Archive

All entries

In this episode of the Nexus Podcast, CISA ICS Cybersecurity Lead Matthew Rogers discusses new guidance from the agency on the use of security operational technology (OT) protocols, titled “Barriers to Secure OT Communication: Why Johnny Can’t Authenticate.” The paper advocates for the use of secure versions of legacy OT protocols, or the adoption of open standards by OEMs, in order to bring authentication and integrity to OT protocol communication.
Cyber Resilience
Industrial
Operational Resilience
Operational Technology
Risk Management
Vulnerability Management

Nexus Podcast: CISA’s Matthew Rogers on Secure OT Protocol Communication

Michael Mimoso
Adam Jurgensen, Medical Device Security Engineer at Valley Health Systems, brings us inside the roles and responsibilities of those experts overseeing connected devices inside healthcare organizations. Jurgensen describes the restrictions his role faces when it comes to updating and patching connected medical devices, the gamut of which may run from MRIs, CT, ultrasounds, to patient monitors, and defibrillators. Compensating controls, segmentation, and other cybersecurity strategies are key for keeping devices secure and patients safe in the event of an incident.
Nexus Conference
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience

Adam Jurgensen on Medical Device Cybersecurity

Adam Jurgensen, Medical Device Security Engineer at Valley Health Systems, brings us inside the roles and responsibilities of those experts overseeing…
Michael Mimoso
Team82 vulnerability research lead Noam Moshe discusses his team’s expansive look into IP-based surveillance cameras manufactured by Sweden’s Axis Communications, a leading company in this space. Companies like Axis are selling more and more into Western enterprises given bans on certain Chinese technologies. Moshe’s research uncovered a number of vulnerabilities in the management framework used to oversee these devices, as well as the communication protocol in play. Attackers can exploit these issues to gain control of cameras, move onto the corporate network, and disrupt the safety of a business.
Nexus Conference
Internet of Things
Vulnerability Management

Noam Moshe on Hacking Enterprise-Grade IP Cameras

Team82 vulnerability research lead Noam Moshe discusses his team’s expansive look into IP-based surveillance cameras manufactured by Sweden’s Axis…
Michael Mimoso
Cybersecurity experts identify five trends that leaders responsible for cyber-physical systems protection programs and OT security must strategize around.
Cyber Resilience
Industrial
Operational Technology
Operational Resilience
Vulnerability Management
Risk Management

5 Trends Driving OT Security in 2026: From State-Sponsored Attacks to AI-Powered Threats

George V. Hulme
Compensating controls are often the only cybersecurity options available to offset risk in operational technology environments still supporting legacy technology or end-of-life industrial control systems or field devices.
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

Nexus Reflections and Predictions: Don C. Weber

Don C. Weber
umbelino_prediction.jpg
Operational Technology
Cyber Resilience
Vulnerability Management

Nexus Reflections and Predictions: Pedro Umbelino

Pedro Umbelino
Congress' failure to reauthorize the Cybersecurity Information Sharing Act of 2015 (CISA 2015) signals a fundamental shift in threat intelligence sharing and overall risk management strategies.
Vulnerability Management
Risk Management
Cyber Resilience
Industrial
Healthcare
Internet of Things

CISO Survival Guide: 4 Steps to Prepare for CISA 2015 Expiration

George V. Hulme
Amazon's intent to replace humans with robots represents a wave of cyber-physical systems (CPS) security that will need to be implemented not only in the logistics and warehousing industries but also for work-in-process (WIP) inventory in manufacturing and other critical industries.
Cyber Resilience
Industrial
Internet of Things
Operational Resilience
Operational Technology
Vulnerability Management
Risk Management

Automation Inroads Bring Urgency to CPS Protection

Jim LaBonty
nexus_frenz.jpg
Healthcare
Vulnerability Management
Risk Management
Internet of Things
Cyber Resilience

Nexus Podcast: Christopher Frenz on Evidence-Based Security

Michael Mimoso
Samantha Jacques, VP Clinical Engineering, at McLaren Health Care, explains the technology complexity hospitals and clinical environment cybersecurity teams encounter and how it impacts risk management and mitigation. While there are standardized IT systems, the medical devices and operational technology prevalent in hospitals are far from it. Myriad manufacturers and configurations significantly complicate risk mitigation efforts. Jacques explains how to best navigate those waters in order to reduce overall cyber risk.
Healthcare
Vulnerability Management
Risk Management
Cyber Resilience
Nexus Conference

Samantha Jacques on Cyber Risk Mitigation in Healthcare

Samantha Jacques, VP Clinical Engineering, at McLaren Health Care, explains the technology complexity hospitals and clinical environment cybersecurity teams…
Michael Mimoso
ASL Roma 1 CISO Stefano Scaramuzzino and Deloitte analyst Fabio Battelli write about how Italy's largest public healthcare system's HOPE initiative adds automated intelligence to its cybersecurity governance program. HOPE reimagines cybersecurity not as a defensive function, but as a living cognitive system that learns, correlates, and reasons across every layer of the healthcare ecosystem. It marks the birth of a new discipline for digital public health: operational intelligence for healthcare governance.
Healthcare
Cyber Resilience
Vulnerability Management
Risk Management

HOPE: Intelligent Governance Transforming Healthcare Cybersecurity at ASL Roma 1

Stefano Scaramuzzino
Fabio Battelli
nexus_enisa-report.jpg
Operational Technology
Industrial
Vulnerability Management
Risk Management

ENISA Warns of Escalating OT Threats

George V. Hulme
Latest on Nexus Podcast