Archive

All entries

Threat intelligence for operational technology environments differs from traditional IT threat intelligence. OT threat intelligence requires contextual, situational awareness that identifies vulnerabilities and anomalies, and also which assets, and in what part of the process, are exposed. It must also note what the safety and operational consequences would be if exploited. This context enables security teams to prioritize risk mitigation according to real-world impact rather than theoretical severity.
Vulnerability Management
Risk Management
Operational Technology
Operational Resilience
Cyber Resilience

Why Traditional Threat Intelligence Falls Short For Operational Technology

George V. Hulme
black-hat-media-panel-1.jpeg
Cyber Resilience
Operational Resilience
Vulnerability Management
Risk Management

Panel: Nation-States Leveraging CPS to Damage Confidence in Resilience, Response

Michael Mimoso
noam-moshe-headshot-1734963804.jpeg
Internet of Things
Vulnerability Management
Risk Management

Nexus Podcast: Noam Moshe on Hacking Video Surveillance

Michael Mimoso
nexus_labonty-manuf-and-cloud.jpg
Risk Management
Operational Resilience
Operational Technology
Cyber Resilience

Navigating Manufacturing Cybersecurity and the Cloud

Jim LaBonty
In this episode of the Nexus Podcast, BitDefender Director of IoT Security Dan Berte joins to discuss research his team conducted on the security of two solar power management platforms responsible for 20 percent of the planet’s solar power output.
Internet of Things
Vulnerability Management
Risk Management

Nexus Podcast: Dan Berte on Solar Grid and IoT Vulnerabilities

Michael Mimoso
With Federal policy changes pushing more cybersecurity and AI regulation to the state level, CISOs should prepare for even more fragmentation of cybersecurity laws and more jurisdictions to contend with, writes Cristin Flynn Goodwin.
Risk Management
Cyber Resilience
Operational Resilience

50 States of Cybersecurity Complexity

Cristin Flynn Goodwin
The convergence of IT and OT systems, primarily driven by the deployment of IIoT (industrial Internet of Things), cloud computing, and the need for remote monitoring, has fundamentally altered the OT architecture that the Purdue Model was initially designed to help manage.
Zero Trust
Risk Management
Operational Resilience
Operational Technology

Is It Time to Rethink the Purdue Model?

George V. Hulme
OT cybersecurity expert Danielle Jablanski of STV makes her first contribution to Claroty Nexus. She writes about how OT cybersecurity programs should not compromise safety and reliability over the likelihood a vulnerability will be exploited.
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

Throw Likelihood to the Wind: OT Cybersecurity is Categorical, Not Mathematical

Danielle Jablanski
In this episode of the Claroty Nexus Podcast, Austin Allen, Sr. Director of Global Solutions Architecture at Airlock Security, discusses the cybersecurity challenges facing healthcare delivery organizations, and the potential negative impacts of a breach or incident on patient care.
Healthcare
Vulnerability Management
Risk Management

Nexus Podcast: Austin Allen on Healthcare Cybersecurity and Patient Safety

Michael Mimoso
Mike Ratliff, CISO at Providence, one of the country's largest not-for-profit healthcare providers, writes about his organization's attempt to re-think GRC as Governance, Risk, Attack Surface Management, and Compliance (GRAC). Ratliff describes five areas GRAC improves the overall security program, including the quantification and prioritization of risk, the integration of attack surface management, and an architecture that supports secure-by-design principles.
Healthcare
Risk Management
Cyber Resilience
Operational Resilience

Rebuilding Legacy GRC from the Ground Up

Mike Ratliff
Current OT cybersecurity budgeting approaches reflect a misalignment of prioritizing surface-level defenses over architectural shortcomings. Instead, CISOs should demand vendors deliver products that are secure by design, and address systemic failures over a reactive approach to the security of cyber-physical systems.
Industrial
Operational Technology
Risk Management
Technical Debt

The Economics of OT Cybersecurity: Are We Investing in the Wrong Priorities?

Dan Ricci
Gentry Lane, founder of Nemesis Global, joins the Nexus Podcast to discuss how a Cold War tactic known as Salami Cuts is being used against U.S. critical infrastructure. Adversaries who cannot operate on equal footing on a kinetic battlefield, are finding cyberspace to be a level playing field. The use of salami tactics is a strategy of gradually degrading an opposition's dominance by instilling distrust in institutions, utilities, or the government's ability to protect us.
Cyber Resilience
Risk Management
Industrial
Healthcare

Nexus Podcast: Gentry Lane on the Use of 'Salami Cuts' in Cyber Conflict

Michael Mimoso
Latest on Nexus Podcast