Blog: Cybersecurity

Cyberattacks in the Food Industry: A Recipe for Potential Disaster
07 November 2023

Cyberattacks in the Food Industry: A Recipe for Potential Disaster

Increased use of Technology Exposes Cybersecurity Vulnerabilities More…

Cyber Threat Landscape of the Healthcare Sector
13 June 2023

Cyber Threat Landscape of the Healthcare Sector

A single cybersecurity breach can cost a hospital system $10 million USD More…

Radio Equipment Directive (RED) Now includes Cybersecurity Requirements
04 April 2023

Radio Equipment Directive (RED) Now includes Cybersecurity Requirements

Measures aim to improve network resilience, protect consumer privacy, and reduce the risk of fraud More…

New Mobile Payment Standard an Advancement for Tap to Phone Technology
14 February 2023

New Mobile Payment Standard an Advancement for Tap to Phone Technology

MPoC standard enables secure payments using smart phones and tablets More…

Connected Vehicle Cybersecurity Threats: Part 2
05 January 2023

Connected Vehicle Cybersecurity Threats: Part 2

A look at what to expect in connected vehicle trends for 2023 More…

Connected Vehicle Cybersecurity Threats: Part 1
13 December 2022

Connected Vehicle Cybersecurity Threats: Part 1

A look at what to expect in connected vehicle trends for 2023 More…

Transport Layer Security: What Stakeholders Need to Know about Communication Security
29 November 2022

Transport Layer Security: What Stakeholders Need to Know about Communication Security

Transport Layer Securities are designed to provide security at the transport layer to prevent third parties from eavesdropping or tampering with messages More…

Keeping IoT Consumer Products Safe from Cyber Threats
04 October 2022

Keeping IoT Consumer Products Safe from Cyber Threats

5 key areas of cybersecurity to focus on when developing and manufacturing secure connected consumer products More…

Cybersecurity Trends in the Manufacturing Industry
20 September 2022

Cybersecurity Trends in the Manufacturing Industry

Top 5 cybersecurity vulnerabilities and how to prevent cybercrime. Learn about recent trends so you can safeguard your systems and devices. More…

The Danger of Administrator Password Reuse
23 August 2022

The Danger of Administrator Password Reuse

Don't let password fatigue lead you to sacrifice security for convenience More…

FDA Guidance for Medical Device Cybersecurity: What Manufacturers Need to Know
19 July 2022

FDA Guidance for Medical Device Cybersecurity: What Manufacturers Need to Know

The importance of identifying vulnerabilities and controlling risk to demonstrate product safety and effectiveness More…

Common Criteria and the EU Cybersecurity Act
21 June 2022

Common Criteria and the EU Cybersecurity Act

The European Union (EU) is pacing up the efforts to keep its citizens safe More…

ETSI Extends Consumer IoT Device Standard to Home Gateways with ETSI EN 303 645
17 May 2022

ETSI Extends Consumer IoT Device Standard to Home Gateways with ETSI EN 303 645

The ETSI EN 303 645 European cybersecurity standard was developed to ensure consumer IoT devices are protected from cybersecurity threats More…

Single Sign-On Technology: Friend or Foe?
19 April 2022

Single Sign-On Technology: Friend or Foe?

Single sign-on authentication technology offers numerous benefits and conveniences, but proper implementation is required to enhance security More…

Ensuring Secure Processing of Payment Transactions
01 March 2022

Ensuring Secure Processing of Payment Transactions

Industry stakeholders are leading the effort to develop standards to enhance global payment account data security More…

Specifications for Automotive Cybersecurity: Part 2
Specifications for Automotive Cybersecurity: Part 1
18 January 2022

Specifications for Automotive Cybersecurity: Part 1

Cybersecurity management system requirements More…

Navigating Cybersecurity Standards and Regulations for Medical Devices
Cyber Security and the Human Element
05 October 2021

Cyber Security and the Human Element

Modifying human behaviour to minimize risk More…

Part 2: Operational Technology Risk Assessments and Cybersecurity Principles
Part 1: Risk Assessments and Security Reviews for Operational Technology
Cyber Security Awareness Training
Cybersecurity for Connected Products: Part 2
Cybersecurity for Connected Products: Part 1
Power in Numbers
29 January 2021

Power in Numbers

Cyber Threat Information Sharing More…

Establishing Accredited Cybersecurity Test Certification Programs, Part 2
Establishing Accredited Cybersecurity Test Certification Programs, Part 1
The Evolution of Penetration Test Reports
04 December 2020

The Evolution of Penetration Test Reports

Is it Time to Treat Cyber Risk like Financial Risk? More…

Cybersecurity in a Mass Remote Working World
03 November 2020

Cybersecurity in a Mass Remote Working World

Considerations to Secure and Protect Systems and Data More…

Anatomy of an O-TTPS Third-Party Assessment
Cyber Security Awareness of White Label Products
01 September 2020

Cyber Security Awareness of White Label Products

IoT Product Safety Trends and Services More…

Department of Defense Information Network Approved Products List Certification
Passwords and Secure Authentication – A Proportionate Approach
Connectivity in Medical Devices
29 May 2020

Connectivity in Medical Devices

Cybersecurity and Risk Management Principles More…

Smart Grid Solutions and Modernization
26 March 2020

Smart Grid Solutions and Modernization

Infrastructure and Communications Considerations More…

FIPS: Is it Chaos or New CMVP Entropy Requirements?
27 February 2020

FIPS: Is it Chaos or New CMVP Entropy Requirements?

An Update on IG G7.18 Entropy Estimation and Compliance with SP 800-90 More…

FIPS: Time is Money
16 January 2020

FIPS: Time is Money

Difficulties of Managing Specialized Documentation for Different Certifications More…

FIPS: Legacy Mix-Up
19 December 2019

FIPS: Legacy Mix-Up

An Update on IG G.18 and the Transition from 186-2 More…

FIPS: A Brave New World
05 December 2019

FIPS: A Brave New World

An Update on the FIPS 140-3 Transition More…

FIPS: Important update on algorithm testing
07 November 2019

FIPS: Important update on algorithm testing

Automated Cryptographic Validation Protocol (ACVP) More…

Mobile Secure Payment Requirements
03 September 2019

Mobile Secure Payment Requirements

SpoC Testing Overview More…

Medical Device Cybersecurity - Part 2
19 July 2019

Medical Device Cybersecurity - Part 2

Safely Test and Deploy Connected Products More…

Medical Device Cybersecurity - Part 1
16 July 2019

Medical Device Cybersecurity - Part 1

Safely Test and Deploy Connected Products More…

Hazards and Safety Requirements of Internet of Things (IoT)
11 September 2018

Hazards and Safety Requirements of Internet of Things (IoT)

A high-level summary of standards on the horizon for the connected world More…

 
29376
187
6951/7664/3179/
389
0