Blog: Cybersecurity
ETSI Extends Consumer IoT Device Standard to Home Gateways with ETSI EN 303 645
The ETSI EN 303 645 European cybersecurity standard was developed to ensure consumer IoT devices are protected from cybersecurity threats More…
Single Sign-On Technology: Friend or Foe?
Single sign-on authentication technology offers numerous benefits and conveniences, but proper implementation is required to enhance security More…
Ensuring Secure Processing of Payment Transactions
Industry stakeholders are leading the effort to develop standards to enhance global payment account data security More…
Specifications for Automotive Cybersecurity: Part 2
Threats and mitigations to consider More…
Specifications for Automotive Cybersecurity: Part 1
Cybersecurity management system requirements More…
Navigating Cybersecurity Standards and Regulations for Medical Devices
Keeping patient information and networks secure More…
Cyber Security and the Human Element
Modifying human behaviour to minimize risk More…
Part 2: Operational Technology Risk Assessments and Cybersecurity Principles
An 8-Step Guide More…
Part 1: Risk Assessments and Security Reviews for Operational Technology
An Overview More…
Cyber Security Awareness Training
The Power of Context More…
Cybersecurity for Connected Products: Part 2
Assessments and Best Practices More…
Cybersecurity for Connected Products: Part 1
Understanding the Threat Landscape More…
Power in Numbers
Cyber Threat Information Sharing More…
Establishing Accredited Cybersecurity Test Certification Programs, Part 2
The Testing and Certification Process for Products/Systems More…
Establishing Accredited Cybersecurity Test Certification Programs, Part 1
Program Support for ITS Products/Systems More…
The Evolution of Penetration Test Reports
Is it Time to Treat Cyber Risk like Financial Risk? More…
Cybersecurity in a Mass Remote Working World
Considerations to Secure and Protect Systems and Data More…
Anatomy of an O-TTPS Third-Party Assessment
A Quick Step Guide More…
Cyber Security Awareness of White Label Products
IoT Product Safety Trends and Services More…
Department of Defense Information Network Approved Products List Certification
Understanding the Process More…
Passwords and Secure Authentication – A Proportionate Approach
Tips on Creating Strong Passwords More…
Connectivity in Medical Devices
Cybersecurity and Risk Management Principles More…
Smart Grid Solutions and Modernization
Infrastructure and Communications Considerations More…
FIPS: Is it Chaos or New CMVP Entropy Requirements?
An Update on IG G7.18 Entropy Estimation and Compliance with SP 800-90 More…
FIPS: Time is Money
Difficulties of Managing Specialized Documentation for Different Certifications More…
FIPS: Legacy Mix-Up
An Update on IG G.18 and the Transition from 186-2 More…
FIPS: A Brave New World
An Update on the FIPS 140-3 Transition More…
FIPS: Important update on algorithm testing
Automated Cryptographic Validation Protocol (ACVP) More…
Mobile Secure Payment Requirements
SpoC Testing Overview More…
Medical Device Cybersecurity - Part 2
Safely Test and Deploy Connected Products More…
Medical Device Cybersecurity - Part 1
Safely Test and Deploy Connected Products More…
Hazards and Safety Requirements of Internet of Things (IoT)
A high-level summary of standards on the horizon for the connected world More…