Blog: Cybersecurity
Cyberattacks in the Food Industry: A Recipe for Potential Disaster
Increased use of Technology Exposes Cybersecurity Vulnerabilities More…
Cyber Threat Landscape of the Healthcare Sector
A single cybersecurity breach can cost a hospital system $10 million USD More…
Radio Equipment Directive (RED) Now includes Cybersecurity Requirements
Measures aim to improve network resilience, protect consumer privacy, and reduce the risk of fraud More…
New Mobile Payment Standard an Advancement for Tap to Phone Technology
MPoC standard enables secure payments using smart phones and tablets More…
Connected Vehicle Cybersecurity Threats: Part 2
A look at what to expect in connected vehicle trends for 2023 More…
Connected Vehicle Cybersecurity Threats: Part 1
A look at what to expect in connected vehicle trends for 2023 More…
Transport Layer Security: What Stakeholders Need to Know about Communication Security
Transport Layer Securities are designed to provide security at the transport layer to prevent third parties from eavesdropping or tampering with messages More…
Keeping IoT Consumer Products Safe from Cyber Threats
5 key areas of cybersecurity to focus on when developing and manufacturing secure connected consumer products More…
Cybersecurity Trends in the Manufacturing Industry
Top 5 cybersecurity vulnerabilities and how to prevent cybercrime. Learn about recent trends so you can safeguard your systems and devices. More…
The Danger of Administrator Password Reuse
Don't let password fatigue lead you to sacrifice security for convenience More…
FDA Guidance for Medical Device Cybersecurity: What Manufacturers Need to Know
The importance of identifying vulnerabilities and controlling risk to demonstrate product safety and effectiveness More…
Common Criteria and the EU Cybersecurity Act
The European Union (EU) is pacing up the efforts to keep its citizens safe More…
ETSI Extends Consumer IoT Device Standard to Home Gateways with ETSI EN 303 645
The ETSI EN 303 645 European cybersecurity standard was developed to ensure consumer IoT devices are protected from cybersecurity threats More…
Single Sign-On Technology: Friend or Foe?
Single sign-on authentication technology offers numerous benefits and conveniences, but proper implementation is required to enhance security More…
Ensuring Secure Processing of Payment Transactions
Industry stakeholders are leading the effort to develop standards to enhance global payment account data security More…
Specifications for Automotive Cybersecurity: Part 2
Threats and mitigations to consider More…
Specifications for Automotive Cybersecurity: Part 1
Cybersecurity management system requirements More…
Navigating Cybersecurity Standards and Regulations for Medical Devices
Keeping patient information and networks secure More…
Cyber Security and the Human Element
Modifying human behaviour to minimize risk More…
Part 2: Operational Technology Risk Assessments and Cybersecurity Principles
An 8-Step Guide More…
Part 1: Risk Assessments and Security Reviews for Operational Technology
An Overview More…
Cyber Security Awareness Training
The Power of Context More…
Cybersecurity for Connected Products: Part 2
Assessments and Best Practices More…
Cybersecurity for Connected Products: Part 1
Understanding the Threat Landscape More…
Power in Numbers
Cyber Threat Information Sharing More…
Establishing Accredited Cybersecurity Test Certification Programs, Part 2
The Testing and Certification Process for Products/Systems More…
Establishing Accredited Cybersecurity Test Certification Programs, Part 1
Program Support for ITS Products/Systems More…
The Evolution of Penetration Test Reports
Is it Time to Treat Cyber Risk like Financial Risk? More…
Cybersecurity in a Mass Remote Working World
Considerations to Secure and Protect Systems and Data More…
Anatomy of an O-TTPS Third-Party Assessment
A Quick Step Guide More…
Cyber Security Awareness of White Label Products
IoT Product Safety Trends and Services More…
Department of Defense Information Network Approved Products List Certification
Understanding the Process More…
Passwords and Secure Authentication – A Proportionate Approach
Tips on Creating Strong Passwords More…
Connectivity in Medical Devices
Cybersecurity and Risk Management Principles More…
Smart Grid Solutions and Modernization
Infrastructure and Communications Considerations More…
FIPS: Is it Chaos or New CMVP Entropy Requirements?
An Update on IG G7.18 Entropy Estimation and Compliance with SP 800-90 More…
FIPS: Time is Money
Difficulties of Managing Specialized Documentation for Different Certifications More…
FIPS: Legacy Mix-Up
An Update on IG G.18 and the Transition from 186-2 More…
FIPS: A Brave New World
An Update on the FIPS 140-3 Transition More…
FIPS: Important update on algorithm testing
Automated Cryptographic Validation Protocol (ACVP) More…
Mobile Secure Payment Requirements
SpoC Testing Overview More…
Medical Device Cybersecurity - Part 2
Safely Test and Deploy Connected Products More…
Medical Device Cybersecurity - Part 1
Safely Test and Deploy Connected Products More…
Hazards and Safety Requirements of Internet of Things (IoT)
A high-level summary of standards on the horizon for the connected world More…