Archive

All entries

nexus_white-house-eo.jpg
Risk Management
Operational Resilience
Cyber Resilience

Outgoing Biden EO Takes Aim at Improved Software Security

George V. Hulme
nexus_5-predictions.jpg
Cyber Resilience
Operational Technology
Operational Resilience
Risk Management

Five Trends Driving OT Cybersecurity in 2025

George V. Hulme
nexus_ballentine-reflection.jpg
Cyber Resilience
Operational Technology
Operational Resilience
Vulnerability Management

Nexus Reflections and Predictions: John Ballentine

John Ballentine
nexus_rogers-reflection.jpg
Cyber Resilience
Operational Resilience
Risk Management
Vulnerability Management

Nexus Reflections and Predictions: Adm. Michael Rogers

ADM. Michael S. Rogers, USN (Ret.)
nexus_ricci-reflection.jpg
Operational Technology
Cyber Resilience
Operational Resilience
Vulnerability Management

Nexus Reflections and Predictions: Dan Ricci

Dan Ricci
Enterprise CISOs must consider disinformation and misinformation campaigns targeting their companies and industries as part of their threat model. Organizations must also develop disinformation response plans, similar to incident response actions.
Operational Resilience
Cyber Resilience
Risk Management

CISOs Urged to Prepare for Evolving Disinformation Tactics

George V. Hulme
nexus_grant1.jpg
Industrial
Healthcare
Ransomware
Cyber Resilience
Operational Resilience
Operational Technology

Nexus Podcast: Grant Geyer on the Business Impact of Disruptions from Cyberattacks

Michael Mimoso
If we are indeed at the full outset of Industry 4.0, the fourth industrial revolution, initiatives such as smart manufacturing will not truly succeed without keen awareness of new cybersecurity risks introduced by IT/OT connectivity and advanced technologies.
Cyber Resilience
Internet of Things
Operational Resilience
Operational Technology

Smart Manufacturing Requires Proactive Cybersecurity

Jim LaBonty
On Nexus, former NSA Director Adm. Michael Rogers writes about the current legislative and personal liability changes that are impacting the CISO office. But Rogers urges security leaders to view these times as an opportunity to refine their business acumen and ensure cybersecurity is a priority across the enterprise.
Risk Management
Operational Resilience
Cyber Resilience

CISO Unrest is an Opportunity

ADM. Michael S. Rogers, USN (Ret.)
Operational technology’s (OT) exposure to cyber threats extends beyond the confines of technical software and firmware vulnerabilities. The supply chain and insiders are two significant areas of concern, where risks can originate from third-party vendors or suppliers with inadequate cybersecurity measures or those inside the firewall with similarly privileged access.
Cyber Resilience
Operational Resilience

Mitigating Exposures the Key to Cyber Resilience

Dan Ricci
Expert Don C. Weber writes that safety devices are within scope for cybersecurity risk assessments. This includes conducting high-level risk assessments to assemble documentation for specific Systems-under-Consideration (SuC) of the safety solution, performing a vulnerability assessment of the SuC, feeding the results into the detailed risk assessment to allow the risk management team to identify and address residual risks.
Operational Technology
Operational Resilience
Vulnerability Management

Architecting Safety Using Cybersecurity Requirements and Assessments

Don C. Weber
nexus_adamgluck.jpg
Operational Resilience

Nexus Podcast: Adam Gluck on Industrial DevOps

Michael Mimoso
Latest on Nexus Podcast