Tag: cybersecurity

Building and Applying A New Medical Device Framework With Phil Englert

Phil Englert was ahead of the curve in introducing cybersecurity into the medical device industry, building medical device cybersecurity programs from scratch several times during his career.  Today he is the Director of Medical Device Security at the Health Information Sharing and Analysis Center H-ISAC, helping establish connections within the medical device community, and well-versed […]

Flex the VEX Emoji

Flex the VEX: A Better Way to Secure Products

VEX reports have finally hit the mainstream and the excitement surrounding them has as much to do with automation as it does with vulnerability management.  To appreciate the full practicality of Vulnerability and Exploitability Exchange (VEX) reports, we need to go back to our old friend, the Software Bill of Material, endearingly known as ‘SBOM’. […]

Ronen Talks Strategy- SBOM 1

Making the most of SBOMs: A product security perspective

Part 1: Using SBOMs for enhanced visibility and control  The dynamic nature of software development exposes the software supply chain to countless sources of both known and unknown vulnerabilities. These can take multiple forms, from insecure open-source software to zero-day exploits.  The connected product software revolution’s growing reliance on open-source software increases the risk and […]

PR- Version 2.22

Cybellum Transforms SBOM Management and Compliance Oversight

Advanced workflow, approval process and management dashboard enhance control, distribution and supervision, while reducing errors and streamlining the entire SBOM management process   Israel, Tel Aviv, January 26, 2023 – Cybellum, provider of the award-winning Product Security Platform for connected product and device manufacturers, announced today the release of version 2.22, providing enhanced SBOM management […]

LTOOD- Social

2022, The Year Product Security Broke Away From the Pack

Shlomi Ashkenazy and David Leichner recap the highlights of the past year and light the beacon for Product Security managers in 2023.   2022 has been an incredible year for the Product Security community. New regulations gained traction, software bills of materials (SBOMs) became ‘the bomb’, and the ramifications of Log4j and other vulnerabilities made […]

Securing Custom OSS blog

Who’s Responsible for Securing Custom Open Source Software?

Is open source software, one of the great wonders of our time, setting us up for one of the great cybersecurity blunders of our time?  In an ongoing effort to develop more innovative technologies, companies are turning to open source libraries for inspiration to reliably bolstering capabilities using fewer resources. By taking only part of […]

LTOOD Dale Peterson

The challenges in securing Industrial Control Systems (ICS) with Dale Peterson

Cybellum’s Left to Their Own Devices podcast spoke with Dale Peterson, founder of the S4 conference and creator of many of today’s standard ICS security tools and techniques Dale Peterson is one of the most experienced individuals on the planet when it comes to industrial cybersecurity. After a few years at the NSA as a […]

LTOOD: Ronen Lago

How Ronen Lago Wins the Market with a Security-First Executive Approach

This blog is based on Ronen Lago’s interview on the Left to Our Own Devices Podcast. ————— Ronen Lago, former executive at Daimler, Lockheed Martin, Motorola, and others, relies on a top-down cybersecurity approach to boost quality and turn cybersecurity capabilities into revenue opportunities. Market analysis is at the core of how Ronen modernizes the […]

LTOOD: Mimi Gross

Attracting and Retaining Top Cybersecurity Talent in a Challenging Employer Market with Mimi Gross

For over a year, labor shortages have dominated headlines, impacting our everyday lives as this crisis translates into supply chain issues, business closures, and overall longer wait times for customers across industries. On the latest episode of the Left to Our Own Devices podcast, Mimi Gross, the cybersecurity matchmaker gives tips and tricks to attract […]

Subscribe to our blog to stay updated