Articles

Recent articles

The Department of Defense has issued comprehensive guidance requiring all organizational units to implement zero-trust security principles across operational technology (OT) systems, marking a fundamental shift in how the military secures critical infrastructure from power grids to manufacturing control systems.
Zero Trust
Operational Technology
Cyber Resilience
Federal

Pentagon Mandates Zero Trust Security Framework for Operational Technology Environments

George V. Hulme
The convergence of IT and OT systems, primarily driven by the deployment of IIoT (industrial Internet of Things), cloud computing, and the need for remote monitoring, has fundamentally altered the OT architecture that the Purdue Model was initially designed to help manage.
Zero Trust
Risk Management
Operational Resilience
Operational Technology

Is It Time to Rethink the Purdue Model?

George V. Hulme
nexus_secure-access-visibility.jpg
Zero Trust
Operational Resilience
Operational Technology
Industrial

Poor Visibility Still a Drag on Secure Third-Party Remote Access

George V. Hulme
The European Union Agency for Cybersecurity (ENISA)'s NIS360 report identifies gaps in the current state of NIS2 compliance readiness and provides recommendations to lawmakers and affected industry verticals on what they need to do to become NIS2 compliant.
Cyber Resilience
Healthcare
Industrial
Operational Resilience
Operational Technology
Zero Trust

ENISA Attempts to Move NIS2 Forward with NIS360 Findings

George V. Hulme
As shop floors and factories get smarter, there is an unprecedented surge in, and demand for, remote access to manufacturing systems. Former Pfizer global head of automation engineering Jim LaBonty writes for Claroty Nexus about the need to secure remote access to manufacturing environments to reduce risk and improve efficiency.
Cyber Resilience
Operational Technology
Zero Trust

Secure Remote Access for Smart Factory Environments

Jim LaBonty
nexus_pipeline.jpg
Risk Management
Vulnerability Management
Zero Trust
Operational Technology

A Strategic Necessity: Compensating Controls in ICS, OT

George V. Hulme
nexus_behavioral-identity.jpg
Zero Trust

Behavioral Identity as the New Perimeter

John Frushour
Implementing a zero-trust architecture for operational technology environment ensures additional security around cyber physical systems processes that are essential to our way of life.
Zero Trust
Industrial

The Zero Trust for OT Imperative

George V. Hulme
Latest on Nexus Podcast