every budget dollar and have to find a way to balance patient care and safety with defending against digital cybersecurity threats.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Salvatore Gariuolo on ISO 15118, Safe EV Charging]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-salvatore-gariuolo-on-iso-15118-safe-ev-charging</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-salvatore-gariuolo-on-iso-15118-safe-ev-charging</guid>
            <pubDate>Mon, 18 Aug 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Trend Micro Senior Threat Researcher Salvatore Gariuolo joined the Nexus Podcast, calling into question whether the ISO 15188 standard is sufficient enough to protect EV charging—the cybersecurity of charging stations in particular.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Why Traditional Threat Intelligence Falls Short For Operational Technology]]></title>
            <link>https://nexusconnect.io/articles/why-traditional-threat-intelligence-falls-short-for-operational-technology</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/why-traditional-threat-intelligence-falls-short-for-operational-technology</guid>
            <pubDate>Wed, 13 Aug 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Threat intelligence for operational technology environments differs from traditional IT threat intelligence. OT threat intelligence requires contextual, situational awareness that identifies vulnerabilities and anomalies, and also which assets, and in what part of the process, are exposed. It must also note what the safety and operational consequences would be if exploited. This context enables security teams to prioritize risk mitigation according to real-world impact rather than theoretical severity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Panel: Nation-States Leveraging CPS to Damage Confidence in Resilience, Response]]></title>
            <link>https://nexusconnect.io/articles/panel-nation-states-leveraging-cps-to-damage-confidence-in-resilience-response</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/panel-nation-states-leveraging-cps-to-damage-confidence-in-resilience-response</guid>
            <pubDate>Mon, 11 Aug 2025 13:20:00 +0000</pubDate>
            <description><![CDATA[During a Black Hat USA panel discussion , former National Cyber Director Chris Inglis, Director of Cybersecurity Alerting Strategy at Dataminr, Joe Slowik, and Claroty Chief Executive Officer Yaniv Vardi raised the call for cyber-physical systems protection, the necessity for resilient systems, and the need for deterrence against aggressive APT adversaries targeting critical infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Noam Moshe on Hacking Video Surveillance]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-hacking-video-surveillance</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-hacking-video-surveillance</guid>
            <pubDate>Thu, 07 Aug 2025 13:00:00 +0000</pubDate>
            <description><![CDATA[Team82's Noam Moshe joins the Nexus Podcast sharing research in Axis Communications' popular video surveillance platform. The research takes on particular importance as more and more Chinese vendors are banned from Western enterprises and government facilities. Team82 discovered four vulnerabilities and an exploit chain that results in pre-authentication remote code execution on Axis Communications' Device Manager, a server used to configure and manage fleets of cameras, and the Axis Camera Station, client software used to view camera feeds.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Navigating Manufacturing Cybersecurity and the Cloud]]></title>
            <link>https://nexusconnect.io/articles/navigating-manufacturing-cybersecurity-and-the-cloud</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/navigating-manufacturing-cybersecurity-and-the-cloud</guid>
            <pubDate>Wed, 06 Aug 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Manufacturing cybersecurity leaders may find themselves at odds with digital transformation and the transmission of process data to the cloud. Progressive security leaders and key decision makers cannot simply say no to OT and the cloud but instead must find a strategy to mitigate the risks introduced by digital transformation with the integration of IT and OT in order to unlock the rich data value once connected.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Dan Berte on Solar Grid and IoT Vulnerabilities]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-dan-berte-on-solar-grid-and-iot-vulnerabilities</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-dan-berte-on-solar-grid-and-iot-vulnerabilities</guid>
            <pubDate>Thu, 31 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, BitDefender Director of IoT Security Dan Berte joins to discuss research his team conducted on the security of two solar power management platforms responsible for 20 percent of the planet’s solar power output.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[50 States of Cybersecurity Complexity]]></title>
            <link>https://nexusconnect.io/articles/50-states-of-cybersecurity-complexity</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/50-states-of-cybersecurity-complexity</guid>
            <pubDate>Wed, 30 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[With Federal policy changes pushing more cybersecurity and AI regulation to the state level, CISOs should prepare for even more fragmentation of cybersecurity laws and more jurisdictions to contend with, writes Cristin Flynn Goodwin.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Is It Time to Rethink the Purdue Model?]]></title>
            <link>https://nexusconnect.io/articles/is-it-time-to-rethink-the-purdue-model</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/is-it-time-to-rethink-the-purdue-model</guid>
            <pubDate>Mon, 28 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The convergence of IT and OT systems, primarily driven by the deployment of IIoT (industrial Internet of Things), cloud computing, and the need for remote monitoring, has fundamentally altered the OT architecture that the Purdue Model was initially designed to help manage. Purdue Model 2.0 needs to adapt to modern connectivity of cyber-physical systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Throw Likelihood to the Wind: OT Cybersecurity is Categorical, Not Mathematical]]></title>
            <link>https://nexusconnect.io/articles/throw-likelihood-to-the-wind-ot-cybersecurity-is-categorical-not-mathematical</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/throw-likelihood-to-the-wind-ot-cybersecurity-is-categorical-not-mathematical</guid>
            <pubDate>Thu, 24 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[OT cybersecurity expert Danielle Jablanski of STV makes her first contribution to Claroty Nexus. She writes about how OT cybersecurity programs should not compromise safety and reliability over the likelihood a vulnerability will be exploited.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Vivek Ponnada on the Need for Context in OT Security]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-vivek-ponnada-on-the-need-for-context-in-ot-security</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-vivek-ponnada-on-the-need-for-context-in-ot-security</guid>
            <pubDate>Wed, 23 Jul 2025 13:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Vivek Ponneda, SVP Growth & Strategy at Frenos, discusses the maturity and evolution of OT security as a practice, and advises that organizations need to leverage these data-rich environments in order to bring necessary context to threat and risk management efforts]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Leandro Ribeiro, Sobre la Segurança Cibernética no Setor de Saúde]]></title>
            <link>https://nexusconnect.io/videos/leandro-ribeiro-sobre-la-seguranca-cibernetica-no-setor-de-saude</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/leandro-ribeiro-sobre-la-seguranca-cibernetica-no-setor-de-saude</guid>
            <pubDate>Tue, 22 Jul 2025 08:36:00 +0000</pubDate>
            <description><![CDATA[Leandro Ribeiro, CISO do Hospital Sírio-Libanês, compartilha sua experiência no Nexus 24 em Boston, discutindo segurança cibernética no setor de saúde e o impacto da parceria com a Claroty. Confira a entrevista completa!]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Arthur Paixao Sobre los Principais Riscos Cibernéticos no Setor de Saúde]]></title>
            <link>https://nexusconnect.io/videos/arthur-paixao</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/arthur-paixao</guid>
            <pubDate>Tue, 22 Jul 2025 08:35:00 +0000</pubDate>
            <description><![CDATA[Entrevista com Arthur Paixão, Head de Cybersecurity do Hospital Albert Einstein, sobre os principais riscos cibernéticos no setor de saúde. Arthur destaca que o maior desafio não é apenas reagir a ameaças, mas sim a falta de visibilidade sobre os ativos e ambientes digitais, um fator crítico para a prevenção eficaz de incidentes]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Austin Allen on Healthcare Cybersecurity and Patient Safety]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-austin-allen-on-healthcare-cybersecurity-and-patient-safety</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-austin-allen-on-healthcare-cybersecurity-and-patient-safety</guid>
            <pubDate>Thu, 17 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus Podcast, Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, discusses the cybersecurity challenges facing healthcare delivery organizations, and the potential negative impacts of a breach or incident on patient care.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Rebuilding Legacy GRC from the Ground Up]]></title>
            <link>https://nexusconnect.io/articles/rebuilding-legacy-grc-from-the-ground-up</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/rebuilding-legacy-grc-from-the-ground-up</guid>
            <pubDate>Tue, 15 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Mike Ratliff, CISO at Providence, one of the country's largest not-for-profit healthcare providers, writes about his organization's attempt to re-think GRC as Governance, Risk, Attack Surface Management, and Compliance (GRAC). Ratliff describes five areas GRAC improves the overall security program, including the quantification and prioritization of risk, the integration of attack surface management, and an architecture that supports secure-by-design principles.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[The Economics of OT Cybersecurity: Are We Investing in the Wrong Priorities?]]></title>
            <link>https://nexusconnect.io/articles/the-economics-of-ot-cybersecurity-are-we-investing-in-the-wrong-priorities</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-economics-of-ot-cybersecurity-are-we-investing-in-the-wrong-priorities</guid>
            <pubDate>Mon, 14 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Current OT cybersecurity budgeting approaches reflect a misalignment of prioritizing surface-level defenses over architectural shortcomings. Instead, CISOs should demand vendors deliver products that are secure by design, and address systemic failures over a reactive approach to the security of cyber-physical systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[ASL Roma 1’s HOPE: Innovation and Resilience to Vulnerability Waves]]></title>
            <link>https://nexusconnect.io/articles/asl-roma-1s-hope-innovation-and-resilience-to-vulnerability-waves</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/asl-roma-1s-hope-innovation-and-resilience-to-vulnerability-waves</guid>
            <pubDate>Wed, 09 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[ASL Roma 1’s HOPE (Healthcare Operational Protection & Excellence) project stands as a cutting-edge initiative in healthcare cybersecurity, leveraging advanced technologies and innovative methodologies to strengthen organizational resilience. Here we lay the foundation for explaining how our CMDB becomes a key tool for proactively managing vulnerabilities, especially during waves of CVEs (Common Vulnerabilities and Exposures) that can quickly disrupt complex environments.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Gentry Lane on the Use of 'Salami Cuts' in Cyber Conflict]]></title>
            <link>https://nexusconnect.io/podcasts/gentry-lane-on-the-use-of-salami-cuts-in-cyber-conflict</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/gentry-lane-on-the-use-of-salami-cuts-in-cyber-conflict</guid>
            <pubDate>Mon, 07 Jul 2025 09:35:00 +0000</pubDate>
            <description><![CDATA[Gentry Lane, founder of Nemesis Global, joins the Nexus Podcast to discuss how a Cold War tactic known as Salami Cuts is being used against U.S. critical infrastructure. Adversaries who cannot operate on equal footing on a kinetic battlefield, are finding cyberspace to be a level playing field. The use of salami tactics is a strategy of gradually degrading an opposition's dominance by instilling distrust in institutions, utilities, or the government's ability to protect us.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Pedro Umbelino on Exploiting ATG Devices in Fuel Storage]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-pedro-umbelino-on-exploiting-atg-devices-in-fuel-storage</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-pedro-umbelino-on-exploiting-atg-devices-in-fuel-storage</guid>
            <pubDate>Wed, 02 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Pedro Umbelino, Principal Research Scientist at Bitsight Technologies, joins to discuss his team's research into Automatic Tank Gauge (ATG) systems and how they uncovered 11 vulnerabilities in ATGs manufactured by five different vendors. ATG devices have sets of sensors that measure and record fuel levels, condensation, temperature, and volume in storage tanks. They are critical because they can be used to monitor for leaks, and can trigger alerts, sirens, perform emergency shutoff procedures, or allow for ventilation if necessary.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Study Warns: Digital Transformation Amps up Cyber Risks in Manufacturing]]></title>
            <link>https://nexusconnect.io/articles/study-warns-digital-transformation-amps-up-cyber-risks-in-manufacturing</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/study-warns-digital-transformation-amps-up-cyber-risks-in-manufacturing</guid>
            <pubDate>Tue, 01 Jul 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[A new Information Risk Insights Study by Cyentia Institute puts real data behind the likelihood of attacks against critical infrastructure sectors enabled by digital transformation. CISOs need to understand the expanded attack surfaces and other risks within smart factories, healthcare, and other sectors connected devices online.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Experts: Expect Iran’s Cyber Tactics to be Disruptive]]></title>
            <link>https://nexusconnect.io/articles/experts-expect-irans-cyber-tactics-to-be-disruptive</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/experts-expect-irans-cyber-tactics-to-be-disruptive</guid>
            <pubDate>Wed, 25 Jun 2025 15:04:00 +0000</pubDate>
            <description><![CDATA[U.S. critical infrastructure operators are urged to be vigilant in hardening operational technology and ICS cybersecurity in expectation of a retaliatory response from Iran for last week’s missile strikes.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Steven Sim on OT-ISAC and Cybersecurity Information Sharing]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-steven-sim-on-ot-isac-and-cybersecurity-information-sharing</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-steven-sim-on-ot-isac-and-cybersecurity-information-sharing</guid>
            <pubDate>Wed, 25 Jun 2025 12:02:00 +0000</pubDate>
            <description><![CDATA[Steven Sim, the chair of the OT ISAC advisory committee, joins the Nexus Podcast for an in-depth conversation about the state of the OT-ISAC, information-sharing, and why organizations are prospering from this channel from not only sharing, but community initiatives, including conferences, and training opportunities for OT engineers and cybersecurity practitioners.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Bridging the Cybersecurity Gap Among America's Underfunded Healthcare Providers]]></title>
            <link>https://nexusconnect.io/articles/bridging-the-cybersecurity-gap-among-americas-underfunded-healthcare-providers</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/bridging-the-cybersecurity-gap-among-americas-underfunded-healthcare-providers</guid>
            <pubDate>Tue, 24 Jun 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[A recent Health Sector Coordinating Council (HSCC) Cybersecurity Working Group (CWG) report highlights the cybersecurity shortcomings that underfunded hospitals and healthcare delivery organizations face. The report calls out a number of key areas that could benefit, including workforce development, best practices and technical resources, and compliance help.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[E26: More Than Just a Maritime Cybersecurity Regulation—It's a Fundamental Shift]]></title>
            <link>https://nexusconnect.io/articles/e26-more-than-just-a-maritime-cybersecurity-regulation-its-a-fundamental-shift</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/e26-more-than-just-a-maritime-cybersecurity-regulation-its-a-fundamental-shift</guid>
            <pubDate>Fri, 20 Jun 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The maritime cybersecurity regulation, IACS’ UR E26 “Cyber Resilience of Ships,” is a non-negotiable reality, fundamentally changing how cyber resilience is integrated into shipbuilding and operations. It mandates that cybersecurity is embedded into ship design, moving beyond voluntary guidelines to enforceable requirements. This standard secures the "ship as an entire system," ensuring a holistic approach to maritime cybersecurity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast Episode 100: Sarah Fluchs on the Cyber Resilience Act]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-episode-100-sarah-fluchs-on-the-cyber-resilience-act</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-episode-100-sarah-fluchs-on-the-cyber-resilience-act</guid>
            <pubDate>Wed, 18 Jun 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast—No. 100!—Sarah Fluchs joins to discuss her work as a Type-A member in the EU commission's Cyber Resilience Act Expert Group, the ongoing progress—and challenges—around the CRA, and her passion for bringing cybersecurity principles to engineers and other non-security technologists.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Looking Back at 100 Episodes of the Nexus Podcast]]></title>
            <link>https://nexusconnect.io/podcasts/looking-back-at-100-episodes-of-the-nexus-podcast</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/looking-back-at-100-episodes-of-the-nexus-podcast</guid>
            <pubDate>Mon, 16 Jun 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[With the publication of the 100th Claroty Nexus Podcast episode, the podcast has emerged as a snapshot of the maturity of operational technology cybersecurity and cyber-physical systems protection.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Managing Serial-to-Ethernet Exposures in Modern OT Networks]]></title>
            <link>https://nexusconnect.io/articles/managing-serial-to-ethernet-exposures-in-modern-ot-networks</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/managing-serial-to-ethernet-exposures-in-modern-ot-networks</guid>
            <pubDate>Tue, 10 Jun 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Alessio Rosas examines the technical role and security risks introduced by Serial-to-Ethernet converters. These devices allow legacy serial equipment to connect and communicate over modern Ethernet networks. While this integration brings numerous operational advantages, it also introduces serious cybersecurity risks that, if left unaddressed, can endanger critical infrastructure and industrial control systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Andrew Ohrt on Starting Cyber-Informed Engineering Projects]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-andrew-ohrt-on-starting-cyber-informed-engineering-projects</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-andrew-ohrt-on-starting-cyber-informed-engineering-projects</guid>
            <pubDate>Thu, 05 Jun 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus Podcast, Andrew Ohrt, the resilience practice area lead at West Yost, a water resource management and engineering firm, joins to explore how and where cyber-informed engineering is succeeding, and where implementation and advocacy challenges remain.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Cloud's Double-Edged Sword: Transforming OT Exposure Management]]></title>
            <link>https://nexusconnect.io/articles/clouds-double-edged-sword-transforming-ot-exposure-management</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/clouds-double-edged-sword-transforming-ot-exposure-management</guid>
            <pubDate>Tue, 03 Jun 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The integration of cloud technologies into operational technology (OT) environments represents one of the most significant shifts in industrial systems management and cybersecurity. Cloud-connected sensors and cloud monitoring and management systems provide operators with instant insights into everything from temperature fluctuations to production mishaps and potential security vulnerabilities.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Megan Stifel on the Impact of the Ransomware Task Force]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-megan-stifel-on-the-impact-of-the-ransomware-task-force</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-megan-stifel-on-the-impact-of-the-ransomware-task-force</guid>
            <pubDate>Thu, 29 May 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Megan Stifel, Chief Strategy Officer for the Institute for Security and Technology, joins to discuss the four years of progress and challenges experienced by the Ransomware Task Force.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[How Hackers Exploit Healthcare Technology to Turn Life-Saving Systems into Weapons]]></title>
            <link>https://nexusconnect.io/articles/how-hackers-exploit-healthcare-technology-to-turn-life-saving-systems-into-weapons</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/how-hackers-exploit-healthcare-technology-to-turn-life-saving-systems-into-weapons</guid>
            <pubDate>Tue, 27 May 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Franceso Terlizzi, CEO of ACGroup and founder of the cyber threat analysis lab at Italy’s Marconi University, examines how threat actors may weaponize life-saving hospital systems and impact patient care delivery.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Joe Slowik on Identifying Truly ‘Critical’ Infrastructure]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-joe-slowik-on-identifying-truly-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-joe-slowik-on-identifying-truly-critical-infrastructure</guid>
            <pubDate>Wed, 21 May 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, security researcher Joe Slowik discusses the tensions critical infrastructure sector companies are experiencing around CI protection and the realistic identification of which entities are truly critical to national and economic security, and balancing their needs while still defending those that may not fall in that category.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[How Cyber-Informed Engineering Shapes NSA’s Blueprint for OT Cyber Resilience]]></title>
            <link>https://nexusconnect.io/articles/how-cyber-informed-engineering-shapes-nsas-blueprint-for-ot-cyber-resilience</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/how-cyber-informed-engineering-shapes-nsas-blueprint-for-ot-cyber-resilience</guid>
