Archive

All entries

Threat intelligence for operational technology environments differs from traditional IT threat intelligence. OT threat intelligence requires contextual, situational awareness that identifies vulnerabilities and anomalies, and also which assets, and in what part of the process, are exposed. It must also note what the safety and operational consequences would be if exploited. This context enables security teams to prioritize risk mitigation according to real-world impact rather than theoretical severity.
Vulnerability Management
Risk Management
Operational Technology
Operational Resilience
Cyber Resilience

Why Traditional Threat Intelligence Falls Short For Operational Technology

George V. Hulme
black-hat-media-panel-1.jpeg
Cyber Resilience
Operational Resilience
Vulnerability Management
Risk Management

Panel: Nation-States Leveraging CPS to Damage Confidence in Resilience, Response

Michael Mimoso
noam-moshe-headshot-1734963804.jpeg
Internet of Things
Vulnerability Management
Risk Management

Nexus Podcast: Noam Moshe on Hacking Video Surveillance

Michael Mimoso
nexus_labonty-manuf-and-cloud.jpg
Risk Management
Operational Resilience
Operational Technology
Cyber Resilience

Navigating Manufacturing Cybersecurity and the Cloud

Jim LaBonty
In this episode of the Nexus Podcast, BitDefender Director of IoT Security Dan Berte joins to discuss research his team conducted on the security of two solar power management platforms responsible for 20 percent of the planet’s solar power output.
Internet of Things
Vulnerability Management
Risk Management

Nexus Podcast: Dan Berte on Solar Grid and IoT Vulnerabilities

Michael Mimoso
With Federal policy changes pushing more cybersecurity and AI regulation to the state level, CISOs should prepare for even more fragmentation of cybersecurity laws and more jurisdictions to contend with, writes Cristin Flynn Goodwin.
Risk Management
Cyber Resilience
Operational Resilience

50 States of Cybersecurity Complexity

Cristin Flynn Goodwin
The convergence of IT and OT systems, primarily driven by the deployment of IIoT (industrial Internet of Things), cloud computing, and the need for remote monitoring, has fundamentally altered the OT architecture that the Purdue Model was initially designed to help manage.
Zero Trust
Risk Management
Operational Resilience
Operational Technology

Is It Time to Rethink the Purdue Model?

George V. Hulme
OT cybersecurity expert Danielle Jablanski of STV makes her first contribution to Claroty Nexus. She writes about how OT cybersecurity programs should not compromise safety and reliability over the likelihood a vulnerability will be exploited.
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

Throw Likelihood to the Wind: OT Cybersecurity is Categorical, Not Mathematical

Danielle Jablanski
On this episode of the Nexus Podcast, Vivek Ponneda, SVP Growth & Strategy at Frenos, discusses the maturity and evolution of OT security as a practice, and advises that organizations need to leverage these data-rich environments in order to bring necessary context to threat and risk management efforts

Nexus Podcast: Vivek Ponnada on the Need for Context in OT Security

Michael Mimoso
nexusvid_leandro.png
Healthcare
Cyber Resilience

Leandro Ribeiro, Sobre la Segurança Cibernética no Setor de Saúde

Leandro Ribeiro, CISO do Hospital Sírio-Libanês, compartilha sua experiência no Nexus 24 em Boston, discutindo segurança cibernética no setor de saúde e o…
Michael Mimoso
nexusvid_arthur-paixao-.png
Healthcare
Vulnerability Management
Cyber Resilience

Arthur Paixao Sobre los Principais Riscos Cibernéticos no Setor de Saúde

Entrevista com Arthur Paixão, Head de Cybersecurity do Hospital Albert Einstein, sobre os principais riscos cibernéticos no setor de saúde. Arthur destaca que…
Michael Mimoso
In this episode of the Claroty Nexus Podcast, Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, discusses the cybersecurity challenges facing healthcare delivery organizations, and the potential negative impacts of a breach or incident on patient care.
Healthcare
Vulnerability Management
Risk Management

Nexus Podcast: Austin Allen on Healthcare Cybersecurity and Patient Safety

Michael Mimoso
Latest on Nexus Podcast