
Michael Mimoso
Director of Influencer Marketing at Claroty
Editorial Director at Claroty Nexus
Editorial Director at Claroty, Former Threatpost Editor-in-Chief
Articles
-
3 days ago |
nexusconnect.io | Michael Mimoso
Critical infrastructure protection is at a crossroads with numerous pressures coming at asset owners and operators from multiple directions ranging from threats to regulatory compliance. Over here are state-affiliated attackers actively targeting operational technology (OT), cyber-physical systems, and IT networks not only within the 16 critical infrastructure sectors but also military targets.
-
1 week ago |
nexusconnect.io | Michael Mimoso
Much has been written and said about software bills of material (SBOM) and their value to cybersecurity teams, in particular those responsible for vulnerability and patch management. Knowing what software components make up a commercial product—including open source libraries—is essential to understanding the potential risks and exposures associated with either an off-the-shelf or homegrown application. There may be another such tool going mainstream soon—the hardware bill of materials (HBOM).
-
2 weeks ago |
nexusconnect.io | Michael Mimoso
For more than a decade, ransomware has been an online criminal’s most direct path to revenue and profit. Strategies and innovations such as ransomware-as-a-service have fostered an evolution of these attacks. Targeting of victims has shifted as well from individuals in ransomware’s early days to Cryptolocker’s 2013 transformation of these attacks into for-profit campaigns.
-
1 month ago |
nexusconnect.io | Michael Mimoso
The prevalence of connected clinical IoT devices such as wearable patient monitoring systems that measure and report on anything from glucose levels to heart rates means there’s a level of maturity to these deployments. While these devices are crucial to optimal patient care, their maturity doesn’t necessarily include cybersecurity. Many of these devices lack, or were not designed with, security features such as authentication and data protection in mind.
-
1 month ago |
nexusconnect.io | Michael Mimoso
The prevalence of connected clinical IoT devices such as wearable patient monitoring systems that measure and report on anything from glucose levels to heart rates means there’s a level of maturity to these deployments. While these devices are crucial to optimal patient care, their maturity doesn’t necessarily include cybersecurity. Many of these devices lack, or were not designed with, security features such as authentication and data protection in mind.
Try JournoFinder For Free
Search and contact over 1M+ journalist profiles, browse 100M+ articles, and unlock powerful PR tools.
Start Your 7-Day Free Trial →X (formerly Twitter)
- Followers
- 5K
- Tweets
- 13K
- DMs Open
- No

Brand new #NexusPodcast for you today, recorded at #RSAC with Cassie Crossley of @SchneiderElec on hardware security and how critical infrastructure, military installations, and government agencies need hardware bills of materials #HBOMs https://t.co/sPR98XbTui @Claroty

RT @Claroty: 🎉 Today marks the beginning of Claromonth, which commemorates @Claroty's anniversary since being founded in May 2015. Stay tun…

Former NSA Director Adm. Michael S. Rogers is back on @Claroty Nexus with an excellent contribution looking at the impact of IT/#OT #convergence on critical infrastructure the difference it's made in protecting these systems. https://t.co/MJewF8d7a5