            <pubDate>Mon, 19 May 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The NSA's Cybersecurity Technical Report on securing smart OT controllers champions secure-by-design and cyber-informed engineering, stating they prioritize “engineering controls to mitigate the worst consequences of cyberattacks”-like physical damage or loss of life. CIE moves cybersecurity from a design afterthought to a core engineering discipline. Traditional OT security often relied on air-gapping or retrofitting defenses, but CIE mandates designing systems that inherently resist attacks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Danielle Jablanski on Critical Infrastructure Protection]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-danielle-jablanski-on-critical-infrastructure-protection</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-danielle-jablanski-on-critical-infrastructure-protection</guid>
            <pubDate>Tue, 13 May 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus Podcast, Danielle Jablanski, an Industrial Control Systems Strategist & subject matter expert at the Cybersecurity & Infrastructure Security Agency (CISA) joins to bring her perspective on the current state of critical infrastructure protection and where entities large and small are challenged.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Cassie Crossley on Hardware Security, HBOMs]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-cassie-crossley-on-hardware-security-hboms</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-cassie-crossley-on-hardware-security-hboms</guid>
            <pubDate>Thu, 08 May 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Schneider Electric Vice President of Supply Chain Security Cassie Crossley joins to discuss the nuances of this aspect of hardware security and the growing need for hardware bills of materials (HBOMs) within critical infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[An Operational Checklist for Securing the IT/OT Ecosystem]]></title>
            <link>https://nexusconnect.io/articles/an-operational-checklist-for-securing-the-itot-ecosystem</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/an-operational-checklist-for-securing-the-itot-ecosystem</guid>
            <pubDate>Tue, 06 May 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Former Pfizer global head of automation engineering Jim LaBonty formulates an operational checklist for securing converged IT/OT manufacturing environments. He suggests strategic governance options and frameworks to follow, and operational advice for security and engineering teams, and asset operators.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Christiaan Beek on Ransomware’s Continued Profitability]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-christiaan-beek-on-ransomwares-continued-profitability</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-christiaan-beek-on-ransomwares-continued-profitability</guid>
            <pubDate>Thu, 01 May 2025 10:03:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Rapid7 Senior Director of Threat Analytics Christiaan Beek explores the economics of ransomware and the continued profitability and success of it as an attack vector.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Has IT/OT Convergence Improved Critical Infrastructure Cybersecurity?]]></title>
            <link>https://nexusconnect.io/articles/has-itot-convergence-improved-critical-infrastructure-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/has-itot-convergence-improved-critical-infrastructure-cybersecurity</guid>
            <pubDate>Wed, 30 Apr 2025 09:14:00 +0000</pubDate>
            <description><![CDATA[Former NSA Director Adm. Michael S. Rogers says that In 2025, IT/OT convergence is a fact of life. Many security operations centers (SOCs) oversee these vastly different and complex environments, and believe that convergence, while time-consuming and difficult, has improved critical infrastructure cybersecurity and our national security as a result.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Secure by Default: The Necessary Prescription for Secure Healthcare Delivery]]></title>
            <link>https://nexusconnect.io/articles/secure-by-default-the-necessary-prescription-for-secure-healthcare-delivery</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/secure-by-default-the-necessary-prescription-for-secure-healthcare-delivery</guid>
            <pubDate>Mon, 28 Apr 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The "secure-by-default" approach offers a critical shift in how healthcare providers approach their cybersecurity efforts. Rather than treating security as an afterthought or add-on feature, secure-by-default ensures systems are protected from the moment they're implemented, with minimal configuration changes required.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[The Power of Complete OT Asset Visibility: Transforming Security and Efficiency]]></title>
            <link>https://nexusconnect.io/articles/the-power-of-complete-ot-asset-visibility-transforming-security-and-efficiency</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-power-of-complete-ot-asset-visibility-transforming-security-and-efficiency</guid>
            <pubDate>Mon, 21 Apr 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Complete visibility of OT assets offers far-reaching advantages, allowing organizations to control their digital and physical environments while mitigating cybersecurity risks. Complete OT asset visibility and asset inventories enable secure remote access, improved threat detection, operational efficiency, and better compliance management.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[ASL Roma 1: From HyperSOC to H.O.P.E.]]></title>
            <link>https://nexusconnect.io/articles/asl-roma-1-from-hypersoc-to-hope</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/asl-roma-1-from-hypersoc-to-hope</guid>
            <pubDate>Thu, 17 Apr 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Stefano Scaramuzzino, CISO at ASL Roma 1, Italy's largest public health authority, writes about the next phase of its next-generation security operations center, the HyperSOC: H.O.P.E., an acronym for Healthcare Operational Protection & Excellence. H.O.P.E. represents a holistic vision of digital healthcare, where security and operational quality are inseparable parts of a unified ecosystem.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Poor Visibility Still a Drag on Secure Third-Party Remote Access]]></title>
            <link>https://nexusconnect.io/articles/poor-visibility-still-a-drag-on-secure-third-party-remote-access</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/poor-visibility-still-a-drag-on-secure-third-party-remote-access</guid>
            <pubDate>Wed, 09 Apr 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Visibility is foundational for operational technology (OT) cybersecurity, and a lack of an asset inventory diminishes an enterprise’s ability to protect industrial control systems and cyber-physical systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[The Quantum Compliance Leap: Preparing for Q-Day]]></title>
            <link>https://nexusconnect.io/articles/the-quantum-compliance-leap-preparing-for-q-day</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-quantum-compliance-leap-preparing-for-q-day</guid>
            <pubDate>Mon, 07 Apr 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Quantum computing threatens the viability of current encryption algorithms at the core data protection, privacy, and cybersecurity efforts in enterprises worldwide. Expert Cristin Flynn Goodwin explains the challenges facing CISOs as they migrate to quantum-resistant encryption in the near future.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Florence Hudson on the IEEE/UL 2933 Clinical IOT Cybersecurity Standard]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-florence-hudson-on-the-ieeeul-2933-clinical-iot-cybersecurity-standard</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-florence-hudson-on-the-ieeeul-2933-clinical-iot-cybersecurity-standard</guid>
            <pubDate>Tue, 01 Apr 2025 10:52:00 +0000</pubDate>
            <description><![CDATA[Florence Hudson, working group chair for the IEEE/UL 2933 Standard and Framework for Clinical IoT Data and Device Internoperability with TIPPSS standard, joins the Claroty Nexus Podcast to discuss how the standard serves as a framework based on the TIPPSS (trust, identity, privacy, protection, safety, and security) principles in order to improve and secure data exchanges between connected medical devices.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Mike Holcomb on Starting and Succeeding in OT Cybersecurity]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mike-holcomb-on-starting-and-succeeding-in-ot-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mike-holcomb-on-starting-and-succeeding-in-ot-cybersecurity</guid>
            <pubDate>Mon, 24 Mar 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Claroty Nexus Podcast, Mike Holcomb, global lead for ICS and OT cybersecurity at engineering and construction solution provider Fluor, discusses his advocacy and efforts to educate engineers and IT cybersecurity professionals in the nuances of protecting operational technology and industrial control systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[ENISA Attempts to Move NIS2 Forward with NIS360 Findings]]></title>
            <link>https://nexusconnect.io/articles/enisa-attempts-to-move-nis2-forward-with-nis360-findings</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/enisa-attempts-to-move-nis2-forward-with-nis360-findings</guid>
            <pubDate>Thu, 20 Mar 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The European Union Agency for Cybersecurity (ENISA)'s NIS360 report identifies gaps in the current state of NIS2 compliance readiness and provides recommendations to lawmakers and affected industry verticals on what they need to do to become NIS2 compliant.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[‘The Boiled Frog’: A Cybersecurity Lesson for Organizations]]></title>
            <link>https://nexusconnect.io/articles/the-boiled-frog-a-cybersecurity-lesson-for-organizations</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-boiled-frog-a-cybersecurity-lesson-for-organizations</guid>
            <pubDate>Wed, 19 Mar 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Reactive cybersecurity programs are destined for a fate similar to the story of the boiling frog, one that doesn’t know it’s in trouble until it’s too late. Proactive and predictive approaches to cybersecurity are a must because they act as early warning systems that alert organizations before disaster strikes.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Diversified Monitoring Essential to a Strong OT Cybersecurity Foundation]]></title>
            <link>https://nexusconnect.io/articles/diversified-monitoring-essential-to-a-strong-ot-cybersecurity-foundation</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/diversified-monitoring-essential-to-a-strong-ot-cybersecurity-foundation</guid>
            <pubDate>Mon, 17 Mar 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[A diversified operational technology (OT) cybersecurity monitoring platform plays a key role in strengthening the protection of cyber-physical systems by providing clear visibility, real-time threat detection, and proactive risk mitigation. By integrating multiple monitoring tools and technologies, organizations can build a layered security approach that minimizes vulnerabilities, improves response times, and keeps critical systems resilient against cyber threats.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Visibility, Governance Key to Managing Open Source Risk]]></title>
            <link>https://nexusconnect.io/articles/visibility-governance-key-to-managing-open-source-risk</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/visibility-governance-key-to-managing-open-source-risk</guid>
            <pubDate>Wed, 12 Mar 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Enterprises often are blind to the use of open source software in commercial and homegrown software development. Vulnerabilities and other weaknesses in OSS deployments are significant exposures that must be managed and mitigated.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Reducing the Cybersecurity Risks of Connected BMS]]></title>
            <link>https://nexusconnect.io/articles/reducing-the-cybersecurity-risks-of-connected-bms</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/reducing-the-cybersecurity-risks-of-connected-bms</guid>
            <pubDate>Mon, 10 Mar 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Building management or automation systems are increasingly being connected online. Each connection to the internet introduces a new risk. Attackers looking for an entry point onto an internal network or to disrupt operations within a building could target a vulnerability in an internet-facing system and put the physical safety of occupants—or patients at a hospital, for example—at risk.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Ron Fabela on Low-Skilled OT/ICS Threat Actors]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-ron-fabela-on-low-skilled-otics-threat-actors</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-ron-fabela-on-low-skilled-otics-threat-actors</guid>
            <pubDate>Thu, 27 Feb 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Ron Fabela joins the Nexus podcast to discuss his research into low-skilled threat actors targeting operational technology and industrial control systems. Many of these groups operate as hacktivists and carry out less sophisticated defacements and intrusions. While less of a risk, these incidents are still a drain on human resources required to investigate them and decided on mitigation strategies.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Identifying, Classifying Riskiest Devices in OT-Heavy Environments]]></title>
            <link>https://nexusconnect.io/articles/identifying-classifying-riskiest-devices-in-ot-heavy-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/identifying-classifying-riskiest-devices-in-ot-heavy-environments</guid>
            <pubDate>Tue, 25 Feb 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Identifying and classifying the riskiest devices in operational technology (OT)-heavy environments is crucial for maintaining operational integrity and security. Expert Dan Ricci provides an extensive checklist for doing so that includes internal stakeholders and technical advice.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Munish Walther-Puri on Developing a Scale for OT Cybersecurity Incidents]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-munish-walther-puri-on-developing-a-scale-for-ot-cybersecurity-incidents</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-munish-walther-puri-on-developing-a-scale-for-ot-cybersecurity-incidents</guid>
            <pubDate>Thu, 20 Feb 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[On the latest episode of the Claroty Nexus Podcast, Munish Walther-Puri, adjunct professor at the Center Global Affairs at New York University, describes a homegrown scale OT cybersecurity incidents called the Infrastructure Cyber Incident Scale, which takes into account an incident's magnitude, intensity, and duration.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Software Security is Aim of EU Cyber Resilience Act Compliance]]></title>
            <link>https://nexusconnect.io/articles/software-security-is-aim-of-eu-cyber-resilience-act-compliance</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/software-security-is-aim-of-eu-cyber-resilience-act-compliance</guid>
            <pubDate>Wed, 19 Feb 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[EU software and IoT device manufacturers must begin their efforts to come into compliance with the EU's Cyber Resilience Act (CRA). The CRA aims to protect consumers and businesses buying software or hardware products with a digital component from vulnerabilities and improve secure software development practices.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Brian Foster on the Risks of a Hyperconnected Power Grid]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-brian-foster-on-the-risks-of-a-hyperconnected-power-grid</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-brian-foster-on-the-risks-of-a-hyperconnected-power-grid</guid>
            <pubDate>Wed, 12 Feb 2025 13:00:00 +0000</pubDate>
            <description><![CDATA[Brian Foster, senior advisor for grid security at Southern California Edison, joins the Nexus Podcast to discuss his presentation delivered at the S4 Conference on the risks of a hyperconnected grid. Adding a Wi-Fi connection to vulnerable smart meters that are enrolled by customers on a massive scale may allow attackers able to compromise centralized command and control of these devices to issue commands at scale that could result in catastrophic damage.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Secure Remote Access for Smart Factory Environments]]></title>
            <link>https://nexusconnect.io/articles/secure-remote-access-for-smart-factory-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/secure-remote-access-for-smart-factory-environments</guid>
            <pubDate>Mon, 10 Feb 2025 13:00:00 +0000</pubDate>
            <description><![CDATA[As shop floors and factories get smarter, there is an unprecedented surge in, and demand for, remote access to manufacturing systems. Former Pfizer global head of automation engineering Jim LaBonty writes for Claroty Nexus about the need to secure remote access to manufacturing environments to reduce risk and improve efficiency.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[3 Cybersecurity Priorities for the New Administration]]></title>
            <link>https://nexusconnect.io/articles/3-cybersecurity-priorities-for-the-new-administration</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/3-cybersecurity-priorities-for-the-new-administration</guid>
            <pubDate>Thu, 06 Feb 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Former NSA Director Adm. Michael S. Rogers shares three priorities the Trump Administration should pursue with regard to cybersecurity and critical infrastructure protection. Those include resuming the Cybersecurity Review Board, urging enterprises to focus on basic security hygiene, and exert its influence on vendors to secure their products.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Insecure Design Choice Puts Patient Safety, Data at Risk]]></title>
            <link>https://nexusconnect.io/articles/insecure-deisgn-choice-puts-patient-safety-data-at-risk</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/insecure-deisgn-choice-puts-patient-safety-data-at-risk</guid>
            <pubDate>Tue, 04 Feb 2025 13:00:00 +0000</pubDate>
            <description><![CDATA[Exploitable cybersecurity vulnerabilities in Contec's CMS8000 patient monitors may be an insecure design choice rather than a backdoor as labeled by CISA. But regardless, the risk of leaked patients' protected health information (PHI) and remote code execution remains a real possibility.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Outgoing Biden EO Takes Aim at Improved Software Security]]></title>
            <link>https://nexusconnect.io/articles/outgoing-biden-eo-takes-aim-at-improved-software-security</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/outgoing-biden-eo-takes-aim-at-improved-software-security</guid>
            <pubDate>Mon, 27 Jan 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Executive Order 14144 tightens secure software development practices—including attestations of security such as SBOMs—for software used at the federal level.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Accelerating IACS/OT Cybersecurity Improvements]]></title>
            <link>https://nexusconnect.io/articles/accelerating-iacsot-cybersecurity-improvements</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/accelerating-iacsot-cybersecurity-improvements</guid>
            <pubDate>Thu, 23 Jan 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[IT cybersecurity team members bring a fresh set of experience and perspective to the protection of cyber-physical systems and industrial and automation control system production environments.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: CISA on Secure-by-Demand for OT]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-cisa-on-secure-by-demand-for-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-cisa-on-secure-by-demand-for-ot</guid>
            <pubDate>Tue, 21 Jan 2025 16:00:00 +0000</pubDate>
            <description><![CDATA[Matthew Rogers, ICS Cybersecurity Strategy & R&D Lead at CISA, joins the Nexus Podcast to discuss the agency's and its international partners' release of a procurement guide for operational technology (OT) owners and operators . The guide describes 12 OT cybersecurity elements that buyers should be looking for, and hopefully influencing automation and control system vendors to implement. Rogers hopes this initiative not only gives OT asset owners some agency during procurement, but also to creates a market-influenced demand among leading vendors to integrate these security elements by default into OT products.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[HIPAA Security Rule Update Aims to Strengthen Medical Device, Data Protections]]></title>
            <link>https://nexusconnect.io/articles/hipaa-security-rule-update-aims-to-strengthen-medical-device-data-protections</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/hipaa-security-rule-update-aims-to-strengthen-medical-device-data-protections</guid>
            <pubDate>Wed, 15 Jan 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[The U.S. Department of Health and Human Services (HHS) hopes to strengthen the security of electronic protected health information (ePHI) with the most significant proposed update to the Health Insurance Portability and Accountability Act (HIPAA) Security Rule in more than a decade.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Five Trends Driving OT Cybersecurity in 2025]]></title>
            <link>https://nexusconnect.io/articles/five-trends-driving-ot-cybersecurity-in-2025</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/five-trends-driving-ot-cybersecurity-in-2025</guid>
            <pubDate>Thu, 09 Jan 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Five cybersecurity trends for operational technology (OT) figure to dominate in 2025. They include: increased government and regulatory scrutiny on OT, the need for new strategies to secure once air-gapped OT, and OT specialization for CISOs and others in cybersecurity leadership roles.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[The Anti-Library: How Unread Books Can Be the Secret Weapon Against Hackers]]></title>
            <link>https://nexusconnect.io/articles/the-anti-library-how-unread-books-can-be-the-secret-weapon-against-hackers</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-anti-library-how-unread-books-can-be-the-secret-weapon-against-hackers</guid>
            <pubDate>Wed, 08 Jan 2025 10:00:00 +0000</pubDate>
            <description><![CDATA[Marconi University professor Francesco Terlizzi explains how CISOs could adopt a cybersecurity approach to continuous improvement based on Umberto Eco's concept of the anti-library.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Noam Moshe on the IOCONTROL Malware]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-the-iocontrol-malware</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-the-iocontrol-malware</guid>
            <pubDate>Mon, 23 Dec 2024 13:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Team82 researcher Noam Moshe provides some technical details on the IOCONTROL malware, a Linux-based backdoor used to infect critical infrastructure around the world. IOCONTROL has a modular architecture that allows it to be configured for IoT, OT, and SCADA devices.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Adm. Michael Rogers]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-adm-michael-rogers</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-adm-michael-rogers</guid>
            <pubDate>Mon, 23 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Adm. Michael S. Rogers, former NSA Director and head of U.S. Cyber Command, reflects on the growing aggression of foreign adversaries on U.S networks, and predicts more deterrence coming in cyberspace.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Cristin Flynn Goodwin]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-cristin-flynn-goodwin</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-cristin-flynn-goodwin</guid>
