Tag: compliance

Ron Stupi Of Bureau Veritas David Leichner On The Future of Robotics Over the Next Few Years

Below is an interview between David Leichner, CMO at Cybellum, and Ron Stupi of Bureau Veritas– originally published by Authority Magazine. With the shortage of labor, companies are now looking at how robots can replace some of the lost labor force. The truth is that this is not really a novel idea, as companies like Amazon […]

Vehicles of The Future: Rick Sturgeon on Making Cars & Trucks Smarter, Safer, and More Sustainable

Below is an interview between David Leichner, CMO at Cybellum, and Rich Sturgeon, Senior Director, Transportation and Mobility at Dassault Systèmes which was originally published by Authority Magazine. ……………… The automotive industry has been disrupted recently with new exciting technologies that have made cars and trucks much smarter, much safer, and much more sustainable and […]

How Dr. Suzanne Schwartz is Saving Lives by Reshaping Medical Device Cybersecurity

With an early eye on pediatrics and a specialty in burn-victim surgery, the Food & Drug Administration’s (FDA) Dr. Suzanne Schwartz, Director of Strategic Partnerships & Technology Innovation at the Center for Diseases and Radiological Health (CDRH) didn’t foresee that she’d be such an important champion for medical device cybersecurity. Toward the beginning of Dr. […]

LTOOD: Eystein Stenberg on Avoiding Post-Production Challenges with Pre-Production Software Update Planning

Cybellum’s Left to Their Own Devices podcast spoke with Northern Tech Co-founder & CEO, Eystein Stenberg who has a unique vantage point in preparing, deploying, and managing over the air (OTA) updates for IoT devices. Developing IoT devices is a growing challenge as markets become increasingly saturated and devices are expected to repeatedly conduct specific […]

Anthony Fernando Asensus

Surgical robots, FDA, and cybersecurity with Anthony Fernando

While many in the medical device industry have just started implementing cybersecurity strategies, veteran Anthony Fernando has seen it all. Beyond reimagining how robotic surgery can revolutionize patient experiences and recovery time, Anthony’s experience as President & CEO of Asensus has put a growing focus on the cybersecurity mindset that goes behind these incredible medical […]

Platfrom vs. tools thumbnail

Why Security Pros Are Choosing a Unified Product Security Platform Over Generic Security Tools

As the connected devices and products we rely on have become increasingly software-reliant, securing them against cybersecurity and compliance risks has become a major concern for product security pros. Today’s evolving cybersecurity regulation for software-driven devices and products addresses the expanding threat landscape. As a result, companies are investing more and more in technologies that […]

What Are Today’s Top Automotive Cybersecurity Challenges?

It hasn’t been an easy year for cybersecurity pros in the automotive industry. Hackers are increasingly setting their sites on connected automotive products – David Colombo’s much-publicized ethical Tesla hack, a ransomware attack against Honda, and a suspected attack on a local Toyota supplier are only a few examples from the rapidly evolving threat landscape. […]

Cybersecurity vs. Time-to-market: Medical Device Pros Weigh In

In a highly-regulated sector like medical device manufacturing, time-to-market needs to be carefully balanced with security and compliance. In addition to the aggressive timeframes development and product teams are tasked with to get new innovation to the market, medical device manufacturers (MDMs) are also responsible for the security of connected systems and processes that have […]

5 Key Insights from the IMDRF Draft on Principles and Practices for Medical Device SBOMs

Recent years have shown an alarming increase in cyber attacks geared towards the healthcare sector. Just last year alone, the FBI reported that 148 ransomware attacks successfully penetrated healthcare organizations– more than any other industry. While there are many steps that can be taken, from securing the IT infrastructure to implementing better credential security practices, […]

Subscribe to our blog to stay updated