Nexus: A Claroty Podcast

By Claroty

Listen to a podcast, please open Podcast Republic app. Available on Google Play Store and Apple App Store.

Image by Claroty

Category: Technology

Open in Apple Podcasts


Open RSS feed


Open Website


Rate for this podcast

Subscribers: 0
Reviews: 0
Episodes: 72

Description

Nexus is a cybersecurity podcast hosted by Claroty Editorial Director Mike Mimoso. Nexus will feature discussions with cybersecurity leaders, researchers, innovators, and influencers, discussing the topics affecting cybersecurity professionals in OT, IoT, and IoMT environments. Nexus is formerly known as Aperture.

Episode Date
Charles Blauner on the Changing Role of the CISO
May 20, 2024
Mikko Hypponen on a Decade of Corporate Ransomware Attacks
May 13, 2024
Adm. Michael Rogers on Geopolitics and Cybersecurity
May 09, 2024
Abel Archundia on Complexity in Critical Infrastructure
Apr 29, 2024
Adam Gluck on Industrial DevOps
Apr 23, 2024
Greg Garcia on the Change Healthcare Cyberattack
Apr 02, 2024
Ryan Pickren on New Web-Based PLC Malware Research
Mar 06, 2024
Mike Rogers on Understanding a CISO's Personal Exposure in Cyber Incidents
Feb 14, 2024
Team82 Answers More of your OT Cybersecurity Questions
Jan 25, 2024
Juan Piacquadio on Securing Pharma 4.0
Jan 10, 2024
David Elfering on CISOs and Cyber Liability Insurance
Jan 04, 2024
Team82 Answers Your Vulnerability Research Questions
Dec 06, 2023
Mandiant on Sandworm APT Attacks in Ukraine
Nov 10, 2023
Don Weber on Security Culture in Control Environments, STAR Methodology
Oct 26, 2023
MITRE on Caldera for OT
Oct 05, 2023
Jim LaBonty on the OT Security Stack
Sep 10, 2023
Stephen Reynolds on Protecting the CISO During Incident Investigations
Aug 28, 2023
Team82 on NAS Research, OPC UA Exploit Framework
Aug 20, 2023
Bishop Fox on OSDP Weaknesses Putting Secure Facilities at Risk
Aug 13, 2023
Jennifer Lyn Walker on Cybersecurity Risks in the Water Sector
Aug 03, 2023
Kathleen Moriarty on CIS' IoT Security Guidance
Jul 16, 2023
Walter Risi on the CISO's Journey from IT to OT
Jul 09, 2023
Noam Moshe on Teltonika 4G IIoT Router Cybersecurity Research
May 30, 2023
Charles Carmakal on Cybersecurity Threats to Healthcare
May 24, 2023
Lorrie Cranor on IoT Security and Privacy Labels
Apr 27, 2023
Skip Sorrels on the 405(d) HICP, Healthcare Cybersecurity
Apr 18, 2023
Dave Elfering on Cyber Liability Insurance
Apr 10, 2023
Vera Mens on Akuvox E11 Vulnerabilities
Mar 22, 2023
Adm. Mike Rogers on the National Cybersecurity Strategy
Mar 09, 2023
Katherine Gronberg on the Federal Government and OT/IoT Cybersecurity
Feb 09, 2023
Noam Moshe on a Generic WAF Bypass Technique
Dec 19, 2022
Sharon Brizinov on Hacking IoT
Dec 12, 2022
Joe Slowik on TRITON Malware, XENOTIME Hacking Group
Oct 28, 2022
Inside Team82's EvilPLC Attack
Oct 20, 2022
Sarah Fluchs Revisits the Top 20 Secure PLC Coding Practices List
Sep 30, 2022
Vergle Gipson on Cyber-Informed Engineering
Sep 28, 2022
Noam Moshe on the Evil PLC Attack
Aug 19, 2022
Dan Gunter on Threat Hunting in Industrial Control Systems
Jul 18, 2022
Dan Ricci on the ICS Advisory Project
Jul 06, 2022
Vera Mens on Hacking Flow Computers
Jun 30, 2022
Don C. Weber on ICS Cybersecurity Training, Education
Jun 15, 2022
Idaho National Lab on the INL Control Environment Laboratory Resource (CELR)
Jun 02, 2022
Thomas Schmidt and Martin Scheu on the Common Security Advisory Framework
May 26, 2022
Daniel Kapellmann Zafra on Incontroller/Pipedream ICS Attack Tools
May 04, 2022
Sharon Brizinov on Hacking and Securing PLCs
Apr 20, 2022
Kylie McClanahan on Automating the Gathering of Vulnerability Information
Mar 29, 2022
Sean Tufts on OT SOC Playbooks, Culture Challenges
Feb 24, 2022
Patrick Miller on Securing Critical Infrastructure in a Time of Conflict
Feb 17, 2022
OT-ISAC on Information-Sharing, Incident Recovery
Jan 30, 2022
Tom VanNorman on OT Cybersecurity Skills Gap
Jan 12, 2022
Claroty, JFrog on Fuzzing BusyBox
Nov 28, 2021
ZDI's Dustin Childs on Pwn2Own Miami
Nov 15, 2021
Exploring and Navigating OT for CISOs
Nov 10, 2021
Gary E. Miller on the GPSD Bug
Oct 27, 2021
Top 20 Secure PLC Coding Practices List
Sep 28, 2021
Dennis Fisher on 'When Bug Bounties Went Boom'
Sep 20, 2021
Tom Pace on SBOMs for ICS and OT
Aug 22, 2021
Tony Baker on OT Cybersecurity Challenges, CIP Security
Aug 10, 2021
Inside the Water Sector Cybersecurity Survey
Jul 02, 2021
Adm. Mike Rogers on Ransomware and OT
Jun 25, 2021
Mandiant on Low-Sophistication OT Attacks
Jun 08, 2021
E-ISAC on Biden 100-Day Plan for Power Grid Cybersecurity
May 18, 2021
Katie Moussouris on Dan Kaminsky, Pay Equity, Vulnerability Disclosure Progress
Apr 29, 2021
Kaspersky, Claroty on OPC Security Research
Mar 30, 2021
Josh Grunzweig on Exchange Zero Days
Mar 17, 2021
Mauro Conti on Assessing the Use of Insecure ICS Protocols
Mar 10, 2021
Water ISAC on Oldsmar Hack, Sector Cybersecurity
Feb 22, 2021
Justin Searle on Pen-Testing ICS
Jan 21, 2021
Tom Tervoort on Zerologon
Dec 17, 2020
Richard Thomas, Joe Gardiner on CVE Discovery Time for ICS
Nov 24, 2020
Dustin Childs on Vulnerability Disclosure, Pwn2Own, ZDI
Nov 18, 2020
Introducing Aperture, A Claroty Podcast
Nov 16, 2020