A futuristic illustration showcasing the potential of cloud computing in revolutionizing technology and data management.
11 Jun 2024

Securing Digital and Physical Worlds with IEC 62443 and ISO 27001

Choosing the Right Cybersecurity Standard for Optimal Protection

Image of a doctor using a tablet with healthcare-related icons.
04 Jun 2024

Ensuring Cybersecurity in Medical Devices

A Proactive Approach can Streamline Compliance and Reduce Vulnerabilities

The image shows a person typing on a laptop. The content includes a warning message with options to not show it again. Tags for the image include text, person, laptop, computer, typing, and indoor.
14 May 2024

Strategies to Mitigate Insider Cybersecurity Threats

How Employees Can Unintentionally Compromise Cybersecurity

The image is a background pattern featuring the words "AI," "Al," "HEALTHCARE TECHNOLOGY," and "Gro." It appears to be a simulation and includes the tags: screenshot, technology, and person.
16 Apr 2024

The Future of Healthcare – The Evolution of AI and ML in Medical Devices

Improving patient outcomes while ensuring privacy, security, and regulatory compliance

12 Dec 2023

Software in a Medical Device vs. Software as a Medical Device: Understanding the Differences - Part 1

A look at the convergence of hardware-centric medical devices and software-driven solutions

07 Nov 2023

Cyberattacks in the Food Industry: A Recipe for Potential Disaster

Increased use of Technology Exposes Cybersecurity Vulnerabilities

Blog wide banner
13 Jun 2023

Cyber Threat Landscape of the Healthcare Sector

A single cybersecurity breach can cost a hospital system $10 million USD

Blog wide banner
04 Apr 2023

Radio Equipment Directive (RED) Now includes Cybersecurity Requirements

Measures aim to improve network resilience, protect consumer privacy, and reduce the risk of fraud

Blog wide banner
14 Feb 2023

New Mobile Payment Standard an Advancement for Tap to Phone Technology

MPoC standard enables secure payments using smart phones and tablets

Blog wide banner
05 Jan 2023

Connected Vehicle Cybersecurity Threats: Part 2

A look at what to expect in connected vehicle trends for 2023

Blog wide banner
13 Dec 2022

Connected Vehicle Cybersecurity Threats: Part 1

A look at what to expect in connected vehicle trends for 2023

Blog wide banner
29 Nov 2022

Transport Layer Security: What Stakeholders Need to Know about Communication Security

Transport Layer Securities are designed to provide security at the transport layer to prevent third parties from eavesdropping or tampering with messages

Blog wide banner
04 Oct 2022

Keeping IoT Consumer Products Safe from Cyber Threats

5 key areas of cybersecurity to focus on when developing and manufacturing secure connected consumer products

Photo of man working in manufacturing space
20 Sep 2022

Cybersecurity Trends in the Manufacturing Industry

Top 5 cybersecurity vulnerabilities and how to prevent cybercrime. Learn about recent trends so you can safeguard your systems and devices

Blog wide banner
23 Aug 2022

The Danger of Administrator Password Reuse

Don't let password fatigue lead you to sacrifice security for convenience

Blog wide banner
19 Jul 2022

FDA Guidance for Medical Device Cybersecurity: What Manufacturers Need to Know

The importance of identifying vulnerabilities and controlling risk to demonstrate product safety and effectiveness

Photo of several locks depicting cybersecurity
21 Jun 2022

Common Criteria and the EU Cybersecurity Act

The European Union (EU) is pacing up the efforts to keep its citizens safe

Photo of several IoT connected consumer devices
17 May 2022

ETSI Extends Consumer IoT Device Standard to Home Gateways with ETSI EN 303 645

The ETSI EN 303 645 European cybersecurity standard was developed to ensure consumer IoT devices are protected from cybersecurity threats

Young woman logging into her smartphone device using single sign on technology
19 Apr 2022

Single Sign-On Technology: Friend or Foe?

Single sign-on authentication technology offers numerous benefits and conveniences, but proper implementation is required to enhance security

Blog wide banner
01 Mar 2022

Ensuring Secure Processing of Payment Transactions

Industry stakeholders are leading the effort to develop standards to enhance global payment account data security

Blog wide banner
01 Feb 2022

Specifications for Automotive Cybersecurity: Part 2

Threats and mitigations to consider

Blog wide banner
18 Jan 2022

Specifications for Automotive Cybersecurity: Part 1

Cybersecurity management system requirements

Blog wide banner
23 Nov 2021

Navigating Cybersecurity Standards and Regulations for Medical Devices

Keeping patient information and networks secure

Blog wide banner
05 Oct 2021

Cyber Security and the Human Element

Modifying human behaviour to minimize risk

Blog wide banner
01 Jun 2021

Cyber Security Awareness Training

The Power of Context

Blog wide banner
11 May 2021

Cybersecurity for Connected Products: Part 2

Assessments and Best Practices

Blog wide banner
30 Apr 2021

Cybersecurity for Connected Products: Part 1

Understanding the Threat Landscape

Blog wide banner
29 Jan 2021

Power in Numbers

Cyber Threat Information Sharing

Blog wide banner
11 Dec 2020

Establishing Accredited Cybersecurity Test Certification Programs, Part 2

The Testing and Certification Process for Products/Systems

Blog wide banner
08 Dec 2020

Establishing Accredited Cybersecurity Test Certification Programs, Part 1

Program Support for ITS Products/Systems

Blog wide banner
04 Dec 2020

The Evolution of Penetration Test Reports

Is it Time to Treat Cyber Risk like Financial Risk?

Blog wide banner
03 Nov 2020

Cybersecurity in a Mass Remote Working World

Considerations to Secure and Protect Systems and Data

Blog wide banner
13 Oct 2020

Anatomy of an O-TTPS Third-Party Assessment

A Quick Step Guide

Blog wide banner
01 Sep 2020

Cyber Security Awareness of White Label Products

IoT Product Safety Trends and Services

Blog wide banner
23 Jun 2020

Passwords and Secure Authentication – A Proportionate Approach

Tips on Creating Strong Passwords

Blog wide banner
29 May 2020

Connectivity in Medical Devices

Cybersecurity and Risk Management Principles

Blog wide banner
26 Mar 2020

Smart Grid Solutions and Modernization

Infrastructure and Communications Considerations

Blog wide banner
27 Feb 2020

FIPS: Is it Chaos or New CMVP Entropy Requirements?

An Update on IG G7.18 Entropy Estimation and Compliance with SP 800-90

16 Jan 2020

FIPS: Time is Money

Difficulties of Managing Specialized Documentation for Different Certifications

19 Dec 2019

FIPS: Legacy Mix-Up

An Update on IG G.18 and the Transition from 186-2

05 Dec 2019

FIPS: A Brave New World

An Update on the FIPS 140-3 Transition

07 Nov 2019

FIPS: Important update on algorithm testing

Automated Cryptographic Validation Protocol (ACVP)

03 Sep 2019

Mobile Secure Payment Requirements

SpoC Testing Overview

19 Jul 2019

Medical Device Cybersecurity - Part 2

Safely Test and Deploy Connected Products

16 Jul 2019

Medical Device Cybersecurity - Part 1

Safely Test and Deploy Connected Products

11 Sep 2018

Hazards and Safety Requirements of Internet of Things (IoT)

A high-level summary of standards on the horizon for the connected world