            <pubDate>Mon, 23 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Attorney Cristin Flynn Goodwin of Advanced Cyber Law reflects on the 2024 regulatory and supply chain cybersecurity landscapes, and predicts for next year the start of regulation around AI and cybersecurity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: Dan Ricci]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-dan-ricci</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-dan-ricci</guid>
            <pubDate>Mon, 23 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Critical infrastructure cybersecurity expert Dan Ricci, founder of the ICS Advisory Project, reflects on 2024 vulnerability trends impacting OT, ICS, and SCADA systems. He also offers predictions for 2025.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Reflections and Predictions: John Ballentine]]></title>
            <link>https://nexusconnect.io/articles/nexus-reflections-and-predictions-john-ballentine</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nexus-reflections-and-predictions-john-ballentine</guid>
            <pubDate>Mon, 23 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Port Authority New York New Jersey OT cybersecurity lead John Ballentine reflects on vendor relationships in OT and predicts consolidation in the space.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[SPDX, CycloneDX, or SWID: Navigating the SBOM Standard Landscape]]></title>
            <link>https://nexusconnect.io/articles/spdx-cyclonedx-or-swid-navigating-the-sbom-standard-landscape</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/spdx-cyclonedx-or-swid-navigating-the-sbom-standard-landscape</guid>
            <pubDate>Wed, 18 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[While software bills of materials (SBOMs) promise to help streamline software vulnerability mitigation and software supply chain security efforts, in order for enterprises to succeed, they must  pick the right SBOM data exchange standard for their use cases and understand how to consume several SBOM standards when necessary.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Team82 on Attacking the Insecure IoT Cloud]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-team82-on-attacking-the-insecure-iot-cloud</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-team82-on-attacking-the-insecure-iot-cloud</guid>
            <pubDate>Mon, 16 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Claroty Team82 researchers Noam Moshe and Tomer Goldschmidt, fresh off a presentation at Black Hat Europe on the subject, provide their perspective on the security vulnerabilities plaguing IoT clouds and why attackers and defenders should be locking down device authentication and other avenues exposing clouds to attack.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Lessons Learned from Creating an OT Cybersecurity Program in a Large, Slow-Moving Government Agency]]></title>
            <link>https://nexusconnect.io/articles/lessons-learned-from-creating-an-ot-cybersecurity-program-in-a-large-slow-moving-government-agency</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/lessons-learned-from-creating-an-ot-cybersecurity-program-in-a-large-slow-moving-government-agency</guid>
            <pubDate>Wed, 11 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Risk managers—especially C-suite and boards of directors—looking to establish a culture of OT cyber awareness and risk remediation proactivity in their organizations need to establish a formal and measurable program approach. The program must provide a shared vision and a practical roadmap that makes sense because it relates to many of the unique characteristics of their organization, OT environment, business model, and risk appetite.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Volexity’s Steven Adair on the Nearest Neighbor Attack]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-volexitys-steven-adair-on-the-nearest-neighbor-attack</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-volexitys-steven-adair-on-the-nearest-neighbor-attack</guid>
            <pubDate>Tue, 10 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[On the Claroty Nexus Podcast, Volexity founder Steven Adair explains details on his research team's disclosure of the Nearest Neighbor Attack. The attack introduced a new tactic used by a prolific advanced persistent threat group, Russia-linked APT 28, that put a new spotlight on the security of Wi-Fi, and the risk to users and devices connected to those networks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Water, Wastewater Cybersecurity Still Has Long Way to Go]]></title>
            <link>https://nexusconnect.io/articles/water-wastewater-cybersecurity-still-has-long-way-to-go</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/water-wastewater-cybersecurity-still-has-long-way-to-go</guid>
            <pubDate>Wed, 04 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[An OIG report critical of the water and wastewater industry's cybersecurity practices and posture illuminates endemic security issues within this critical infrastructure sector, from unpatched vulnerabilities to a lack of sharing of incident data.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[ASL Roma 1 HyperSOC Approach Secures Patient Safety, Operational Efficiency]]></title>
            <link>https://nexusconnect.io/articles/asl-roma-1-hypersoc-approach-secures-patient-safety-operational-efficiency</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/asl-roma-1-hypersoc-approach-secures-patient-safety-operational-efficiency</guid>
            <pubDate>Mon, 02 Dec 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[ASL Roma 1's implementation of an advanced security operation center called HyperSOC allows it to convert its cybersecurity approach from reactive to proactive, ensuring effective management of cyber threats. The adoption of this safeguard has led to a significant reduction in security incidents, despite the growing number of attacks at national and European level, because of the continuous monitoring of the attack surface of the infrastructure, which guarantees a higher level of security than other peers in the sector.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[A Predictive, Proactive Approach to the Governance of Medical Devices]]></title>
            <link>https://nexusconnect.io/articles/a-predictive-proactive-approach-to-the-governance-of-medical-devices</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/a-predictive-proactive-approach-to-the-governance-of-medical-devices</guid>
            <pubDate>Mon, 25 Nov 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In an increasingly interconnected and constantly evolving healthcare environment, there are numerous cybersecurity challenges that hospitals must face to guarantee patients high-quality health services, avoid interruptions in supply, optimize the use of devices, and effectively manage cyber risks. These challenges require the use of cutting-edge technologies and real-time availability of diverse data and information.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CISOs Urged to Prepare for Evolving Disinformation Tactics]]></title>
            <link>https://nexusconnect.io/articles/cisos-urged-to-prepare-for-evolving-disinformation-tactics</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cisos-urged-to-prepare-for-evolving-disinformation-tactics</guid>
            <pubDate>Thu, 21 Nov 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Enterprise CISOs must consider disinformation and misinformation campaigns targeting their companies and industries as part of their threat model. Organizations must also develop disinformation response plans, similar to incident response actions.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Explaining the Importance of Secure Connectivity in OT]]></title>
            <link>https://nexusconnect.io/articles/explaining-the-importance-of-secure-connectivity-in-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/explaining-the-importance-of-secure-connectivity-in-ot</guid>
            <pubDate>Mon, 18 Nov 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Securing connectivity in operational technology (OT) environments is crucial for the safety of critical infrastructure and maintaining the uninterrupted service it provides. Leaving unnecessary open ports, protocols, and services exposed, along with directly connected devices to the internet, such as programmable logic controllers (PLCs) and human machine interfaces (HMIs), greatly increases the risks of cyberattacks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Joe Saunders on Advanced Attacks Against Critical Infrastructure]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-joe-saunders-on-advanced-attacks-against-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-joe-saunders-on-advanced-attacks-against-critical-infrastructure</guid>
            <pubDate>Wed, 13 Nov 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus Podcast. Runsafe Security CEO and cofounder Joe Saunders examines the motivations of advanced adversaries, the targeting of memory-based vulnerabilities in embedded systems prevalent in OT and healthcare, and how initiatives such as secure-by-design/default/demand can make a dent in ensuring the resilience of critical infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Secure by Design in Manufacturing is Not an Empty Concept]]></title>
            <link>https://nexusconnect.io/articles/secure-by-design-in-manufacturing-is-not-an-empty-concept</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/secure-by-design-in-manufacturing-is-not-an-empty-concept</guid>
            <pubDate>Tue, 12 Nov 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Integrating security from the outset in the overall OT and manufacturing system interconnect design is a must. We can no longer just bolt on cybersecurity capabilities after systems are in production. Secure-by-design practices must be a top-down priority. Executives must insist upon this from their CISOs, application and network development teams alike.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Significant Changes to HIPAA Security Rule on the Way]]></title>
            <link>https://nexusconnect.io/articles/significant-changes-to-hipaa-security-rule-on-the-way</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/significant-changes-to-hipaa-security-rule-on-the-way</guid>
            <pubDate>Mon, 11 Nov 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[The HHS Office for Civil Rights proposes substantial rule changes to the long-standing Health Insurance Portability and Accountability Act (HIPAA) Security Rule. While details on the proposed rule changes remain unclear, HHS plans to issue a Notice of Proposed Rulemaking (NPRM) by the end of the year. These changes are believed to be the most substantial changes since the HIPAA Security rule went into effect in 2003]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Rodnei Gripp da Petrobras Fortalece a Conexão entre Segurança de Infraestruturas Críticas e Negócio]]></title>
            <link>https://nexusconnect.io/videos/rodnei-gripp-da-petrobras-fortalece-a-conexao-entre-seguranca-de-infraestruturas-criticas-e-negocio</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/rodnei-gripp-da-petrobras-fortalece-a-conexao-entre-seguranca-de-infraestruturas-criticas-e-negocio</guid>
            <pubDate>Thu, 07 Nov 2024 16:42:00 +0000</pubDate>
            <description><![CDATA[Saiba como a Claroty colaborou com o time de segurança cibernética da Petrobras, gerando benefícios estratégicos para a equipe responsável pelas plataformas de petróleo.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[José Carlos Hererra de Sigma, la Importancia de la Visibilidad y la Simplicidad]]></title>
            <link>https://nexusconnect.io/videos/jose-carlos-hererra-de-sigma-la-importancia-de-la-visibilidad-y-la-simplicidad</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/jose-carlos-hererra-de-sigma-la-importancia-de-la-visibilidad-y-la-simplicidad</guid>
            <pubDate>Thu, 07 Nov 2024 16:39:00 +0000</pubDate>
            <description><![CDATA[José Carlos Herrera, CISO de Sigma Europa, nos habla de la importancia de tener un inventario claro y una herramienta amigable como base para desarrollar una estrategia de ciberseguridad OT. Nos explica los resultados positivos de contar con Claroty.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Felipe Bonomo Destaca os Desafios Relacionados à Proteção de Infraestruturas Críticas]]></title>
            <link>https://nexusconnect.io/videos/felipe-bonomo-destaca-os-desafios-relacionados-a-protecao-de-infraestruturas-criticas</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/felipe-bonomo-destaca-os-desafios-relacionados-a-protecao-de-infraestruturas-criticas</guid>
            <pubDate>Thu, 07 Nov 2024 16:36:00 +0000</pubDate>
            <description><![CDATA[Felipe Bonomo, CISO da Alpargatas, empresa responsável pela icônica marca Havaianas, compartilha os desafios e benefícios de sua parceria com a Claroty na jornada de proteção de ambientes críticos, além de suas impressões sobre o evento Nexus 2024.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Court Ruling on SEC v. SolarWinds Good News for CISOs—For Now]]></title>
            <link>https://nexusconnect.io/articles/court-ruling-on-sec-v-solarwinds-good-news-for-cisos-for-now</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/court-ruling-on-sec-v-solarwinds-good-news-for-cisos-for-now</guid>
            <pubDate>Wed, 06 Nov 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Attorney Cristin Goodwin writes that CISOs can breathe easier following a New York court's ruling dismissing most of the SEC's disclosure charges against SolarWinds. Had the SEC's case proceeded, a precedent would be set that a company’s honest voluntary self-assessment would have to be recalibrated as an accounting control used for public financial disclosure, and if every statement a CISO makes in public had been deemed “material” to investors, CISOs asked to talk about sensitive security issues would be at heightened risk of exposure at all times.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[How Under-Resourced Healthcare Providers Can Up Their Cybersecurity Game]]></title>
            <link>https://nexusconnect.io/articles/how-under-resourced-healthcare-providers-can-up-their-cybersecurity-game</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/how-under-resourced-healthcare-providers-can-up-their-cybersecurity-game</guid>
            <pubDate>Mon, 04 Nov 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[With tight budgets and limited access to on-staff cybersecurity expertise, under-resourced healthcare delivery organizations may best secure their data, systems, and patients by learning the 405(d) framework, focus on EDR, email security, awareness training, and other cybersecurity basics to ensure resilience.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Better Medical Device Classification for Enhanced Risk Management]]></title>
            <link>https://nexusconnect.io/articles/better-medical-device-classification-for-enhanced-risk-management</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/better-medical-device-classification-for-enhanced-risk-management</guid>
            <pubDate>Thu, 31 Oct 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Effective healthcare cybersecurity necessitates a risk-based approach centered on patient care and how caregivers interact with technology. Cybersecurity teams must collaborate across the organization to stay informed about how various business units are evolving their services, and the changing threat landscape.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Grant Geyer on the Business Impact of Disruptions from Cyberattacks]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-grant-geyer-on-the-business-impact-of-disruptions-from-cyberattacks</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-grant-geyer-on-the-business-impact-of-disruptions-from-cyberattacks</guid>
            <pubDate>Wed, 30 Oct 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Claroty Chief Strategy Officer Grant Geyer recaps and provides important context to the results of a Claroty survey looking at the impact of business disruptions resulting from cyberattacks on cyber-physical systems. The survey queried 1,100 cybersecurity leaders and practitioners globally on questions about the disruptive impact of attacks on operational technology, connected medical devices and systems, building automation systems, and the internet of things.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Deterrence in Cyberspace Proving to be a Difficult Exercise]]></title>
            <link>https://nexusconnect.io/articles/deterrence-in-cyberspace-proving-to-be-a-difficult-exercise</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/deterrence-in-cyberspace-proving-to-be-a-difficult-exercise</guid>
            <pubDate>Tue, 22 Oct 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Former NSA Director Adm. Michael Rogers writes about the need for cybersecurity leaders and political decision makers to understand the red lines our adversaries are crossing in cyberspace and the need for deterrence.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Does DevOps have a place in OT/ICS Development?]]></title>
            <link>https://nexusconnect.io/articles/does-devops-have-a-place-in-otics-development</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/does-devops-have-a-place-in-otics-development</guid>
            <pubDate>Wed, 16 Oct 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[DevOps approaches to software development have not been widely implemented in operational technology environments, but as the demand for increased digitization and convergence of IT/OT grows, more DevOps processes may find their way into industrial development.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Mike Rogers and Corey Elinburg on the Value of Business Impact Assessments]]></title>
            <link>https://nexusconnect.io/videos/mike-rogers-and-corey-elinburg-on-the-value-of-business-impact-assessments</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/mike-rogers-and-corey-elinburg-on-the-value-of-business-impact-assessments</guid>
            <pubDate>Tue, 15 Oct 2024 16:00:00 +0000</pubDate>
            <description><![CDATA[Mike Rogers, CISO and Director Information Security and Compliance at Hormel Foods, and Corey Elinburg, SVP and the Chief Information Security Officer for CommonSpirit Health, discuss the value of a business impact assessment (BIA) to cybersecurity programs. BIA is the essential methodology that enables organizations to evaluate the potential consequences of security breaches and make informed decisions on risk reduction. It also helps security leaders align cybersecurity programs with the overall business.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[John Ballentine on OT Threat Response]]></title>
            <link>https://nexusconnect.io/videos/john-ballentine-on-ot-threat-response</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/john-ballentine-on-ot-threat-response</guid>
            <pubDate>Tue, 15 Oct 2024 14:00:00 +0000</pubDate>
            <description><![CDATA[John Ballentine, OT Cybersecurity Lead for the Port Authority New York/New Jersey, explains his team's efforts to protect the Port Authority's extensive OT infrastructure. Inventory management, network segmentation, remediation, secure access, and other facets of the OT program feed into the Port Authority's threat response activities. Six million people utilize Port Authority systems on a daily basis, and Ballentine's team focuses on connectivity and interdependencies of systems, in order to maintain the protection of those systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Greg Garcia on Mapping Cybersecurity Risk within Healthcare]]></title>
            <link>https://nexusconnect.io/videos/greg-garcia-on-mapping-cybersecurity-risk-within-healthcare</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/greg-garcia-on-mapping-cybersecurity-risk-within-healthcare</guid>
            <pubDate>Tue, 15 Oct 2024 10:43:00 +0000</pubDate>
            <description><![CDATA[Greg Garcia, the Executive Director for Cybersecurity of the Health Sector Coordinating Council, explains how the Change Healthcare ransomware attack disclosed in February 2024 presents the healthcare market with an opportunity to better understand risk to the overall sector. The industry must better understand process flows, where personal and medical information flows, and where the greatest risks are introduced. By mapping these risks, the industry can understand these dependencies and better protect them.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Daryl Haegley on Defending OT Against Advanced Cybersecurity Threats]]></title>
            <link>https://nexusconnect.io/videos/daryl-haegley-on-defending-ot-against-advanced-cybersecurity-threats</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/daryl-haegley-on-defending-ot-against-advanced-cybersecurity-threats</guid>
            <pubDate>Tue, 15 Oct 2024 10:40:00 +0000</pubDate>
            <description><![CDATA[Daryl Haegley, Technical Director, Control Systems Cybersecurity for the U.S. Air Force, brings his extensive federal cybersecurity experience to a discussion about defending operational technology (OT) against an evolving, modern threat landscape. APT groups such as Volt Typhoon, Sandworm, and others are targeting OT with greater frequency and with the hope of making a significant impact on critical infrastructure. Haegley explains the challenges CISOs face as they are increasingly charged with defending OT and industrial control systems (ICS), and offers his advice for these tense times.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Ashish Agarwal on OT Visibility as a Cybersecurity Enabler]]></title>
            <link>https://nexusconnect.io/videos/ashish-agarwal-on-ot-visibility-as-a-cybersecurity-enabler</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/ashish-agarwal-on-ot-visibility-as-a-cybersecurity-enabler</guid>
            <pubDate>Tue, 15 Oct 2024 10:37:00 +0000</pubDate>
            <description><![CDATA[Ashish Agarwal, Director Operational Technology at Agco, discusses the foundational need for complete visibility and asset inventory and how it enables the rest of a modern OT cybersecurity program. Agarwal explains what he believes are the biggest challenges of attaining complete visibility, how to overcome those, and how visibility informs the rest of the program.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Andrew Schiefelbein on Exposure Management for CPS Environments]]></title>
            <link>https://nexusconnect.io/videos/andrew-schiefelbein-on-exposure-management-for-cps-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/andrew-schiefelbein-on-exposure-management-for-cps-environments</guid>
            <pubDate>Tue, 15 Oct 2024 10:21:00 +0000</pubDate>
            <description><![CDATA[Andrew Schiefelbein, Director of Cyber and Risk at PwC, breaks down exposure management within cyber-physical systems (CPS) environments. Schiefelbein explains how an understanding of technical, process, and human exposures presents decision-makers with a data-driven perspective on how to best remediate risk within the environment. Exposure management, Schiefelbein says, must focus well beyond software and firmware vulnerability remediation, but must also concentrate on network design and supporting uptime and availability demands, secure remote access needs.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Charles Carmakal on Disruptive APT Attacks]]></title>
            <link>https://nexusconnect.io/videos/charles-carmakal-on-disruptive-apt-attacks</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/charles-carmakal-on-disruptive-apt-attacks</guid>
            <pubDate>Tue, 15 Oct 2024 10:10:00 +0000</pubDate>
