Articles

Recent articles

nexus_smart-factory-remote-access.jpg
Cyber Resilience
Operational Technology
Zero Trust

Secure Remote Access for Smart Factory Environments

Jim LaBonty
nexus_weber-it-ot.jpg
Industrial
Operational Technology
Cyber Resilience

Accelerating IACS/OT Cybersecurity Improvements

Don C. Weber
nexus_5-predictions.jpg
Cyber Resilience
Operational Technology
Operational Resilience
Risk Management

Five Trends Driving OT Cybersecurity in 2025

George V. Hulme
nexus_ballentine-reflection.jpg
Cyber Resilience
Operational Technology
Operational Resilience
Vulnerability Management

Nexus Reflections and Predictions: John Ballentine

John Ballentine
nexus_ricci-reflection.jpg
Operational Technology
Cyber Resilience
Operational Resilience
Vulnerability Management

Nexus Reflections and Predictions: Dan Ricci

Dan Ricci
Securing connectivity in operational technology (OT) environments is crucial for the safety of critical infrastructure and maintaining the uninterrupted service it provides. Leaving unnecessary open ports, protocols, and services exposed, along with directly connected devices to the internet, such as programmable logic controllers (PLCs) and human machine interfaces (HMIs), greatly increases the risks of cyberattacks.
Industrial
Operational Technology
Risk Management

Explaining the Importance of Secure Connectivity in OT

Dan Ricci
nexus_secure-by-design-labonty.jpg
Operational Technology
Cyber Resilience

Secure by Design in Manufacturing is Not an Empty Concept

Jim LaBonty
nexus_devops-geo.jpg
Operational Technology

Does DevOps have a place in OT/ICS Development?

George V. Hulme
nexus_sign.jpg
Cyber Resilience
Healthcare
Industrial
Operational Technology
Risk Management

CPS Security Leaders Convene on One Goal: Protect Mission-Critical Infrastructure

Upa Campbell
In OT and ICS cybersecurity, living off the land (LOTL) techniques refer to the practice of attackers using the existing tools and processes in a target system to carry out their malicious activities. This approach is particularly dangerous because it allows the attacker to blend in with everyday activities, making detection significantly more challenging.
Operational Technology
Cyber Resilience
Industrial

How Living-Off-The-Land Techniques Impact OT and ICS

Dan Ricci
If we are indeed at the full outset of Industry 4.0, the fourth industrial revolution, initiatives such as smart manufacturing will not truly succeed without keen awareness of new cybersecurity risks introduced by IT/OT connectivity and advanced technologies.
Cyber Resilience
Internet of Things
Operational Resilience
Operational Technology

Smart Manufacturing Requires Proactive Cybersecurity

Jim LaBonty
Secure remote access for third parties is a growing demand within OT and ICS environments. CISOs must understand and mitigate the risk third-party access introduces by having visibility into these connections, limiting access when appropriate, and applying other mitigations.
Operational Technology

Closing the Door on Third-Party Access Risks

George V. Hulme
Latest on Nexus Podcast