Archive

All entries

Cyber Resilience
Risk Management
Vulnerability Management

Nexus Podcast: Diana Kelley on Securing AI Systems

Michael Mimoso
Expert Don C. Weber writes that safety devices are within scope for cybersecurity risk assessments. This includes conducting high-level risk assessments to assemble documentation for specific Systems-under-Consideration (SuC) of the safety solution, performing a vulnerability assessment of the SuC, feeding the results into the detailed risk assessment to allow the risk management team to identify and address residual risks.
Operational Technology
Operational Resilience
Vulnerability Management

Architecting Safety Using Cybersecurity Requirements and Assessments

Don C. Weber
Healthcare
Cyber Resilience
Vulnerability Management

Nexus Podcast: Greg Garcia on the Change Healthcare Cyberattack

Michael Mimoso
Healthcare
Vulnerability Management
Risk Management

FDA Sets Sights on Medical Device Vulnerability Management

George V. Hulme
Researcher Ryan Pickren explains a new web-based attack against programmable logic controllers (PLCs) that uses malicious JavaScript to attack the front end of an embedded web server prevalent in modern PLCs.
Operational Technology
Vulnerability Management
Internet of Things

Nexus Podcast: Ryan Pickren on New Web-Based PLC Malware Research

Michael Mimoso
Understanding the nuances of OT cybersecurity vulnerabilities becomes imperative for IT cybersecurity teams to develop comprehensive defense strategies that safeguard both IT and OT environments.
Operational Technology
Operational Resilience
Vulnerability Management
Risk Management

What IT Cybersecurity Teams Need to Know about OT Vulnerabilities (Part 1)

Dan Ricci
Team82’s Noam Moshe discusses state actor targeting of OT, why it’s so challenging to develop ransomware for OT and industrial control systems, and the mitigation strategies available to defenders of cyber-physical systems.
Internet of Things
Operational Technology
Vulnerability Management

Nexus Podcast: Team82 Answers More of your Cybersecurity Research Questions

Michael Mimoso
Risk Management
Vulnerability Management
Zero Trust
Operational Technology

A Strategic Necessity: Compensating Controls in ICS, OT

George V. Hulme
Operational Technology
Vulnerability Management
Operational Resilience

OT Patch Management Truths

George V. Hulme
Cyber Resilience
Internet of Things
Nexus Conference
Vulnerability Management

Srinivas Tummalapenta on the Cybersecurity Potential of AI

Srinivas Tummalapenta, Distinguished Engineer & CTO, IBM Consulting Cybersecurity Services, discusses the applications of AI and cybersecurity, in particular…
Michael Mimoso
Claroty Team82 Director of Vulnerability Research Sharon Brizinov and Vulnerability Researcher Noam Moshe discuss their research process, the technical resources at their disposal, and the threat landscape.
Operational Technology
Vulnerability Management

Nexus Podcast: Team82 Answers Your Questions

Michael Mimoso
Cyber Resilience
Vulnerability Management

Carraig Stanwyck on AI for Adaptive Defense

Carraig Stanwyck, VP Global Cybersecurity at Avnet, explains how artificial intelligence and machine learning is being used for adaptive defenses that learn…
Michael Mimoso

Latest on Nexus Podcast