Archive

All entries

Mike Ratliff, AVP Security Engineering and Operations at Providence, writes about five steps healthcare delivery organizations should take to mitigate the risk of ransomware and extortion-based attacks.
Ransomware
Healthcare
Cyber Resilience

5 Things Hospitals Can Do to Mitigate Threats of Ransomware

Mike Ratliff
In this episode of the Nexus Podcast, Alethe Denis, a senior security consultant at Bishop Fox, joins to discuss the ongoing effectiveness of open-source intelligence analysis and social engineering tactics as a precursor to larger intrusions against critical infrastructure.
Cyber Resilience
Healthcare
Industrial
Risk Management

Nexus Podcast: Alethe Denis on Social Engineering, Red-Teaming

Michael Mimoso
Healthcare delivery organizations using open-source software experience a balance of development advantages and security tradeoffs. Visibility, oversight, and tracking the use of OSS is critical to reducing risks it introduces. SBOMs, meanwhile, can be an advantage, in particular with regard to vulnerability management.
Cyber Resilience
Healthcare
Vulnerability Management
Risk Management

Understanding the Risks of Open Source Software in Healthcare

George V. Hulme
In OT and ICS cybersecurity, living off the land (LOTL) techniques refer to the practice of attackers using the existing tools and processes in a target system to carry out their malicious activities. This approach is particularly dangerous because it allows the attacker to blend in with everyday activities, making detection significantly more challenging.
Operational Technology
Cyber Resilience
Industrial

How Living-Off-The-Land Techniques Impact OT and ICS

Dan Ricci
In this episode of the Nexus Podcast, Vincente Diaz, a threat intelligence strategist on Google’s VirusTotal team, explains how AI and ML engines are being used in VirusTotal’s malware analysis, and how those results differ from what a traditional AV engine's analysis might render.
Cyber Resilience

Nexus Podcast: Vincente Diaz on Using AI for Malware Analysis

Michael Mimoso
If we are indeed at the full outset of Industry 4.0, the fourth industrial revolution, initiatives such as smart manufacturing will not truly succeed without keen awareness of new cybersecurity risks introduced by IT/OT connectivity and advanced technologies.
Cyber Resilience
Internet of Things
Operational Resilience
Operational Technology

Smart Manufacturing Requires Proactive Cybersecurity

Jim LaBonty
On Nexus, former NSA Director Adm. Michael Rogers writes about the current legislative and personal liability changes that are impacting the CISO office. But Rogers urges security leaders to view these times as an opportunity to refine their business acumen and ensure cybersecurity is a priority across the enterprise.
Risk Management
Operational Resilience
Cyber Resilience

CISO Unrest is an Opportunity

ADM. Michael S. Rogers, USN (Ret.)
Dr. Bilyana Lilly, an expert on geopolitics and Russia’s codification of information warfare as a strategy, says that the war in Ukraine has only temporarily delayed Russia’s activity against the West in cyberspace. On the latest Claroty Nexus podcast, she reinforces the idea that despite the fact that Russia is operating under severe resource constraints, CISOs should be preparing for the inevitable ramp-up of cyberattacks against critical infrastructure.
Risk Management
Cyber Resilience

Nexus Podcast: Dr. Bilyana Lilly on Information Warfare

Michael Mimoso
ASL Roma 1, a public health provider in Rome, has distinguished itself in the global healthcare landscape over the past two years by implementing advanced cybersecurity strategies, moving toward a hyper convergent security model, the so-called HyperSOC, in response to the growing cyber attacks in the global healthcare sector.
Healthcare
Cyber Resilience

The Cybersecurity Revolution at ASL Roma 1: From Traditional Solutions to HyperSOC

Stefano Scaramuzzino
In this episode of the Claroty Nexus Podcast, Bishop Fox CEO and Cofounder Vinnie Liu explains how offensive security specialists, including red teams, are working alongside incident response specialists during incidents, including ransomware attacks. Organizations in healthcare and other critical industries, for example, bring in offensive specialists in an attempt to find and lock down other exposures to avoid reinfections or separate intrusions that could lead to further data loss or reputational damage.
Healthcare
Ransomware
Cyber Resilience

Nexus Podcast: Vinnie Liu on Offensive Security Testing During Incidents

Michael Mimoso
diana-kelly-podcast.png
Cyber Resilience
Risk Management
Vulnerability Management

Nexus Podcast: Diana Kelley on Securing AI Systems

Michael Mimoso
nexus_water-epa.jpg
Operational Technology
Cyber Resilience

EPA Cybersecurity Warning to Water Systems Faces Challenges

George V. Hulme

Latest on Nexus Podcast