            <description><![CDATA[Mandiant CTO Charles Carmakal explains strategic shifts in the operations of advanced persistent threat (APT) groups in their targeting of operational technology (OT) and critical infrastructure. Attacks are disruptive—and in some cases are being carried out in parallel with kinetic attacks, in Ukraine in particular. Carmakal also discusses the "red lines" of cyberspace and whether APTs and criminal organizations are respecting those.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Jim Miller on Establishing OT Cybersecurity Baselines for Factory Environments]]></title>
            <link>https://nexusconnect.io/videos/jim-miller-on-establishing-ot-cybersecurity-baselines-for-factory-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/jim-miller-on-establishing-ot-cybersecurity-baselines-for-factory-environments</guid>
            <pubDate>Tue, 15 Oct 2024 10:07:00 +0000</pubDate>
            <description><![CDATA[Jim Miller, Director of OT Cybersecurity for Magna, explains how distributed OT factory environments manage cybersecurity from cultural issues, to the need for proper network segmentation, and how to tune firewall rules in order to automate reviews. Miller explains how his team started with a set of basic security configurations that should be in place, how risk scores are calculated for network segments against a safe baseline, and how those scores illuminate risk and improve protection versus just improving firewall rules.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Adm.  Michael S. Rogers on Protecting Critical Infrastructure]]></title>
            <link>https://nexusconnect.io/videos/adm-michael-s-rogers-on-protecting-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/adm-michael-s-rogers-on-protecting-critical-infrastructure</guid>
            <pubDate>Tue, 15 Oct 2024 10:03:00 +0000</pubDate>
            <description><![CDATA[Former National Security Agency Director Adm. Michael S. Rogers (Ret. USN) explains how nation-state threat actors have evolved beyond reconnaissance and espionage in their activities, to a more offensive strategy where destructive malware is embedded within U.S. critical infrastructure and military networks. China's Volt Typhoon has taken this hard line and aggressive approach to a stage where it is actively exploiting vulnerabilities for access and embedded attack tools, likely to be executed in the event of physical conflict.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Anahi Santiago on Cybersecurity for Hospital Care at Home]]></title>
            <link>https://nexusconnect.io/videos/anahi-santiago-on-cybersecurity-for-hospital-care-at-home</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/anahi-santiago-on-cybersecurity-for-hospital-care-at-home</guid>
            <pubDate>Tue, 15 Oct 2024 09:59:00 +0000</pubDate>
            <description><![CDATA[ChristianaCare CISO Anahi Santiago explains her team's role in protecting her organization's Hospital Care at Home program. Patients in this program are not admitted to a hospital and instead receive full care in a home setting. This presents exponentially more challenges to extend a cybersecurity program to the patient's home. Santiago explains how medical systems are connected, data is securely transmitted, and the lifecycle of cybersecurity is managed. The key point, she said, is that cybersecurity has to be built into the fabric of this program in order to properly protect patient care and meet regulatory mandates.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Dr. Bilyana Lilly on Ukraine's Cybersecurity Resilience]]></title>
            <link>https://nexusconnect.io/videos/dr-bilyana-lilly-on-ukraines-cybersecurity-resilience</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/dr-bilyana-lilly-on-ukraines-cybersecurity-resilience</guid>
            <pubDate>Tue, 15 Oct 2024 09:56:00 +0000</pubDate>
            <description><![CDATA[Cybersecurity advisor and author Dr. Bilyana Lilly, an expert on Russian strategy, in particular its use of misinformation and disinformation, discusses how Ukraine's cybersecurity resilience has stood up against a constant barrage of attacks from Russia since that country's February 2022 invasion of Ukraine. Ukrainian cybersecurity experts have defended against attacks by Russia against their critical infrastructure using a combination of technology, partnerships, and an in-country volunteer army of hackers that have lent their expertise to their cause.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Kemba Walden on the Chevron Doctrine Reversal]]></title>
            <link>https://nexusconnect.io/videos/kemba-walden-on-the-chevron-doctrine-reversal</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/kemba-walden-on-the-chevron-doctrine-reversal</guid>
            <pubDate>Tue, 15 Oct 2024 09:52:00 +0000</pubDate>
            <description><![CDATA[Kemba Walden, President of the Paladin Global Institute and former acting United States National Cyber Director, discusses the impact on cybersecurity of the Supreme Court's decision to overturn the so-called Chevron Doctrine. The reversal paves the way for judicial challenges to regulatory decisions.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[US Government Expands Tech Restrictions to Safeguard Critical Infrastructure]]></title>
            <link>https://nexusconnect.io/articles/us-government-expands-tech-restrictions-to-safeguard-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/us-government-expands-tech-restrictions-to-safeguard-critical-infrastructure</guid>
            <pubDate>Mon, 30 Sep 2024 10:36:00 +0000</pubDate>
            <description><![CDATA[The U.S. Federal Government has restricted access to Chinese and Russian technology deployments in U.S. critical infrastructure, with recent action targeting software operating in connected vehicles and components in Chinese made cranes in operation at U.S. maritime ports.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CPS Security Leaders Convene on One Goal: Protect Mission-Critical Infrastructure]]></title>
            <link>https://nexusconnect.io/articles/cps-security-leaders-convene-on-one-goal-protect-mission-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cps-security-leaders-convene-on-one-goal-protect-mission-critical-infrastructure</guid>
            <pubDate>Wed, 25 Sep 2024 13:00:00 +0000</pubDate>
            <description><![CDATA[At Nexus Conference 2024, cybersecurity leaders in charge of protecting cyber-physical systems, prioritized three areas: cyber threat actors and APTs focusing on destructive attacks, pending litigation challenges and deregulation as a result of the Supreme Court's Chevron doctrine decision, and the inevitability of digital transformation and the cybersecurity challenges it raises to CPS environments.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[NIS2 Directive Must Be More Than a Compliance Exercise]]></title>
            <link>https://nexusconnect.io/articles/nis2-directive-must-be-more-than-a-compliance-exercise</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nis2-directive-must-be-more-than-a-compliance-exercise</guid>
            <pubDate>Thu, 19 Sep 2024 08:42:00 +0000</pubDate>
            <description><![CDATA[EU regulators hope that NIS2 will not turn out to be just another compliance effort simply but that it will prove successful in actually fortifying Europe's critical infrastructure against digital attacks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Putting SBOMs to Practical Use]]></title>
            <link>https://nexusconnect.io/articles/putting-sboms-to-practical-use</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/putting-sboms-to-practical-use</guid>
            <pubDate>Tue, 03 Sep 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[A software bill of materials (SBOM) lays the groundwork necessary to enhance software security, especially regarding the software supply chain security. Yet enterprises must do more than just deploy them within their environments to get the most out of their SBOMs. They must put them to practical use.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[5 Things Hospitals Can Do to Mitigate Threats of Ransomware]]></title>
            <link>https://nexusconnect.io/articles/5-things-hospitals-can-do-to-mitigate-threats-of-ransomware</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/5-things-hospitals-can-do-to-mitigate-threats-of-ransomware</guid>
            <pubDate>Thu, 29 Aug 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Mike Ratliff, AVP Security Engineering and Operations at Providence, writes about five steps healthcare delivery organizations should take to mitigate the risk of ransomware and extortion-based attacks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Alethe Denis on Social Engineering, Red-Teaming]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-alethe-denis-on-social-engineering-red-teaming</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-alethe-denis-on-social-engineering-red-teaming</guid>
            <pubDate>Tue, 27 Aug 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Alethe Denis, a senior security consultant at Bishop Fox, joins to discuss the ongoing effectiveness of open-source intelligence analysis and social engineering tactics as a precursor to larger intrusions against critical infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Alon Dankner on Extracting Private Crypto Keys from PLCs]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-alon-dankner-on-extracting-private-crypto-keys-from-plcs</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-alon-dankner-on-extracting-private-crypto-keys-from-plcs</guid>
            <pubDate>Wed, 21 Aug 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Alon Dankner of the Technion Institute in Israel explains his research into the Siemens S7 protocol and PLCs. A vulnerability uncovered during research allows an attacker to expose and steal private cryptographic keys by leveraging a severe vulnerability and configuration error.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Understanding the Risks of Open Source Software in Healthcare]]></title>
            <link>https://nexusconnect.io/articles/understanding-the-risks-of-open-source-software-in-healthcare</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/understanding-the-risks-of-open-source-software-in-healthcare</guid>
            <pubDate>Wed, 14 Aug 2024 10:01:00 +0000</pubDate>
            <description><![CDATA[Healthcare delivery organizations using open-source software experience a balance of development advantages and security tradeoffs. Visibility, oversight, and tracking the use of OSS is critical to reducing risks it introduces. SBOMs, meanwhile, can be an advantage, in particular with regard to vulnerability management.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[How Living-Off-The-Land Techniques Impact OT and ICS]]></title>
            <link>https://nexusconnect.io/articles/how-living-off-the-land-techniques-impact-ot-and-ics</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/how-living-off-the-land-techniques-impact-ot-and-ics</guid>
            <pubDate>Mon, 12 Aug 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In OT and ICS cybersecurity, living off the land (LOTL) techniques refer to the practice of attackers using the existing tools and processes in a target system to carry out their malicious activities. This approach is particularly dangerous because it allows the attacker to blend in with everyday activities, making detection significantly more challenging.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Noam Moshe on Extracting Forensic Data from Unitronics PLCs]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-extracting-forensic-data-from-unitronics-plcs</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-extracting-forensic-data-from-unitronics-plcs</guid>
            <pubDate>Thu, 08 Aug 2024 09:01:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Claroty Team82 researcher Noam Moshe explains the challenges involved in gathering attack forensic artifacts from OT devices, in this case, Unitronics PLCs that were exploited in 2023 in attacks against water facilities in the U.S. and Israel.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Alexander Antukh on Cyber Risk Quantification]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-alexander-antukh-on-cyber-risk-quantification</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-alexander-antukh-on-cyber-risk-quantification</guid>
            <pubDate>Mon, 05 Aug 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus Podcast, Alexander Antukh, the chief information security officer at AboitizPower, the Philippines’ largest owner and operator of renewable energy, discusses one path toward translating risk and losses into business terms: cyber risk quantification (CRQ).]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Judge Dismisses Most of SEC Case vs. SolarWinds; CISOs Must Remain Wary]]></title>
            <link>https://nexusconnect.io/articles/judge-dismisses-most-of-sec-case-vs-solarwinds-cisos-must-remain-wary</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/judge-dismisses-most-of-sec-case-vs-solarwinds-cisos-must-remain-wary</guid>
            <pubDate>Tue, 30 Jul 2024 14:00:00 +0000</pubDate>
            <description><![CDATA[CISOs remain at risk for potential securities fraud charges as public ‘security statements’ can still be used against them despite a New York judge's ruling that all but ended the SEC's case against SolarWinds and its CISO Tim Brown.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Vincente Diaz on Using AI for Malware Analysis]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-vincente-diaz-on-using-ai-for-malware-analysis</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-vincente-diaz-on-using-ai-for-malware-analysis</guid>
            <pubDate>Wed, 24 Jul 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Vincente Diaz, a threat intelligence strategist on Google’s VirusTotal team, explains how AI and ML engines are being used in VirusTotal’s malware analysis, and how those results differ from what a traditional AV engine's analysis might render.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Smart Manufacturing Requires Proactive Cybersecurity]]></title>
            <link>https://nexusconnect.io/articles/smart-manufacturing-requires-proactive-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/smart-manufacturing-requires-proactive-cybersecurity</guid>
            <pubDate>Mon, 22 Jul 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[If we are indeed at the full outset of Industry 4.0, the fourth industrial revolution, initiatives such as smart manufacturing will not truly succeed without keen awareness of new cybersecurity risks introduced by IT/OT connectivity and advanced technologies.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Ahmik Hindman on Patching OT and ICS]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-ahmik-hindman-on-patching-ot-and-ics</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-ahmik-hindman-on-patching-ot-and-ics</guid>
            <pubDate>Wed, 17 Jul 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[On the latest episode of the Nexus Podcast, Rockwell Automation Senior Network & Solution Consultant Ahmik Hindman joins to discuss patching and vulnerability management of operational technology (OT) and industrial control systems (ICS).]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CISO Unrest is an Opportunity]]></title>
            <link>https://nexusconnect.io/articles/ciso-unrest-is-an-opportunity</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/ciso-unrest-is-an-opportunity</guid>
            <pubDate>Thu, 11 Jul 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[On Nexus, former NSA Director Adm. Michael Rogers writes about the current legislative and personal liability changes that are impacting the CISO office. But Rogers urges security leaders to view these times as an opportunity to refine their business acumen and ensure cybersecurity is a priority across the enterprise.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Hardening Remote Access a Must for OT]]></title>
            <link>https://nexusconnect.io/articles/hardening-remote-access-a-must-for-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/hardening-remote-access-a-must-for-ot</guid>
            <pubDate>Mon, 08 Jul 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Increased investments in digital transformation are expanding operational technology (OT) attack surfaces. Organizations requiring enhanced remote access to industrial control systems and other OT devices must adequately secure them.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Dr. Bilyana Lilly on Information Warfare]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-dr-bilyana-lilly-on-information-warfare</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-dr-bilyana-lilly-on-information-warfare</guid>
            <pubDate>Tue, 02 Jul 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Dr. Bilyana Lilly, an expert on geopolitics and Russia’s codification of information warfare as a strategy, says that the war in Ukraine has only temporarily delayed Russia’s activity against the West in cyberspace. On the latest Claroty Nexus podcast, she reinforces the idea that despite the fact that Russia is operating under severe resource constraints, CISOs should be preparing for the inevitable ramp-up of cyberattacks against critical infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[The Cybersecurity Revolution at ASL Roma 1: From Traditional Solutions to HyperSOC]]></title>
            <link>https://nexusconnect.io/articles/the-cybersecurity-revolution-at-asl-roma-1-from-traditional-solutions-to-hypersoc</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-cybersecurity-revolution-at-asl-roma-1-from-traditional-solutions-to-hypersoc</guid>
            <pubDate>Thu, 20 Jun 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[ASL Roma 1, a public health provider in Rome, has distinguished itself in the global healthcare landscape over the past two years by implementing advanced cybersecurity strategies, moving toward a hyper convergent security model, the so-called HyperSOC, in response to the growing cyber attacks in the global healthcare sector.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Closing the Door on Third-Party Access Risks]]></title>
            <link>https://nexusconnect.io/articles/closing-the-door-on-third-party-access-risks</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/closing-the-door-on-third-party-access-risks</guid>
            <pubDate>Wed, 19 Jun 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Secure remote access for third parties is a growing demand within OT and ICS environments. CISOs must understand and mitigate the risk third-party access introduces by having visibility into these connections, limiting access when appropriate, and applying other mitigations.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Vinnie Liu on Offensive Security Testing During Incidents]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-vinnie-liu-on-offensive-security-testing-during-incidents</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-vinnie-liu-on-offensive-security-testing-during-incidents</guid>
            <pubDate>Tue, 18 Jun 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus Podcast, Bishop Fox CEO and Cofounder Vinnie Liu explains how offensive security specialists, including red teams, are working alongside incident response specialists during incidents, including ransomware attacks. Organizations in healthcare and other critical industries, for example, bring in offensive specialists in an attempt to find and lock down other exposures to avoid reinfections or separate intrusions that could lead to further data loss or reputational damage.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Diana Kelley on Securing AI Systems]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-diana-kelley-on-securing-ai-systems</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-diana-kelley-on-securing-ai-systems</guid>
            <pubDate>Wed, 12 Jun 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Diana Kelly, CISO at Protect AI, joins the Claroty Nexus Podcast to discuss how organizations can best introduce cybersecurity into the artificial intelligence (AI) and machine learning (ML) development lifecycles, and where the concept of MLSecOps fits into that same lifecycle.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Jennifer Minella on Converging IT/OT from the Ground Up]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-jennifer-minella-on-converging-it-ot-from-the-ground-up</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-jennifer-minella-on-converging-it-ot-from-the-ground-up</guid>
            <pubDate>Wed, 05 Jun 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Jennifer Minella, founder and principal advisor of Viszen Security, joins the Claroty Nexus podcast to share her experiences helping IT security specialists understand and succeed in converged IT/OT environments.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[How to Unify Colliding IT/OT Worlds]]></title>
            <link>https://nexusconnect.io/articles/how-to-unify-colliding-it-ot-worlds</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/how-to-unify-colliding-it-ot-worlds</guid>
            <pubDate>Tue, 04 Jun 2024 13:00:00 +0000</pubDate>
            <description><![CDATA[Digital transformation efforts promise increased connectivity of industrial operations through intelligent sensors and industrial Internet of Things (IIoT) devices, which enable real-time data flow between OT and IT systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Revolution, Risks of AI’s Transformation of Pharma Manufacturing]]></title>
            <link>https://nexusconnect.io/articles/revolution-risks-of-ais-transformation-of-pharma-manufacturing</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/revolution-risks-of-ais-transformation-of-pharma-manufacturing</guid>
            <pubDate>Mon, 03 Jun 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Integrating AI and ML into pharmaceutical processes brings risks and challenges, such as organizational change management challenges, technology integration issues, data privacy problems, and ethical dilemmas that require careful navigation.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[EPA Cybersecurity Warning to Water Systems Faces Challenges]]></title>
            <link>https://nexusconnect.io/articles/epa-cybersecurity-warning-to-water-systems-faces-challenges</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/epa-cybersecurity-warning-to-water-systems-faces-challenges</guid>
            <pubDate>Thu, 30 May 2024 09:14:00 +0000</pubDate>
            <description><![CDATA[According to an enforcement alert recently issued by the EPA regarding cybersecurity vulnerabilities in drinking water systems across the country, such attacks against community water systems are increasing in frequency and severity. These attacks enable threat actors to manipulate operational technology (OT) and disrupt water treatment, distribution, and storage.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Charles Blauner on the CISO’s Personal Risk Equation]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-charles-blauner-on-the-cisos-personal-risk-equation</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-charles-blauner-on-the-cisos-personal-risk-equation</guid>
            <pubDate>Wed, 29 May 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Team8 Operating Partner and CISO in Residence Charles Blauner joins the Claroty Nexus Podcast to discuss the personal liability risks facing chief information security officers (CISOs) of public companies, in light of the SEC's new cybersecurity disclosure laws and other regulations threatening the viability of the role and careers of security leaders.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[White House Resets Direction for Critical Infrastructure Protection]]></title>
            <link>https://nexusconnect.io/articles/white-house-resets-direction-for-critical-infrastructure-protection</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/white-house-resets-direction-for-critical-infrastructure-protection</guid>
