Articles

Recent articles

Compensating controls are often the only cybersecurity options available to offset risk in operational technology environments still supporting legacy technology or end-of-life industrial control systems or field devices.
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

Nexus Reflections and Predictions: Don C. Weber

Don C. Weber
umbelino_prediction.jpg
Operational Technology
Cyber Resilience
Vulnerability Management

Nexus Reflections and Predictions: Pedro Umbelino

Pedro Umbelino
Congress' failure to reauthorize the Cybersecurity Information Sharing Act of 2015 (CISA 2015) signals a fundamental shift in threat intelligence sharing and overall risk management strategies.
Vulnerability Management
Risk Management
Cyber Resilience
Industrial
Healthcare
Internet of Things

CISO Survival Guide: 4 Steps to Prepare for CISA 2015 Expiration

George V. Hulme
Amazon's intent to replace humans with robots represents a wave of cyber-physical systems (CPS) security that will need to be implemented not only in the logistics and warehousing industries but also for work-in-process (WIP) inventory in manufacturing and other critical industries.
Cyber Resilience
Industrial
Internet of Things
Operational Resilience
Operational Technology
Vulnerability Management
Risk Management

Automation Inroads Bring Urgency to CPS Protection

Jim LaBonty
ASL Roma 1 CISO Stefano Scaramuzzino and Deloitte analyst Fabio Battelli write about how Italy's largest public healthcare system's HOPE initiative adds automated intelligence to its cybersecurity governance program. HOPE reimagines cybersecurity not as a defensive function, but as a living cognitive system that learns, correlates, and reasons across every layer of the healthcare ecosystem. It marks the birth of a new discipline for digital public health: operational intelligence for healthcare governance.
Healthcare
Cyber Resilience
Vulnerability Management
Risk Management

HOPE: Intelligent Governance Transforming Healthcare Cybersecurity at ASL Roma 1

Stefano Scaramuzzino
Fabio Battelli
nexus_enisa-report.jpg
Operational Technology
Industrial
Vulnerability Management
Risk Management

ENISA Warns of Escalating OT Threats

George V. Hulme
Building management systems (BMS) are centralized platforms that oversee a building’s mechanical, electrical, and environmental systems. Yet they are often overlooked with regard to an organization’s cybersecurity planning. Expert Dan Ricci explains why and provides six strategies for securing BMS.
Operational Resilience
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

The Overlooked Cyber Risk: Building Management Systems in Critical Infrastructure

Dan Ricci
Vulnerability scoring models such as CVSS 3.1 and CVSS 4.0 must evolve to include contextual information that helps network and systems analysts and security teams better prioritize remediation, mitigation, and patching processes.
Vulnerability Management
Risk Management
Operational Technology
Cyber Resilience

CVSS Scores No Longer Enough: The Move to Context-Driven Vulnerability Management

George V. Hulme
Experts weigh in on the recent Cybersecurity and Infrastructure Security Agency (CISA) guidance aimed at addressing the risks associated with the convergence of OT/IT in modern industrial organizations. CISA recommends enhanced asset inventories and taxonomies as foundational cybersecurity pieces of an OT security program.
Operational Technology
Vulnerability Management
Risk Management

Asset Management Key to Mitigating OT/IT Convergence Cybersecurity Risks

George V. Hulme
Threat intelligence for operational technology environments differs from traditional IT threat intelligence. OT threat intelligence requires contextual, situational awareness that identifies vulnerabilities and anomalies, and also which assets, and in what part of the process, are exposed. It must also note what the safety and operational consequences would be if exploited. This context enables security teams to prioritize risk mitigation according to real-world impact rather than theoretical severity.
Vulnerability Management
Risk Management
Operational Technology
Operational Resilience
Cyber Resilience

Why Traditional Threat Intelligence Falls Short For Operational Technology

George V. Hulme
black-hat-media-panel-1.jpeg
Cyber Resilience
Operational Resilience
Vulnerability Management
Risk Management

Panel: Nation-States Leveraging CPS to Damage Confidence in Resilience, Response

Michael Mimoso
OT cybersecurity expert Danielle Jablanski of STV makes her first contribution to Claroty Nexus. She writes about how OT cybersecurity programs should not compromise safety and reliability over the likelihood a vulnerability will be exploited.
Operational Technology
Cyber Resilience
Vulnerability Management
Risk Management

Throw Likelihood to the Wind: OT Cybersecurity is Categorical, Not Mathematical

Danielle Jablanski
Latest on Nexus Podcast