Archive

All entries

nexus_devops-geo.jpg
Operational Technology

Does DevOps have a place in OT/ICS Development?

George V. Hulme
nexus_daryl-haegley.png
Nexus Conference
Operational Technology

Daryl Haegley on Defending OT Against Advanced Cybersecurity Threats

Daryl Haegley, Technical Director, Control Systems Cybersecurity for the U.S. Air Force, brings his extensive federal cybersecurity experience to a discussion…
Michael Mimoso
nexus_ashish-agarwal.png
Nexus Conference
Operational Technology

Ashish Agarwal on OT Visibility as a Cybersecurity Enabler

Ashish Agarwal, Director Operational Technology at Agco, discusses the foundational need for complete visibility and asset inventory and how it enables the…
Michael Mimoso
nexus_charles-carmakal.png
Nexus Conference
Operational Technology

Charles Carmakal on Disruptive APT Attacks

Mandiant CTO Charles Carmakal explains strategic shifts in the operations of advanced persistent threat (APT) groups in their targeting of operational…
Michael Mimoso
nexus_sign.jpg
Cyber Resilience
Healthcare
Industrial
Operational Technology
Risk Management

CPS Security Leaders Convene on One Goal: Protect Mission-Critical Infrastructure

Upa Campbell
On this episode of the Nexus Podcast, Alon Dankner of the Technion Institute in Israel explains his research into the Siemens S7 protocol and PLCs. A vulnerability uncovered during research allows an attacker to expose and steal private cryptographic keys by leveraging a severe vulnerability and configuration error.
Operational Technology

Nexus Podcast: Alon Dankner on Extracting Private Crypto Keys from PLCs

Michael Mimoso
In OT and ICS cybersecurity, living off the land (LOTL) techniques refer to the practice of attackers using the existing tools and processes in a target system to carry out their malicious activities. This approach is particularly dangerous because it allows the attacker to blend in with everyday activities, making detection significantly more challenging.
Operational Technology
Cyber Resilience
Industrial

How Living-Off-The-Land Techniques Impact OT and ICS

Dan Ricci
In this episode of the Nexus Podcast, Claroty Team82 researcher Noam Moshe explains the challenges involved in gathering attack forensic artifacts from OT devices, in this case, Unitronics PLCs that were exploited in 2023 in attacks against water facilities in the U.S. and Israel.
Operational Technology
Industrial

Nexus Podcast: Noam Moshe on Extracting Forensic Data from Unitronics PLCs

Michael Mimoso
If we are indeed at the full outset of Industry 4.0, the fourth industrial revolution, initiatives such as smart manufacturing will not truly succeed without keen awareness of new cybersecurity risks introduced by IT/OT connectivity and advanced technologies.
Cyber Resilience
Internet of Things
Operational Resilience
Operational Technology

Smart Manufacturing Requires Proactive Cybersecurity

Jim LaBonty
On the latest episode of the Nexus Podcast, Rockwell Automation Senior Network & Solution Consultant Ahmik Hindman joins to discuss patching and vulnerability management of operational technology (OT) and industrial control systems (ICS).
Operational Technology
Vulnerability Management

Nexus Podcast: Ahmik Hindman on Patching OT and ICS

Michael Mimoso
Secure remote access for third parties is a growing demand within OT and ICS environments. CISOs must understand and mitigate the risk third-party access introduces by having visibility into these connections, limiting access when appropriate, and applying other mitigations.
Operational Technology

Closing the Door on Third-Party Access Risks

George V. Hulme
jennifer-minella.jpeg
Operational Technology

Nexus Podcast: Jennifer Minella on Converging IT/OT from the Ground Up

Michael Mimoso

Latest on Nexus Podcast