            <pubDate>Tue, 28 May 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[The Biden administration's signing of a new National Security Memorandum sets a new course for critical infrastructure cybersecurity and signals that the era of best practices, self-attestations, and voluntary certifications is coming to its close. As the United States looks toward a future of minimum security requirements for critical infrastructure, NSM-22 is positioned to be the watershed moment that sets the regulatory gears in motion in the United States.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Mikko Hypponen on 10 Years of Corporate Ransomware]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mikko-hypponen-on-10-years-of-corporate-ransomware</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mikko-hypponen-on-10-years-of-corporate-ransomware</guid>
            <pubDate>Wed, 22 May 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Cybersecurity pioneer Mikko Hypponen joins the Nexus Podcast to discuss the last decade of corporate ransomware attacks, focusing on the evolution of extortion-based attacks to include data theft, remittance through cryptocurrency, and whether victim organizations should pay ransoms.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Examining Third-Party Supply-Chain Risks Around Secure Access]]></title>
            <link>https://nexusconnect.io/articles/examining-third-party-supply-chain-risks-around-secure-access</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/examining-third-party-supply-chain-risks-around-secure-access</guid>
            <pubDate>Tue, 21 May 2024 13:01:00 +0000</pubDate>
            <description><![CDATA[It’s incumbent upon the enterprise to manage third-party supply-chain relationships with cybersecurity as a foremost priority, in particular locking down access to critical systems and adequately managing and assigning privileged access to third parties.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Adm. Michael Rogers on Geopolitics and Defending Critical Infrastructure]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-adm-michael-rogers-on-geopolitics-and-defending-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-adm-michael-rogers-on-geopolitics-and-defending-critical-infrastructure</guid>
            <pubDate>Wed, 15 May 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Former National Security Agency Director Adm. Michael S. Rogers joins the Claroty Nexus for a discussion about the current legal, regulatory and threat landscape adding unprecedented complexity to CISOs regardless of industry.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Mitigating Exposures the Key to Cyber Resilience]]></title>
            <link>https://nexusconnect.io/articles/mitigating-exposures-a-key-to-cyber-resilience</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/mitigating-exposures-a-key-to-cyber-resilience</guid>
            <pubDate>Tue, 14 May 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Operational technology’s (OT) exposure to cyber threats extends beyond the confines of technical software and firmware vulnerabilities. The supply chain and insiders are two significant areas of concern, where risks can originate from third-party vendors or suppliers with inadequate cybersecurity measures or those inside the firewall with similarly privileged access.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[White House Signs Critical Infrastructure Memorandum, Details Remain Unclear]]></title>
            <link>https://nexusconnect.io/articles/white-house-signs-critical-infrastructure-memorandum-details-remain-unclear</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/white-house-signs-critical-infrastructure-memorandum-details-remain-unclear</guid>
            <pubDate>Mon, 13 May 2024 09:26:00 +0000</pubDate>
            <description><![CDATA[Cybersecurity experts are cautious about the new National Security Memorandum (NSM), which replaces the decade-old Presidential Policy Directive. Proponents say, will help strengthen the security of critical infrastructure within the United States, but because it's short on prescriptive details, security experts are unsure of the path forward.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Architecting Safety Using Cybersecurity Requirements and Assessments]]></title>
            <link>https://nexusconnect.io/articles/architecting-safety-using-cybersecurity-requirements-and-assessments</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/architecting-safety-using-cybersecurity-requirements-and-assessments</guid>
            <pubDate>Thu, 09 May 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Expert Don C. Weber writes that safety devices are within scope for cybersecurity risk assessments. This includes conducting high-level risk assessments to assemble documentation for specific Systems-under-Consideration (SuC) of the safety solution, performing a vulnerability assessment of the SuC, feeding the results into the detailed risk assessment to allow the risk management team to identify and address residual risks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Operational Technology Exposure: Beyond Software Vulnerabilities]]></title>
            <link>https://nexusconnect.io/articles/operational-technology-exposure-beyond-software-vulnerabilities</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/operational-technology-exposure-beyond-software-vulnerabilities</guid>
            <pubDate>Tue, 07 May 2024 13:00:00 +0000</pubDate>
            <description><![CDATA[OT and ICS asset owners must consider non-traditional OT exposures beyond software vulnerabilities—a comprehensive exposure management approach to risk reduction—to understand the multifaceted challenges and the proactive measures necessary to safeguard critical infrastructure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Abel Archundia on Complexity in Critical Infrastructure]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-abel-archundia-on-complexity-in-critical-infrastructure</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-abel-archundia-on-complexity-in-critical-infrastructure</guid>
            <pubDate>Thu, 02 May 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus Podcast, Istari Chief Technology Officer and Head of Advisory Abel Archundia joins to discuss the implications of complexity within critical infrastructure. Companies struggle with technical debt and are largely accumulated assets that are still part and parcel of their core businesses, and challenge their ability to proactively secure them and manage risk.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Adam Gluck on Industrial DevOps]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-adam-gluck-on-industrial-devops</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-adam-gluck-on-industrial-devops</guid>
            <pubDate>Thu, 25 Apr 2024 04:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Adam Gluck, founder and CEO of Copia Automation, describes his experiences with industrial DevOps, and why this is crucial as more cyber-physical systems come online and impact physical outcomes in the real world.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Change Healthcare Attack May Spur New Cybersecurity Laws]]></title>
            <link>https://nexusconnect.io/articles/change-healthcare-attack-may-spur-new-cybersecurity-laws</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/change-healthcare-attack-may-spur-new-cybersecurity-laws</guid>
            <pubDate>Tue, 23 Apr 2024 13:00:00 +0000</pubDate>
            <description><![CDATA[The Change Healthcare cyberattack has spurred the proposal of new legislation from Sen. Mark Warner to demand minimum cybersecurity standards of hospitals and healthcare delivery organizations, or face financial penalties.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[UK NCSC Urges OT/ICS Operators to Secure Cloud Migrations]]></title>
            <link>https://nexusconnect.io/articles/uk-ncsc-urges-ot-ics-operators-to-secure-cloud-migrations</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/uk-ncsc-urges-ot-ics-operators-to-secure-cloud-migrations</guid>
            <pubDate>Tue, 09 Apr 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[The UK's National Cyber Security Centre (NCSC) reacts to growing cloud implementations for operational technology, SCADA, and industrial control systems. The shift to cloud computing has caused the NCSC to be concerned that organizations aren't properly managing the new connectivity, including security boundaries and access control mechanisms.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Greg Garcia on the Change Healthcare Cyberattack]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-greg-garcia-on-the-change-healthcare-cyberattack</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-greg-garcia-on-the-change-healthcare-cyberattack</guid>
            <pubDate>Mon, 08 Apr 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus podcast, Greg Garcia, the executive director of the Healthcare and Public Health Sector Coordinating Council’s Cybersecurity Working Group, joins to discuss the Change Healthcare cyberattack, in particular where the industry stands in terms of recovery, and what can be done from a policy perspective to minimize the impact of such attacks in the future.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[FDA Sets Sights on Medical Device Vulnerability Management]]></title>
            <link>https://nexusconnect.io/articles/fda-sets-sights-on-medical-device-vulnerability-management</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/fda-sets-sights-on-medical-device-vulnerability-management</guid>
            <pubDate>Wed, 03 Apr 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In its most recent draft guidance to medical device makers, the U.S. Food & Drug Administration (FDA) detailed what the agency expects during the device premarket submission process around cybersecurity and the handling of vulnerabilities.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Think Like an Attacker: Be Frogger]]></title>
            <link>https://nexusconnect.io/articles/think-like-an-attacker-be-frogger</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/think-like-an-attacker-be-frogger</guid>
            <pubDate>Mon, 01 Apr 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[New York Presbyterian CISO John Frushour writes about how a cyber mesh architecture can help defenders map out how an attacker may traverse a modern enterprise network, and by using the concept of a directed mesh, build a framework of security controls that reduces exposure.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[UK Critical Infrastructure Sectors Brace for Enhanced Cyber Assessment Framework]]></title>
            <link>https://nexusconnect.io/articles/uk-critical-infrastructure-sectors-brace-for-enhanced-cyber-assessment-framework</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/uk-critical-infrastructure-sectors-brace-for-enhanced-cyber-assessment-framework</guid>
            <pubDate>Mon, 25 Mar 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[The U.K.'s enhanced Cyber Assessment Framework is designed to help critical infrastructure organizations comprehensively assess and improve their ability to defend against, and respond to, cyberattacks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Blunting the Risks of Private-Sector Ownership of CI]]></title>
            <link>https://nexusconnect.io/articles/blunting-the-risks-of-private-sector-ownership-of-ci</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/blunting-the-risks-of-private-sector-ownership-of-ci</guid>
            <pubDate>Tue, 19 Mar 2024 13:00:00 +0000</pubDate>
            <description><![CDATA[Former NSA Director Adm. Michael Rogers writes that the division between private- and public-sector ownership of critical infrastructure in the U.S. remains a sticking point impacting the cybersecurity of these targets for state-sponsored adversaries such as APTs.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Applauding A Codified Strategy for CPS Resilience]]></title>
            <link>https://nexusconnect.io/articles/applauding-a-codified-strategy-for-cps-resilience</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/applauding-a-codified-strategy-for-cps-resilience</guid>
            <pubDate>Mon, 11 Mar 2024 14:00:00 +0000</pubDate>
            <description><![CDATA[The “Report to the President: Strategy for Cyber-Physical Resilience: Fortifying Our Critical Infrastructure for a Digital World,” reaffirms that cyber-resilience-by-design should be the standard and urges a coalition of government leaders and private sector critical infrastructure asset owners and operators to refocus their energies to build resilient cyber-physical systems (CPS) that are designed to withstand attack.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Ryan Pickren on New Web-Based PLC Malware Research]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-ryan-pickren-on-new-web-based-plc-malware-research</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-ryan-pickren-on-new-web-based-plc-malware-research</guid>
            <pubDate>Thu, 07 Mar 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus podcast, researcher Ryan Pickren explains a new web-based attack against programmable logic controllers (PLCs) that uses malicious JavaScript to attack the front end of an embedded web server prevalent in modern PLCs.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Three Ways to Foster Collaboration, Understanding Between IT, OT Security, Part 2]]></title>
            <link>https://nexusconnect.io/articles/three-ways-to-foster-collaboration-understanding-between-it-ot-security-part-2</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/three-ways-to-foster-collaboration-understanding-between-it-ot-security-part-2</guid>
            <pubDate>Tue, 05 Mar 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Expert Dan Ricci explains how IT security and operational technology engineers and asset operators must collaborate to properly address risk within industrial environments.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[What HHS's New Cybersecurity Performance Goals Mean to Healthcare Organizations]]></title>
            <link>https://nexusconnect.io/articles/what-hhss-new-cybersecurity-performance-goals-mean-to-healthcare-organizations</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/what-hhss-new-cybersecurity-performance-goals-mean-to-healthcare-organizations</guid>
            <pubDate>Wed, 28 Feb 2024 14:00:00 +0000</pubDate>
            <description><![CDATA[The U.S. Dept of Health and Human Services Cybersecurity Performance Goals sets expectations on healthcare delivery organizations to protect their data and technology environments.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Volt Typhoon Takedown Highlights Critical Infrastructure Security Complexities]]></title>
            <link>https://nexusconnect.io/articles/volt-typhoon-takedown-highlights-critical-infrastructure-security-complexities</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/volt-typhoon-takedown-highlights-critical-infrastructure-security-complexities</guid>
            <pubDate>Thu, 22 Feb 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[The Volt Typhoon takedown highlights the challenges the world faces in defending against such threats and the private industry/government collaboration that's necessary to succeed.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[What IT Cybersecurity Teams Need to Know about OT Vulnerabilities (Part 1)]]></title>
            <link>https://nexusconnect.io/articles/what-it-cybersecurity-teams-need-to-know-about-ot-vulnerabilities-part-1</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/what-it-cybersecurity-teams-need-to-know-about-ot-vulnerabilities-part-1</guid>
            <pubDate>Tue, 20 Feb 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[Understanding the nuances of OT cybersecurity vulnerabilities becomes imperative for IT cybersecurity teams to develop comprehensive defense strategies that safeguard both IT and OT environments.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Mike Rogers on CISO Exposure During Incidents]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mike-rogers-on-ciso-exposure-during-incidents</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mike-rogers-on-ciso-exposure-during-incidents</guid>
            <pubDate>Thu, 15 Feb 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus podcast, Hormel Foods CISO and Director of Security and Compliance Mike Rogers explains that CISOs should understand their level of exposure in the event of a cybersecurity incident and proactively seek personal liability protection.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Don’t Call it an Incident–Yet: Managing Liability in a New Era of Incident Reporting and Compliance]]></title>
            <link>https://nexusconnect.io/articles/dont-call-it-an-incident-yet-managing-liability-in-a-new-era-of-incident-reporting-and-compliance</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/dont-call-it-an-incident-yet-managing-liability-in-a-new-era-of-incident-reporting-and-compliance</guid>
            <pubDate>Mon, 12 Feb 2024 12:00:00 +0000</pubDate>
            <description><![CDATA[With more than a dozen cybersecurity incident notification laws in effect around the world, it’s time for Chief Information Security Officers (CISOs) and incident response teams to think about the consequences of declaring an incident: timing is everything.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Getting Strategic Against Technical Debt in OT]]></title>
            <link>https://nexusconnect.io/articles/getting-strategic-against-technical-debt-in-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/getting-strategic-against-technical-debt-in-ot</guid>
            <pubDate>Mon, 29 Jan 2024 12:00:00 +0000</pubDate>
            <description><![CDATA[Technical debt in OT leads to increased operations costs as teams fight to maintain outdated systems, and security teams struggle to keep those same systems secure, often through compensating controls.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Team82 Answers More of your Cybersecurity Research Questions]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-team82-answers-more-of-your-cybersecurity-research-questions</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-team82-answers-more-of-your-cybersecurity-research-questions</guid>
            <pubDate>Thu, 25 Jan 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus podcast, Team82’s Noam Moshe discusses state actor targeting of OT, why it’s so challenging to develop ransomware for OT and industrial control systems, and the mitigation strategies available to defenders of cyber-physical systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[A Strategic Necessity: Compensating Controls in ICS, OT]]></title>
            <link>https://nexusconnect.io/articles/a-strategic-necessity-compensating-controls-in-ics-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/a-strategic-necessity-compensating-controls-in-ics-ot</guid>
            <pubDate>Wed, 17 Jan 2024 16:00:00 +0000</pubDate>
            <description><![CDATA[An inability to patch OT and ICS makes it critical that effective defenses in the form of compensating controls are in place that mitigate the risks associated with running those unpatched systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Juan Piacquadio on Securing Pharma 4.0]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-juan-piacquadio-on-securing-pharma-4-0</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-juan-piacquadio-on-securing-pharma-4-0</guid>
            <pubDate>Mon, 15 Jan 2024 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus podcast, Juan Piacquadio, chief information officer of Phlow Corp., describes the innovative and competitive edge the implementation of Pharma 4.0 brings to the industry, and how to best secure it.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CISO Strategies in a Time of Geopolitical, Kinetic Conflict]]></title>
            <link>https://nexusconnect.io/articles/ciso-strategies-in-a-time-of-geopolitical-kinetic-conflict</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/ciso-strategies-in-a-time-of-geopolitical-kinetic-conflict</guid>
            <pubDate>Tue, 09 Jan 2024 13:00:00 +0000</pubDate>
            <description><![CDATA[CISOs must understand that their organizations cannot hide in obscurity during kinetic geopolitical conflicts, and more importantly, that it’s not only their IT environment that is at risk, but also any cyber-physical systems that are connected and managed online.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: David Elfering on CISOs and Cyber Liability Insurance]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-david-elfering-on-cisos-and-cyber-liability-insurance</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-david-elfering-on-cisos-and-cyber-liability-insurance</guid>
            <pubDate>Thu, 04 Jan 2024 10:29:00 +0000</pubDate>
            <description><![CDATA[Carrix security executive David Elfering joins the Nexus podcast to discuss cyber liability insurance, including whether carrier cybersecurity requirements align with risk reduction, some of the red flags that can imperil coverage or claims, and how cyber insurance providers are looking at geopolitical conflict.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[OT Patch Management Truths]]></title>
            <link>https://nexusconnect.io/articles/ot-patch-management-truths</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/ot-patch-management-truths</guid>
            <pubDate>Wed, 20 Dec 2023 09:18:00 +0000</pubDate>
            <description><![CDATA[Patching and updating operational technology and industrial control systems introduces complexity around an intolerance of downtime and proprietary protocols that inhibits timely updates. CISOs used to IT's regular patching cycles must adjust vulnerability management processes.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Srinivas Tummalapenta on the Cybersecurity Potential of AI]]></title>
            <link>https://nexusconnect.io/videos/srinivas-tummalapenta-on-the-cybersecurity-potential-of-ai</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/srinivas-tummalapenta-on-the-cybersecurity-potential-of-ai</guid>
            <pubDate>Thu, 14 Dec 2023 11:40:00 +0000</pubDate>
            <description><![CDATA[Srinivas Tummalapenta, Distinguished Engineer & CTO, IBM Consulting Cybersecurity Services, discusses the applications of AI and cybersecurity, in particular in its ability to reduce alerting noise while allowing human analysts to focus on high-value incidents.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[The Purdue Model's Risky Blindspot]]></title>
            <link>https://nexusconnect.io/articles/the-purdue-models-risky-blindspot</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-purdue-models-risky-blindspot</guid>
            <pubDate>Wed, 13 Dec 2023 10:45:00 +0000</pubDate>
            <description><![CDATA[The Purdue Model for ICS identifies crossover points at Level 3 and 4 that could be abused by attackers to access both OT and IT networks. Defenders must view these environments in their totality and apply cybersecurity tools accordingly.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Team82 Answers Your Questions]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-team82-answers-your-questions</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-team82-answers-your-questions</guid>
            <pubDate>Thu, 07 Dec 2023 09:17:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus podcast, Claroty Team82 Director of Vulnerability Research Sharon Brizinov and Vulnerability Researcher Noam Moshe discuss their research process, the technical resources at their disposal, and the threat landscape.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus 2023 in Miami]]></title>
            <link>https://nexusconnect.io/videos/nexus-2023-in-miami</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/nexus-2023-in-miami</guid>
            <pubDate>Mon, 27 Nov 2023 11:54:00 +0000</pubDate>
            <description><![CDATA[Relive the highlights of Nexus 2023, Claroty's annual cybersecurity conference for CISO and security leaders responsible for the safety of cyber-physical systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Contentious Debates in Wake of SEC Action Against SolarWinds, CISO]]></title>
            <link>https://nexusconnect.io/articles/contentious-debates-in-wake-of-sec-action-against-solarwinds-ciso</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/contentious-debates-in-wake-of-sec-action-against-solarwinds-ciso</guid>
            <pubDate>Wed, 15 Nov 2023 10:04:00 +0000</pubDate>
            <description><![CDATA[Contentious debates have emerged about the impact of the SEC's charges against SolarWinds and its CISO Timothy Brown, who facing fraud charges and allegations of falsifying the state of SolarWinds' security.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Michael Rogers on Managing Risk and Digital Transformation]]></title>
            <link>https://nexusconnect.io/videos/michael-rogers-on-managing-risk-and-digital-transformation</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/michael-rogers-on-managing-risk-and-digital-transformation</guid>
            <pubDate>Tue, 14 Nov 2023 14:37:00 +0000</pubDate>
            <description><![CDATA[Michael Rogers, CISO and Director of Information Security and Compliance, at Hormel explains how his role as a security leader has changed as digital transformation has enveloped his organization and the food and beverage industry.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Michael MacKenzie on Digital Transformation Success Stories]]></title>
            <link>https://nexusconnect.io/videos/michael-mackenzie-on-digital-transformation-success-stories</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/michael-mackenzie-on-digital-transformation-success-stories</guid>
            <pubDate>Tue, 14 Nov 2023 14:36:00 +0000</pubDate>
            <description><![CDATA[AWS GM, Enterprise and Industrial IoT Michael MacKenzie explains the keys to being a digital transformation success story, including obtaining the necessary buy-in from executives and asset operators, as well as the processes and technologies involved.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Juan Piacquadio on Supply Chain Cybersecurity Risks]]></title>
            <link>https://nexusconnect.io/videos/juan-piacquadio-on-supply-chain-cybersecurity-risks</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/juan-piacquadio-on-supply-chain-cybersecurity-risks</guid>
            <pubDate>Tue, 14 Nov 2023 12:40:00 +0000</pubDate>
            <description><![CDATA[Juan Piacquadio, CIO of pharmaceutical giant Phlow Corp., explains how cyberattacks against critical infrastructure supply chains are disruptive to not only the business but critical services. He also identifies three things driving cybersecurity investments across industries, and how generally, organizations under-invest in cybersecurity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[John Frushour on Building an ‘Identity Culture’]]></title>
            <link>https://nexusconnect.io/videos/john-frushour-on-building-an-identity-culture</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/john-frushour-on-building-an-identity-culture</guid>
            <pubDate>Tue, 14 Nov 2023 12:34:00 +0000</pubDate>
            <description><![CDATA[John Frushour, CISO of New York Presbyterian Hospital, discusses the identity and access control challenges facing security leaders as cyber-physical systems are connected online in growing numbers. Frushour stresses the need for an “identity culture” and the attributes for people, technology, and processes that must be enriched to influence business processes.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Carraig Stanwyck on AI for Adaptive Defense]]></title>
            <link>https://nexusconnect.io/videos/carraig-stanwyck-on-ai-for-adaptive-defense</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/carraig-stanwyck-on-ai-for-adaptive-defense</guid>
            <pubDate>Tue, 14 Nov 2023 11:48:00 +0000</pubDate>
            <description><![CDATA[Carraig Stanwyck, VP Global Cybersecurity at Avnet, explains how artificial intelligence and machine learning is being used for adaptive defenses that learn and adjust to active threats in real time, and also how adversaries are using AI to develop new attacks and exploit new attack vectors.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Brett Harris on Clinical Engineering Risk Management]]></title>
            <link>https://nexusconnect.io/videos/brett-harris-on-clinical-engineering-risk-management</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/brett-harris-on-clinical-engineering-risk-management</guid>
            <pubDate>Tue, 14 Nov 2023 11:18:00 +0000</pubDate>
            <description><![CDATA[Brett Harris, Cybersecurity Officer at Siemens Healthineers, describes how risk must be part and parcel of clinical engineering organizations. Hospitals currently have a disconnect between clinical engineers and biomedical professionals who understand clinical workflows and how medical devices fit into their environments, but lack the cybersecurity expertise required to protect those systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Dr. Bilyana Lilly on Russian Misinformation Campaigns]]></title>
            <link>https://nexusconnect.io/videos/dr-bilyana-lilly-on-russian-misinformation-campaigns</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/dr-bilyana-lilly-on-russian-misinformation-campaigns</guid>
            <pubDate>Tue, 14 Nov 2023 11:12:00 +0000</pubDate>
            <description><![CDATA[Russia foreign policy and misinformation expert Dr. Bilyana Lilly describes how Russia has codified its strategy of misinformation and disinformation in order to create chaos in the West.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Anahi Santiago on Healthcare Cybersecurity in a Connected World]]></title>
            <link>https://nexusconnect.io/videos/anahi-santiago-on-healthcare-cybersecurity-in-a-connected-world</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/anahi-santiago-on-healthcare-cybersecurity-in-a-connected-world</guid>
            <pubDate>Tue, 14 Nov 2023 10:54:00 +0000</pubDate>
            <description><![CDATA[Anahi Santiago, CISO at Christiana Care, explains how the role of healthcare security leaders has changed as medical devices are connected to the internet, and patient care moves online in terms of remote patient monitoring, diagnostic care, and patient information exchanges.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Cristin Flynn Goodwin on the SEC Cybersecurity Rules]]></title>
            <link>https://nexusconnect.io/videos/cristin-flynn-goodwin-on-the-sec-cybersecurity-rules</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/cristin-flynn-goodwin-on-the-sec-cybersecurity-rules</guid>
            <pubDate>Tue, 14 Nov 2023 10:42:00 +0000</pubDate>
            <description><![CDATA[Cristin Flynn Goodwin, attorney and founder of Advancing Cyber, describes the U.S. Securities and Exchange Commission’s new cybersecurity rules and their potential impact on CISOs of publicly traded companies.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Adm. Michael Rogers on DoD Compliance with NDAA Section 1505]]></title>
            <link>https://nexusconnect.io/videos/adm-michael-rogers-on-dod-compliance-with-ndaa-section-1505</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/adm-michael-rogers-on-dod-compliance-with-ndaa-section-1505</guid>
            <pubDate>Tue, 14 Nov 2023 10:25:00 +0000</pubDate>
            <description><![CDATA[Adm. Michael S. Rogers USN (Ret.) describes some of the challenges facing the U.S. Department of Defense and its compliance with Section 1505 of the National Defense Authorization Act.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Do U.S. Boards of Directors Have Adequate CISO Representation?]]></title>
            <link>https://nexusconnect.io/articles/do-u-s-boards-of-directors-have-adequate-ciso-representation</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/do-u-s-boards-of-directors-have-adequate-ciso-representation</guid>
            <pubDate>Tue, 14 Nov 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Boards of directors contain members with varying levels of cybersecurity expertise, something that must change as executives must broaden their understanding of risk to include cybersecurity threats.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Mandiant on Sandworm APT OT Attacks in Ukraine]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mandiant-on-sandworm-apt-ot-attacks-in-ukraine</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mandiant-on-sandworm-apt-ot-attacks-in-ukraine</guid>
            <pubDate>Fri, 10 Nov 2023 15:16:00 +0000</pubDate>
            <description><![CDATA[Mandiant and Google Cloud Head of Emerging Threats and Analytics Nathan Brubaker joins to discuss his team's findings and provide more context on the growing capabilities of Sandworm and its targeting of OT.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Managing Clinical Engineering Supply Chain Risk, Part 2]]></title>
            <link>https://nexusconnect.io/articles/managing-clinical-engineering-supply-chain-risk-part-2</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/managing-clinical-engineering-supply-chain-risk-part-2</guid>
            <pubDate>Wed, 08 Nov 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Providence CISO Adam Zoller explains the technical and human resources required to properly manage clinical engineering supply chain risk and cybersecurity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Clinical Engineering Vendor Management Wins, Part 1]]></title>
            <link>https://nexusconnect.io/articles/clinical-engineering-vendor-management-wins</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/clinical-engineering-vendor-management-wins</guid>
            <pubDate>Wed, 01 Nov 2023 15:00:00 +0000</pubDate>
            <description><![CDATA[Third-party risk management is essential to ensure clinical engineering cybersecurity. As organizations increasingly rely on third-party vendors and suppliers to provide critical services, it is more important than ever to understand and manage the risks associated with these relationships.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Don Weber on Security Culture in Control Environments; STAR Methodology]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-don-weber-on-security-culture-in-control-environments-star-methodology</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-don-weber-on-security-culture-in-control-environments-star-methodology</guid>
            <pubDate>Mon, 30 Oct 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[In the latest Claroty Nexus podcast, Don Weber explains the need for a culture shift within control environments to embrace cybersecurity expertise. He also discusses the IACS STAR Methodology and risk assessment calculator.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Hardening Open Source Software Use in Critical Infrastructure Environments]]></title>
            <link>https://nexusconnect.io/articles/hardening-open-source-software-use-in-critical-infrastructure-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/hardening-open-source-software-use-in-critical-infrastructure-environments</guid>
            <pubDate>Tue, 24 Oct 2023 15:00:00 +0000</pubDate>
            <description><![CDATA[OSS may introduce cybersecurity risks if equipment providers and critical infrastructure operators don't manage it properly. Examples include the lack of transparency in using open source by OT/ICS equipment makers and the amount of OSS tools deployed by end users.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[NSA's ELITEWOLF Signatures Detect Malicious Activity in OT Environments]]></title>
            <link>https://nexusconnect.io/articles/nsas-elitewolf-signatures-detect-malicious-activity-in-ot-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/nsas-elitewolf-signatures-detect-malicious-activity-in-ot-environments</guid>
            <pubDate>Thu, 19 Oct 2023 13:52:00 +0000</pubDate>
            <description><![CDATA[The National Security Agency's (NSA) ELITEWOLF intrusion detection signatures and analytics are designed to help owners and operators of OT systems defend their systems against cybersecurity threats.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Hardening Medical Devices’ Soft and Risky Security Underbelly: Firmware]]></title>
            <link>https://nexusconnect.io/articles/hardening-medical-devices-soft-and-risky-security-underbelly-firmware</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/hardening-medical-devices-soft-and-risky-security-underbelly-firmware</guid>
            <pubDate>Thu, 12 Oct 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Firmware cybersecurity must be elevated among medical device manufacturers and defenders of healthcare networks. Successful attacks against this low-level hardware code can enable persistence for the attacker and complete control over the device.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: MITRE on Caldera for OT]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mitre-on-caldera-for-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mitre-on-caldera-for-ot</guid>
            <pubDate>Tue, 10 Oct 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[A new extension to the open source Caldera adversary emulation platform tailored for threats to operational technology (OT) called Caldera for OT features plugins for dnp, Modbus, and BACnet, three popular OT protocols that are prevalent in many commercial products regardless of industry.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[AI Holds Promise for Protecting OT Environments]]></title>
            <link>https://nexusconnect.io/articles/ai-holds-promise-for-protecting-ot-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/ai-holds-promise-for-protecting-ot-environments</guid>
            <pubDate>Wed, 04 Oct 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Industrial environments may benefit from the application of artificial intelligence and machine learning to the cybersecurity of operational technology and industrial control systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[FDA's Refuse to Accept Policy is Here]]></title>
            <link>https://nexusconnect.io/articles/fdas-refuse-to-accept-policy-is-here</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/fdas-refuse-to-accept-policy-is-here</guid>
            <pubDate>Thu, 28 Sep 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[The FDA's Refuse to Accept policy mandates that medical device manufacturers submit premarket their plans for postmarket vulnerability management, including regular patching, and submit a software bill of materials (SBOM).]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[How to Get a Job in Cybersecurity–A Survival Guide]]></title>
            <link>https://nexusconnect.io/articles/how-to-get-a-job-in-cybersecurity-a-survival-guide</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/how-to-get-a-job-in-cybersecurity-a-survival-guide</guid>
            <pubDate>Tue, 26 Sep 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[A cybersecurity career path has many roads. New York Presbyterian Hospital CISO John Frushour shares his perspective on what it takes to find and succeed in cybersecurity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Overcoming Inherent Design and Security Limitations of OT Devices]]></title>
            <link>https://nexusconnect.io/articles/overcoming-inherent-design-and-security-limitations-of-ot-devices</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/overcoming-inherent-design-and-security-limitations-of-ot-devices</guid>
            <pubDate>Tue, 19 Sep 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[To combat cyber-physical systems vulnerabilities CISOs should prioritize secure infrastructure designs, enhance remote access safety, maintain continuous security surveillance and assessments, employ strategic patch management, and implement comprehensive backup strategies.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Recapping Recent Strides in Medical Device Cybersecurity]]></title>
            <link>https://nexusconnect.io/articles/recapping-recent-strides-in-medical-device-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/recapping-recent-strides-in-medical-device-cybersecurity</guid>
            <pubDate>Thu, 14 Sep 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Connected medical device cybersecurity has benefited from new FDA mandates, input from security leaders in the industry, and medical device manufacturers.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Jim LaBonty on Building an OT Security Stack]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-jim-labonty-on-building-an-ot-security-stack</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-jim-labonty-on-building-an-ot-security-stack</guid>
            <pubDate>Tue, 12 Sep 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Retired Pfizer chief information security officer Jim LaBonty describes the need for a specialized OT security stack that feeds into a converged IT SOC.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Protecting the CISO During Incident Investigations]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-protecting-the-ciso-during-breach-investigations</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-protecting-the-ciso-during-breach-investigations</guid>
            <pubDate>Wed, 30 Aug 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Stephen Reynolds, a partner at the law firm of McDermott, Will, and Emery, discusses the personal, criminal liability that can attach to individuals and executives during investigations, and offers some practical advice for CISOs.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[SBOMs Promise Big Improvements in Healthcare Security, but Challenges Remain]]></title>
            <link>https://nexusconnect.io/articles/sboms-promise-big-improvements-in-healthcare-security-but-challenges-remain</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/sboms-promise-big-improvements-in-healthcare-security-but-challenges-remain</guid>
            <pubDate>Mon, 28 Aug 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[SBOMs help address software security, and healthcare is in acute need because vulnerable connected medical devices and systems pose a risk to patient safety if vulnerability management teams aren't aware of a flawed component.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Team82 on NAS Research, OPC UA Exploit Framework]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-team82-on-nas-research-opc-ua-exploit-framework</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-team82-on-nas-research-opc-ua-exploit-framework</guid>
            <pubDate>Tue, 22 Aug 2023 04:00:00 +0000</pubDate>
            <description><![CDATA[Team82’s extensive research into network attached storage devices and the ubiquitous OPC UA industrial protocol came to a head recently in Las Vegas with a pair of presentations at Black Hat USA and DEF CON.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Conducting Gap Assessments to Secure Control Environments’ Cloud-based Solutions]]></title>
            <link>https://nexusconnect.io/articles/conducting-gap-assessments-to-secure-control-environments-cloud-based-solutions</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/conducting-gap-assessments-to-secure-control-environments-cloud-based-solutions</guid>
            <pubDate>Mon, 21 Aug 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[The industrial and automation industry is rapidly moving toward cloud technologies, and owners and operators should conduct gap assessments to understand their risks and shared responsibilities with providers.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[OT Asset Visibility: A Foundation for Secure Operations]]></title>
            <link>https://nexusconnect.io/articles/ot-asset-visibility-a-foundation-for-secure-operations</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/ot-asset-visibility-a-foundation-for-secure-operations</guid>
            <pubDate>Wed, 16 Aug 2023 10:00:00 +0000</pubDate>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Bishop Fox on OSDP Vulnerabilities and Physical Security]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-bishop-fox-on-osdp-vulnerabilities-and-physical-security</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-bishop-fox-on-osdp-vulnerabilities-and-physical-security</guid>
            <pubDate>Wed, 16 Aug 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus podcast, recorded in Las Vegas during Black Hat, Petro and Vargas explain numerous attacks that leverage weaknesses in the protocol itself that may not be easily rectified, in addition to implementation and configuration errors, and vulnerabilities, that may be effectively mitigated with some work by vendors of readers and controllers.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Resilience, Recovery Strategies to Combat Ransomware and Extortion]]></title>
            <link>https://nexusconnect.io/articles/resilience-recovery-strategies-to-combat-ransomware-and-extortion</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/resilience-recovery-strategies-to-combat-ransomware-and-extortion</guid>
            <pubDate>Mon, 14 Aug 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Resilience has to be the way forward when it comes to ransomware and other extortion-based attacks. Strategically architect networks that can not only detect attacks, but also shorten recovery times in the event of a successful intrusion.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Why ICS Vulnerabilities Do Matter]]></title>
            <link>https://nexusconnect.io/articles/why-ics-vulnerabilities-do-matter</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/why-ics-vulnerabilities-do-matter</guid>
            <pubDate>Tue, 08 Aug 2023 12:00:00 +0000</pubDate>
            <description><![CDATA[Industrial control system vulnerabilities matter because of their potential impact to public safety and critical service delivery if exploited. It's important to implement OT vulnerability management programs in the context of understanding your threat model and available patches and mitigations.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-jennifer-lyn-walker-on-cybersecurity-risks-in-the-water-sector</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-jennifer-lyn-walker-on-cybersecurity-risks-in-the-water-sector</guid>
            <pubDate>Mon, 07 Aug 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Jennifer Lyn Walker, Director of Infrastructure Cyber Defense for the WaterISAC, discusses the current state of cybersecurity within the water sector, and explores the disparity in security talent, technology, and funding available across the sector.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[CISOs Play a Critical Role in Compliance with New SEC Cybersecurity Disclosure Rules]]></title>
            <link>https://nexusconnect.io/articles/cisos-play-a-critical-role-in-compliance-with-new-sec-cybersecurity-disclosure-rules</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cisos-play-a-critical-role-in-compliance-with-new-sec-cybersecurity-disclosure-rules</guid>
            <pubDate>Tue, 01 Aug 2023 16:44:00 +0000</pubDate>
            <description><![CDATA[The Securities and Exchange Commission's (SEC) new cybersecurity rules create concern among CISOs and security experts about what will ultimately constitute a material cyber incident.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Bulk Power System Risks Span Complexity, Vulnerabilities, Advanced Actors]]></title>
            <link>https://nexusconnect.io/articles/bulk-power-system-risks-span-complexity-vulnerabilities-advanced-actors</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/bulk-power-system-risks-span-complexity-vulnerabilities-advanced-actors</guid>
            <pubDate>Tue, 25 Jul 2023 16:00:00 +0000</pubDate>
            <description><![CDATA[The inherent security of new devices and software associated with managing the grid is shipping natively with better code and design quality, cutting down on commodity vulnerabilities.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Kathleen Moriarty on CIS’ IoT Cybersecurity Guidance]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-kathleen-moriarty-on-cis-iot-cybersecurity-guidance</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-kathleen-moriarty-on-cis-iot-cybersecurity-guidance</guid>
            <pubDate>Mon, 17 Jul 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Center for Internet Security CTO Kathleen Moriarty joins the Nexus podcast to discuss CIS' new IoT Embedded Security Guidance document, which provides IoT developers and DevOps pros with security guidance as they choose their protocol stack.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Medical Device Visibility: Tracking What Must Be Secured]]></title>
            <link>https://nexusconnect.io/articles/medical-device-visibility-tracking-what-must-be-secured</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/medical-device-visibility-tracking-what-must-be-secured</guid>
            <pubDate>Wed, 12 Jul 2023 08:41:00 +0000</pubDate>
            <description><![CDATA[An accurate medical device asset inventory enables security teams to ensure that devices are adequately secured and monitored. Asset visibility also helps to improve overall operations and ensure patient safety.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Walter Risi on the CISO’s Journey from IT to OT]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-walter-risi-kpmg-on-ciso-s-journey-from-it-to-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-walter-risi-kpmg-on-ciso-s-journey-from-it-to-ot</guid>
            <pubDate>Mon, 10 Jul 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Walter Risi, the Global OT Lead and the Technology and Cyber Security Consulting leader at KPMG in Argentina, discusses the CISO’s journey from IT to OT and brings his extensive experience to the conversation.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Inside the EU's Toughened NIS2 Cybersecurity Directive]]></title>
            <link>https://nexusconnect.io/articles/inside-the-eu-s-toughened-nis2-cybersecurity-directive</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/inside-the-eu-s-toughened-nis2-cybersecurity-directive</guid>
            <pubDate>Tue, 27 Jun 2023 13:00:00 +0000</pubDate>
            <description><![CDATA[NIS2 addresses limitations from NIS1 where some areas of improvement were needed to counter risk introduced by digital transformation and by evolving cyber threats, that exposed a lack of resilience within systems supporting businesses in the EU.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Cyber-Informed Engineering: A Way Toward More Resilient OT Systems]]></title>
            <link>https://nexusconnect.io/articles/cyber-informed-engineering-a-way-toward-more-resilient-ot-systems</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cyber-informed-engineering-a-way-toward-more-resilient-ot-systems</guid>
            <pubDate>Thu, 22 Jun 2023 13:00:00 +0000</pubDate>
            <description><![CDATA[Cyber-informed engineering ensures the design, manufacture, and deployment of new OT and critical infrastructure assets — enough that these assets are reasonably secure from cyberattacks and remain reliable and resilient.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Is Ransomware Still Sexy?]]></title>
            <link>https://nexusconnect.io/articles/is-ransomware-still-sexy</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/is-ransomware-still-sexy</guid>
            <pubDate>Wed, 14 Jun 2023 11:00:00 +0000</pubDate>
            <description><![CDATA[Ransomware may be past its hey-day, and it is a malware threat that will not fade away. But are attackers ready to move past it to more human attack vectors?]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Overlook Physical Security Risks at Your Own Peril]]></title>
            <link>https://nexusconnect.io/articles/overlook-physical-security-risks-at-your-own-peril</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/overlook-physical-security-risks-at-your-own-peril</guid>
            <pubDate>Thu, 08 Jun 2023 13:00:00 +0000</pubDate>
            <description><![CDATA[Vulnerable physical security components, such as door locks and control cabinets, change at such a slow rate that weaknesses are likely to go undetected or are easily overlooked in industrial and healthcare environments.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[When Compensating Controls are Your Only Security Option]]></title>
            <link>https://nexusconnect.io/articles/when-compensating-controls-are-your-only-security-option</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/when-compensating-controls-are-your-only-security-option</guid>
            <pubDate>Wed, 07 Jun 2023 11:00:00 +0000</pubDate>
            <description><![CDATA[Compensating controls are often the only cybersecurity options available to offset risk in operational technology environments still supporting legacy technology or end-of-life industrial control systems or field devices.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-teltonika-4g-iiot-router-cybersecurity-research</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-teltonika-4g-iiot-router-cybersecurity-research</guid>
            <pubDate>Thu, 01 Jun 2023 09:00:00 +0000</pubDate>
            <description><![CDATA[Team82 researcher Noam Moshe describes the eight vulnerabilities found in Teltonika RUT routers and in its cloud management platform, the Teltonika Remote Management System, and three distinct attack vectors that emerged from this research.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[IT/OT Convergence Challenges, Part 2: Vulnerability Management Course of Action to Reduce Risk]]></title>
            <link>https://nexusconnect.io/articles/it-ot-convergence-challenges-part-2-vulnerability-management-course-of-action-to-reduce-risk</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/it-ot-convergence-challenges-part-2-vulnerability-management-course-of-action-to-reduce-risk</guid>
            <pubDate>Wed, 31 May 2023 06:00:00 +0000</pubDate>
            <description><![CDATA[In part two of Nexus' series on vulnerability remediation and patch management challenges related to industrial automation and control systems, we cover patching challenges, downtime, and the governance and oversight required to reduce risk.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Mandiant’s Charles Carmakal on Real-World Healthcare Cyberattacks]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mandiant-s-charles-carmakal-on-real-world-healthcare-cyberattacks</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mandiant-s-charles-carmakal-on-real-world-healthcare-cyberattacks</guid>
            <pubDate>Thu, 25 May 2023 06:00:00 +0000</pubDate>
            <description><![CDATA[Mandiant Chief Technology Officer Charles Carmakal says the majority of incidents his teams respond to are profit-motivated extortion attempts that involve not only ransomware, but data theft, victim-shaming and harassment.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Cybersecurity Punch List for CISOs Securing Converged IT/OT Environments]]></title>
            <link>https://nexusconnect.io/articles/cybersecurity-punch-list-for-cisos-securing-converged-it-ot-environments</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cybersecurity-punch-list-for-cisos-securing-converged-it-ot-environments</guid>
            <pubDate>Wed, 24 May 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Security leaders newly introduced to OT should have a punch list of things to familiarize themselves with before challenges become overwhelming and insurmountable.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[IT/OT Convergence Challenges, Part 1: Managing IACS Vulnerabilities]]></title>
            <link>https://nexusconnect.io/articles/it-ot-convergence-challenges-part-1-managing-iacs-vulnerabilities</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/it-ot-convergence-challenges-part-1-managing-iacs-vulnerabilities</guid>
            <pubDate>Wed, 17 May 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Juan Piacquadio and Tim Hall explain the need for tailored patch management and vulnerability management processes that cater to the specific requirements of OT systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Merck Ransomware Insurance Ruling Helps Clear Fog of Cyberwar]]></title>
            <link>https://nexusconnect.io/articles/merck-ransomware-insurance-ruling-helps-clear-fog-of-cyberwar</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/merck-ransomware-insurance-ruling-helps-clear-fog-of-cyberwar</guid>
            <pubDate>Mon, 15 May 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[A New Jersey appeals court agreed with an earlier court’s decision that cybersecurity insurance providers could not deny ransomware coverage under a so-called “war exclusion” for a cybersecurity incident Merck & Co. claimed caused $1.4 billion in losses.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Lorrie Cranor on IoT Security and Privacy Labels]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-lorrie-cranor-on-iot-security-and-privacy-labels</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-lorrie-cranor-on-iot-security-and-privacy-labels</guid>
            <pubDate>Tue, 02 May 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Lorrie Cranor of Carnegie Mellon University's CyLab joins the Nexus podcast to discuss IoT smart device security and privacy labels.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[US, EU Authorities Increase Regulatory Focus on Critical Infrastructure Cybersecurity]]></title>
            <link>https://nexusconnect.io/articles/us-eu-authorities-increase-focus-on-critical-infrastructure-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/us-eu-authorities-increase-focus-on-critical-infrastructure-cybersecurity</guid>
            <pubDate>Tue, 25 Apr 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[The E.U.'s NIS2 directive and the U.S.'s National Cybersecurity Strategy have aligned critical infrastructure's focus on cyber resilience.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Skip Sorrels on 405(d) HICP, Healthcare Cybersecurity]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-skip-sorrels-on-405-d-hicp-healthcare-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-skip-sorrels-on-405-d-hicp-healthcare-cybersecurity</guid>
            <pubDate>Tue, 18 Apr 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Ascension Technologies Director of Cybersecurity Skip Sorrels addresses the 405(d) Task Group's HICP document and healthcare cybersecurity trends.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[405(d) Task Group Updates HICP Document for Healthcare, Medical Device Cybersecurity]]></title>
            <link>https://nexusconnect.io/articles/405-d-task-group-updates-hicp-document-for-healthcare-medical-device-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/405-d-task-group-updates-hicp-document-for-healthcare-medical-device-cybersecurity</guid>
            <pubDate>Mon, 17 Apr 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[The Section 405(d) Task Group delivers the first Health Industry Cybersecurity Practices (HICP) update in two years, spelling out top cybersecurity threats and best practices for healthcare delivery organizations.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Dave Elfering on Cyber Liability Insurance]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-dave-elfering-on-cyber-liability-insurance</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-dave-elfering-on-cyber-liability-insurance</guid>
            <pubDate>Tue, 11 Apr 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[David Elfering, senior vice president at Marsh, a global insurance broker and risk management company, joins the Nexus podcast to discuss the current state of cyber liability insurance.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[On the Menu: Cybersecurity Risks in the Food and Beverage Industry]]></title>
            <link>https://nexusconnect.io/articles/on-the-menu-cybersecurity-risks-in-the-food-and-beverage-industry</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/on-the-menu-cybersecurity-risks-in-the-food-and-beverage-industry</guid>
            <pubDate>Tue, 04 Apr 2023 13:00:00 +0000</pubDate>
            <description><![CDATA[Cyberattacks against the food and beverage industry are opportunistic and leverage the growth in digitization to exploit previously unmanaged vulnerabilities to disrupt operations.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Behavioral Identity as the New Perimeter]]></title>
            <link>https://nexusconnect.io/articles/behavioral-identity-as-the-new-perimeter</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/behavioral-identity-as-the-new-perimeter</guid>
            <pubDate>Wed, 22 Mar 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Behavioral identity could provide the pathway to more efficient identity and access management, ultimately paving the way to zero trust architectures coveted across industries.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Vera Mens on Akuvox Vulnerabilities]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-vera-mens-on-akuvox-vulnerabilities</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-vera-mens-on-akuvox-vulnerabilities</guid>
            <pubDate>Wed, 22 Mar 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus podcast, Team82 researcher Vera Mens joins to discuss her work on these devices, which uncovered 13 vulnerabilities, some of which were critical in severity—and also typical of situations where IoT devices are sent to market without much consideration for cybersecurity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[The Zero Trust for OT Imperative]]></title>
            <link>https://nexusconnect.io/articles/the-zero-trust-for-ot-imperative</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/the-zero-trust-for-ot-imperative</guid>
            <pubDate>Thu, 16 Mar 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Implementing a zero-trust architecture for operational technology environment ensures additional security around cyber physical systems processes that are essential to our way of life.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Adm. Mike Rogers on the National Cybersecurity Strategy]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-adm-mike-rogers-on-the-national-cybersecurity-strategy</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-adm-mike-rogers-on-the-national-cybersecurity-strategy</guid>
            <pubDate>Mon, 13 Mar 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Adm. Michael S. Rogers, USN (Ret.) joins the Nexus podcast to discuss the Biden administration's National Cybersecurity Strategy, and its themes of cyber resilience and critical infrastructure protection.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Navigating Ransomware Negotiations]]></title>
            <link>https://nexusconnect.io/articles/navigating-ransomware-negotiations</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/navigating-ransomware-negotiations</guid>
            <pubDate>Wed, 08 Mar 2023 10:00:00 +0000</pubDate>
            <description><![CDATA[Attorney Mark Rasch discusses the considerations for enterprises involved in negotiating with hackers after a ransomware attack.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Aim for a Sustainable Security Strategy that Brings Resilience]]></title>
            <link>https://nexusconnect.io/articles/aim-for-a-sustainable-security-strategy-that-brings-resilience</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/aim-for-a-sustainable-security-strategy-that-brings-resilience</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Adopt a sustainable approach to cybersecurity that limits rampant spending on technology and still brings cyber resilience and operational resilience.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Communicating Cybersecurity Risk to Physicians]]></title>
            <link>https://nexusconnect.io/articles/communicating-cybersecurity-risk-to-physicians</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/communicating-cybersecurity-risk-to-physicians</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Clinical staff are busy with patient care, which forces chief information security officers to be creative about communicating cybersecurity to practitioners.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Considerations for Medical Device Vulnerability Remediation]]></title>
            <link>https://nexusconnect.io/articles/considerations-for-medical-device-vulnerability-remediation</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/considerations-for-medical-device-vulnerability-remediation</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Assessing known medical device vulnerabilities and patches in order to minimize operational disruption and lessen negative impacts to patient care is a must in connected healthcare organizations.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Cybersecurity Liability Insurance Pitfalls to Avoid]]></title>
            <link>https://nexusconnect.io/articles/cybersecurity-liability-insurance-pitfalls-to-avoid</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/cybersecurity-liability-insurance-pitfalls-to-avoid</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Avoid these seven pitfalls when seeking cybersecurity liability insurance; ensure you understand policy terms and conditions, conduct due diligence, and involve the proper stakeholders, among other things.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[How to Deliver SMB Healthcare Cybersecurity]]></title>
            <link>https://nexusconnect.io/articles/how-to-deliver-smb-healthcare-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/how-to-deliver-smb-healthcare-cybersecurity</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Three best practices from the 405(d) Healthcare Industry Cybersecurity Practices (HICP) can offer smaller and medium-sized healthcare organizations quick cybersecurity wins.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Managing IACS Cyber Risks]]></title>
            <link>https://nexusconnect.io/articles/managing-iacs-cyber-risks</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/managing-iacs-cyber-risks</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Industrial automation and control systems (IACS) and process control technologies force asset owners to change their perceptions of risk, cyber resilience, and operational resilience.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Navigating Cyber Insurance in a Recession]]></title>
            <link>https://nexusconnect.io/articles/navigating-cyber-insurance-in-a-recession</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/navigating-cyber-insurance-in-a-recession</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Navigating cybersecurity insurance in a recession requires diligence about systemic cybersecurity risks that can cause premiums to rise or insurers to consider an organization uninsurable.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[‘One Does Not Simply Patch OT’]]></title>
            <link>https://nexusconnect.io/articles/one-does-not-simply-patch-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/one-does-not-simply-patch-ot</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Take a pragmatic approach to patching operational technology environments; doing so addresses OT's unique vulnerability management challenges.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Technical Debt in OT Environments: How It's Different and Why it Matters]]></title>
            <link>https://nexusconnect.io/articles/technical-debt-in-ot-environments-how-its-different-and-why-it-matters</link>
            <guid isPermaLink="true">https://nexusconnect.io/articles/technical-debt-in-ot-environments-how-its-different-and-why-it-matters</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[Technical debt broadly refers to having old technology in place that causes problems later on, such as increased maintenance, lower productivity, and software or system reliability.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-katherine-gronberg-on-the-federal-government-and-ot-iot-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-katherine-gronberg-on-the-federal-government-and-ot-iot-cybersecurity</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <description><![CDATA[NightDragon head of government services Katherine Gronberg joins the Nexus podcast to discuss the federal government's prioritization of OT and IoT cybersecurity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Team82 Patient Monitoring System Hacking]]></title>
            <link>https://nexusconnect.io/videos/team82-patient-monitoring-system-hacking</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/team82-patient-monitoring-system-hacking</guid>
            <pubDate>Wed, 22 Feb 2023 00:00:00 +0000</pubDate>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[State of XIoT Security Report 2H 2022]]></title>
            <link>https://nexusconnect.io/videos/state-of-xiot-security-report-2h-2022</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/state-of-xiot-security-report-2h-2022</guid>
            <pubDate>Fri, 10 Feb 2023 00:00:00 +0000</pubDate>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Claroty Nexus 2022, Miami Beach, Fla]]></title>
            <link>https://nexusconnect.io/videos/claroty-nexus-2022-miami-beach-fla</link>
            <guid isPermaLink="true">https://nexusconnect.io/videos/claroty-nexus-2022-miami-beach-fla</guid>
            <pubDate>Wed, 08 Feb 2023 00:00:00 +0000</pubDate>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Noam Moshe on a Generic Bypass of Web Application Firewalls]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-a-generic-bypass-of-web-application-firewalls</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-a-generic-bypass-of-web-application-firewalls</guid>
            <pubDate>Tue, 20 Dec 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Team82 researcher Noam Moshe joins to discuss his recent research and development of a generic bypass of leading vendors’ web application firewalls.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Sharon Brizinov on Hacking IoT]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-sharon-brizinov-on-hacking-iot</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-sharon-brizinov-on-hacking-iot</guid>
            <pubDate>Mon, 12 Dec 2022 16:30:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Brizinov explains that under the covers, IoT and OT aren’t all that dissimilar.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Joe Slowik on XENOTIME, Entity Behind the Triton Attack]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-joe-slowik-on-xenotime-entity-behind-the-triton-attack</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-joe-slowik-on-xenotime-entity-behind-the-triton-attack</guid>
            <pubDate>Tue, 01 Nov 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[Joe Slowik, threat intelligence and detections lead at Gigamon, joins the Nexus podcast to discuss a Virus Bulletin paper and presentation he gave recently on XENOTIME.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Inside the EvilPLC Attack]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-inside-the-evilplc-attack</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-inside-the-evilplc-attack</guid>
            <pubDate>Thu, 20 Oct 2022 09:00:00 +0000</pubDate>
            <description><![CDATA[Team82's Noam Moshe, one of the researchers involved in developing the EvilPLC attack, discusses the technique of using a weaponized programmable logic controller to compromise an engineer's workstation and gain access to other PLCs on the OT network.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-sarah-fluchs-revisits-the-top-20-secure-plc-coding-practices-list</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-sarah-fluchs-revisits-the-top-20-secure-plc-coding-practices-list</guid>
            <pubDate>Thu, 06 Oct 2022 00:00:00 +0000</pubDate>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Vergle Gipson on Cyber-Informed Engineering]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-vergle-gipson-on-cyber-informed-engineering</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-vergle-gipson-on-cyber-informed-engineering</guid>
            <pubDate>Thu, 29 Sep 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[Vergle Gipson, senior advisor at Idaho National Lab’s Cybercore Integration Center, discusses the concepts around cyber-informed engineering in this episode of the Aperture Podcast and why it’s important in improving the safety, availability, and resilience of operational technology systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Noam Moshe on Evil PLC Attack]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-evil-plc-attack</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-noam-moshe-on-evil-plc-attack</guid>
            <pubDate>Mon, 22 Aug 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[Evil PLC is a technique developed by Claroty’s Team82 whereby a programmable logic controller (PLC) is weaponized in order to compromise engineering workstations and burrow deeper into the OT and enterprise networks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Dan Gunter on Threat Hunting in Industrial Control Systems]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-dan-gunter-on-threat-hunting-in-industrial-control-systems</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-dan-gunter-on-threat-hunting-in-industrial-control-systems</guid>
            <pubDate>Thu, 21 Jul 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus podcast, Insane Forensics CEO and founder Dan Gunter discusses threat hunting in industrial control systems and OT networks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Dan Ricci on ICS Advisory Project]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-dan-ricci-on-ics-advisory-project</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-dan-ricci-on-ics-advisory-project</guid>
            <pubDate>Mon, 11 Jul 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Claroty’s Nexus podcast, Ricci explains the motivations behind his developing the dashboard. By spending a portion of his career conducting cyber risk assessments, Ricci saw the challenges organizations face around vulnerability management and control systems.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Vera Mens on Hacking Flow Computers]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-vera-mens-on-hacking-flow-computers</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-vera-mens-on-hacking-flow-computers</guid>
            <pubDate>Thu, 30 Jun 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus podcast, Team82 researcher Vera Mens discusses her extensive research into hacking flow computers.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Don C. Weber on ICS Cybersecurity Training]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-don-c-weber-on-ics-cybersecurity-training-1</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-don-c-weber-on-ics-cybersecurity-training-1</guid>
            <pubDate>Fri, 17 Jun 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[Cutaway Security's Don C. Weber joins the Claroty Nexus podcast to discuss ICS cybersecurity training from his experience as a SANS certified instructor and understanding of where automation organizations are struggling and succeeding with cybersecurity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Tim Huddleston on the INL Control Environment Laboratory Resource]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-tim-huddleston-on-the-inl-control-environment-laboratory-resource</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-tim-huddleston-on-the-inl-control-environment-laboratory-resource</guid>
            <pubDate>Thu, 02 Jun 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[Tim Huddleston of Idaho National Lab joins the Claroty Nexus podcast to discuss INL's expansion of its Control Environment Laboratory Resources (CELR) to include industrial control systems (ICS) and operational technology (OT).]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: CSAF Machine-Readable Security Advisories]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-csaf-machine-readable-security-advisories</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-csaf-machine-readable-security-advisories</guid>
            <pubDate>Thu, 26 May 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[Thomas Schmidt of the German Federal Office for Information Security and Martin Scheu, an OT Security Engineer at SWITCH-CERT in Switzerland join the Claroty Nexus podcast to discuss CSAF, the Common Security Advisory Framework and advocate for the standardization of security advisories on CSAF.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Daniel Kapellmann Zafra on Incontroller ICS Malware]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-daniel-kapellmann-zafra-on-incontroller-ics-malware</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-daniel-kapellmann-zafra-on-incontroller-ics-malware</guid>
            <pubDate>Thu, 05 May 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus podcast, Mandiant's Daniel Kapellmann Zafra, discusses Incontroller, an attack framework that includes components targeting three OPC UA servers, various Schneider Electric PLCs, and Omron PLCs.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Istari Voices Podcast: Grant Geyer on Zero Trust]]></title>
            <link>https://nexusconnect.io/podcasts/istari-voices-podcast-grant-geyer-on-zero-trust</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/istari-voices-podcast-grant-geyer-on-zero-trust</guid>
            <pubDate>Fri, 22 Apr 2022 00:00:00 +0000</pubDate>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Sharon Brizinov on Hacking PLCs]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-sharon-brizinov-on-hacking-plcs</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-sharon-brizinov-on-hacking-plcs</guid>
            <pubDate>Wed, 20 Apr 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus podcast, Team82 vulnerability research lead Sharon Brizinov explains a unique attack against Siemens SIMATIC 1200 and 1500 PLCs that enables native code execution on the device.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Kylie McClanahan on Automated Vulnerability Assessment, Remediation]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-kylie-mcclanahan-on-automated-vulnerability-assessment-remediation</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-kylie-mcclanahan-on-automated-vulnerability-assessment-remediation</guid>
            <pubDate>Wed, 30 Mar 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus podcast, Kylie McClanahan, a doctoral student at the University of Arkansas and senior developer at Bastazo Inc., discusses research she's conducted that automates the collection of vulnerability assessment, remediation and mitigation information from security advisories.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Sean Tufts on Implementing OT SOC Playbooks]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-sean-tufts-on-implementing-ot-soc-playbooks</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-sean-tufts-on-implementing-ot-soc-playbooks</guid>
            <pubDate>Mon, 28 Feb 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[Sean Tufts, Optiv's ICS and OT security practice, joins the Claroty Nexus podcast to discuss his experience in implementing OT SOC playbooks, and some of the cultural challenges that accompany that transition.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Patrick Miller on Securing Critical Infrastructure in a Time of Conflict]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-patrick-miller-on-securing-critical-infrastructure-in-a-time-of-conflict</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-patrick-miller-on-securing-critical-infrastructure-in-a-time-of-conflict</guid>
            <pubDate>Wed, 23 Feb 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[ICS security expert Patrick Miler joins the Claroty Nexus podcast to discuss the need for critical infrastructure owners and operators to be proactive about communication and response in the event kinetic conflict spills onto the Internet.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: OT-ISAC on ICS Threat Intelligence Sharing]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-ot-isac-on-ics-threat-intelligence-sharing</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-ot-isac-on-ics-threat-intelligence-sharing</guid>
            <pubDate>Wed, 02 Feb 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[Bill Nelson, director and officer of the Operational Technology Information Sharing and Analysis Center (OT-ISAC), joins the Claroty Nexus podcast to discuss why automation companies need to share indicators of compromise and other incident information within the industry.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Tom VanNorman on the OT Cybersecurity Skills Gap]]></title>
            <link>https://nexusconnect.io/podcasts/tom-vannorman-on-the-ot-cybersecurity-skills-gap</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/tom-vannorman-on-the-ot-cybersecurity-skills-gap</guid>
            <pubDate>Thu, 13 Jan 2022 00:00:00 +0000</pubDate>
            <description><![CDATA[In the episode of the Nexus podcast, ICS cybersecurity veteran, Tom VanNorman, joins to discuss the OT cybersecurity skills gap and the establishment of the Cybersecurity & Industrial Infrastructure Security Apprenticeship Program (CIISAp).]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast Listener Guide for 2021]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-listener-guide-for-2021</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-listener-guide-for-2021</guid>
            <pubDate>Tue, 21 Dec 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[The Nexus Podcast's best episodes of 2021 include OT cybersecurity expertise and insight into trends around protocol security, open source projects, SBOMs, and U.S. government action to ensure critical infrastructure remains safe.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Claroty, JFrog on Fuzzing BusyBox]]></title>
            <link>https://nexusconnect.io/podcasts/claroty-jfrog-on-fuzzing-busybox</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/claroty-jfrog-on-fuzzing-busybox</guid>
            <pubDate>Mon, 29 Nov 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Claroty's Nexus podcast, Team82's Vera Mens and JFrog senior director of security research Shachar Menashe join to discuss a research project that examined the security of BusyBox, and uncovered 14 vulnerabilities in vendors' implementations of the utility suite.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: ZDI’s Dustin Childs on Pwn2Own Miami]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-zdis-dustin-childs-on-pwn2own-miami</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-zdis-dustin-childs-on-pwn2own-miami</guid>
            <pubDate>Thu, 18 Nov 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Claroty's Nexus podcast, Dustin Childs of ZDI returns to discuss how and why the Pwn2Own Miami ICS hacking contest was brought back, the format for this year's event, who the participating vendors are, and why this is such a crucial time for ICS and OT vulnerability research.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Exploring and Navigating OT for CISOs]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-exploring-and-navigating-ot-for-cisos</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-exploring-and-navigating-ot-for-cisos</guid>
            <pubDate>Thu, 11 Nov 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Claroty's Nexus podcast, Splunk OT security strategist Chris Duffey and Global Advisory CISO Doug Brush join to discuss the integration and convergence of IT and OT and how CISOs navigate and meet these new challenges.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Gary E. Miller on the GPSD Rollover Bug]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-gary-e-miller-on-the-gpsd-rollover-bug</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-gary-e-miller-on-the-gpsd-rollover-bug</guid>
            <pubDate>Thu, 28 Oct 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Claroty's Nexus Podcast, GPSD principal maintainer Gary E. Miller joins a vulnerability in the GPSD daemon that could have rolled back time on GPSD-reliant devices 1,024 weeks, almost 20 years. Such an event could have affected data integrity with systems dependent on timestamps, for example. Some sensors transmit data regularly and are part of larger systems that take actions based on sensor readings.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Top 20 Secure PLC Coding Practices List]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-top-20-secure-plc-coding-practices-list</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-top-20-secure-plc-coding-practices-list</guid>
            <pubDate>Wed, 29 Sep 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Claroty's Nexus Podcast, Martin Scheu and Dirk Rotermund of the Top 20 Secure PLC Coding Practices project join to discuss how engineers can integrate secure coding practices into PLC programming.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Dennis Fisher on ‘When Bug Bounties Went Boom’]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-dennis-fisher-on-when-bug-bounties-went-boom</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-dennis-fisher-on-when-bug-bounties-went-boom</guid>
            <pubDate>Wed, 22 Sep 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Decipher Editor in Chief Dennis Fisher joins to discuss a three-part series he wrote that goes back in time to the early days of vulnerability research featuring the words of those who laid the foundation for what today the lucrative bug bounty industry within information security.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Tom Pace on SBOMs for ICS and OT]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-tom-pace-on-sboms-for-ics-and-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-tom-pace-on-sboms-for-ics-and-ot</guid>
            <pubDate>Mon, 23 Aug 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[Tom Pace, founder of startup NetRise, discusses SBOMs for ICS and OT on this episode of Claroty's Nexus Podcast. Pace acknowledges that SBOMs for industrial software and firmware are a rarity, and organizations are buying software without being totally aware of the risks present within their space or those that may occur downstream.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Tony Baker on OT Cybersecurity Challenges, CIP Security]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-tony-baker-on-ot-cybersecurity-challenges-cip-security</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-tony-baker-on-ot-cybersecurity-challenges-cip-security</guid>
            <pubDate>Thu, 12 Aug 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[Rockwell Automation Chief Product Safety and Security Officer Tony Baker joins this episode of the Claroty Nexus podcast to discuss OT and ICS product cybersecurity and how industrial automation and control system protections must adapt to changes such as the cloud and greater connectivity.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Inside the Water Sector Cybersecurity Survey]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-inside-the-water-sector-cybersecurity-survey</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-inside-the-water-sector-cybersecurity-survey</guid>
            <pubDate>Tue, 06 Jul 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[Michael Arceneaux, managing director of the Water Information Sharing and Analysis Center (WaterISAC), joined Claroty's Nexus podcast to discuss the the Water Sector Coordinating Council's survey of the water and wastewater sector about its cybersecurity practices, investments, and areas of need.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Adm. Mike Rogers on Ransomware and OT]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-adm-mike-rogers-on-ransomware-and-ot</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-adm-mike-rogers-on-ransomware-and-ot</guid>
            <pubDate>Mon, 28 Jun 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Claroty's Nexus podcast, retired Adm. Mike Rogers, former director of the National Security Agency and commander of U.S. Cyber Command joins to talk about ransomware and its impact on ICS and OT, defensive strategies, and whether to pay ransom demands in order to promptly resume production.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Mandiant on Low Sophistication OT Attacks]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mandiant-on-low-sophistication-ot-attacks</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mandiant-on-low-sophistication-ot-attacks</guid>
            <pubDate>Thu, 10 Jun 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[Nathan Brubaker, senior manager of Mandiant Threat Intelligence, joins the Nexus podcast to discuss a Mandiant report that examines how cyberattackers are using low-tech means of accessing industrial networks and, on occasion, interacting with processes without much understanding of possible physical outcomes or impacts to public safety.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-e-isac-on-biden-100-day-plan-for-power-grid-cybersecurity</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-e-isac-on-biden-100-day-plan-for-power-grid-cybersecurity</guid>
            <pubDate>Tue, 18 May 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Claroty's Nexus podcast, Manny Cancel, CEO of the Electricity Information Sharing and Analysis Center (E-ISAC) and a NERC senior vice president, discusses the Biden Administration's 100-day plan to improve cybersecurity in the electric industry.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Katie Moussouris on Vulnerability Disclosure Programs]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-katie-moussouris-on-vulnerability-disclosure-programs</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-katie-moussouris-on-vulnerability-disclosure-programs</guid>
            <pubDate>Thu, 29 Apr 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[Katie Moussouris, CEO of Luta Security, joins the Nexus Podcast for a wide-ranging discussion of her work pioneering vulnerability disclosure programs, bug bounties, and crucial standards work.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Claroty and Kaspersky on OPC Security Research]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-claroty-and-kaspersky-on-opc-security-research</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-claroty-and-kaspersky-on-opc-security-research</guid>
            <pubDate>Mon, 05 Apr 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, the head of Kaspersky's ICS security team Evgeny Goncharov joins Team82 researchers Sharon Brizinov and Uri Katz to discuss their respective research into OPC security, vulnerabilities each team has disclosed, and how vendors and protocol maintainers can improve the OPC protocol's security going forward.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Josh Grunzweig on ProxyLogon Exchange Zero-Day Exploits]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-josh-grunzweig-on-proxylogon-exchange-zero-day-exploits</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-josh-grunzweig-on-proxylogon-exchange-zero-day-exploits</guid>
            <pubDate>Thu, 18 Mar 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[On this episode of the Nexus Podcast, Josh Grunzweig of Volexity joins to discuss the ProxyLogon Exchange zero days. The Volexity research team was the first to discover and disclose in-the-wild attacks, allegedly by a Chinese APT group, exploiting these flaws dating back to early January 2021.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Mauro Conti on Assessing the Use of Insecure ICS Protocols]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-mauro-conti-on-assessing-the-use-of-insecure-ics-protocols</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-mauro-conti-on-assessing-the-use-of-insecure-ics-protocols</guid>
            <pubDate>Thu, 11 Mar 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[Professor Mauro Conti of the University of Padua, Italy, joins this episode of the Nexus Podcast to discuss a research paper that examines the extent of insecure OT and ICS protocols in use that are often vulnerable by design, most notably lacking encryption and authentication services.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Water ISAC on Oldsmar Hack, Sector Security]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-water-isac-on-oldsmar-hack-sector-security</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-water-isac-on-oldsmar-hack-sector-security</guid>
            <pubDate>Tue, 23 Feb 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Nexus, Water ISAC Managing Director Michael Arceneaux and Cyber Threat Analyst Jennifer Lyn Walker discuss the Oldsmar cyberattack, and how it underscores the need for better information-sharing about incidents and improved security hygiene inside critical infrastructure sectors such as water and wastewater.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Justin Searle on Pen-Testing ICS]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-justin-searle-on-pen-testing-ics</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-justin-searle-on-pen-testing-ics</guid>
            <pubDate>Tue, 26 Jan 2021 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of Nexus, Justin Searle of the SANS Institute shares his experiences pen-testing industrial control systems (ICS) and OT networks, focusing on the distinct challenges surrounding this practice, which is markedly different from security assessments conducted against IT networks.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Tom Tervoort on Zerologon]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-tom-tervoort-on-zerologon</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-tom-tervoort-on-zerologon</guid>
            <pubDate>Mon, 21 Dec 2020 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Nexus Podcast, Tom Tervoort, a senior security specialist at Secura, joins to discuss his discovery of the Zerologon vulnerability in a critical Windows authentication service, Netlogon. Zerologon is so-named because the flaw allows an attacker to set the initialization vector during logon to a static set of zeros, replacing what should be a dynamic, random number.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: Richard Thomas and Joe Gardiner on CVE Discovery Times for ICS]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-richard-thomas-and-joe-gardiner-on-cve-discovery-times-for-ics</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-richard-thomas-and-joe-gardiner-on-cve-discovery-times-for-ics</guid>
            <pubDate>Mon, 30 Nov 2020 00:00:00 +0000</pubDate>
            <description><![CDATA[In this episode of the Claroty Nexus podcast, Richard Thomas and Joe Gardiner of the Bristol Cyber Group discuss a paper that explains how cybersecurity flaws on industrial control systems and OT networks can linger for anywhere between five and 14 years before they're discovered. Also, information provided in CVEs and advisories lack this vital information and are also inconsistent in aligning affected products with their proper Common Platform Enumeration (CPE).]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Nexus Podcast: ZDI’s Dustin Childs on the Evolution of Vulnerability Disclosure]]></title>
            <link>https://nexusconnect.io/podcasts/nexus-podcast-zdis-dustin-childs-on-the-evolution-of-vulnerability-disclosure</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/nexus-podcast-zdis-dustin-childs-on-the-evolution-of-vulnerability-disclosure</guid>
            <pubDate>Wed, 18 Nov 2020 00:00:00 +0000</pubDate>
            <description><![CDATA[In this first episode of Claroty's new podcast, Nexus, Dustin Childs, communications manager of the Zero Day Initiative (ZDI) talks to Editorial Director Michael Mimoso about the changing face of vulnerability disclosure, and how the security industry has provided a safe space for most researchers to look for bugs and also earn financial compensation.]]></description>
            <author>Nexus</author>
        </item>
        <item>
            <title><![CDATA[Introducing the New Claroty Podcast: Nexus]]></title>
            <link>https://nexusconnect.io/podcasts/introducing-the-new-claroty-podcast-nexus</link>
            <guid isPermaLink="true">https://nexusconnect.io/podcasts/introducing-the-new-claroty-podcast-nexus</guid>
            <pubDate>Mon, 16 Nov 2020 00:00:00 +0000</pubDate>
            <author>Nexus</author>
        </item>
    </channel>
</rss>
