Tag: Product security

Xiaomi C-20 blog

Are Popular IoT Devices Putting Your Network at Risk of A Cyberattack?

Part 1: A complex problem with a simple explanation  Remotely connected security cameras have become commonplace in our everyday lives. They help organizations secure a facility, manage authorized areas, prevent theft, and more.  But these IoT devices that seem to blend into the landscape may not be as secure as other connected products we rely […]

Cyber Resilience Blog

Building a Resilient Future: Strengthening Product Security with SBOMs and Collaborative Governance

The increase in cyber attacks against connected automotive, medical, and industrial products has not gone unnoticed by the Federal Government, as demonstrated by the recent release of the White House National Cybersecurity Strategy 2023. This strategy acknowledges the importance of protecting sensitive data and infrastructure from cyberattacks and lays out a framework for a joint […]

Cybersecurity strategy key takeaways

The US National Cybersecurity Strategy Through A Product Security Lens

The Biden administration has been increasing cybersecurity efforts signaling industries, such as automotive, medical devices, critical infrastructure, and others, that regulations are about to be tightened on product security. The US National Cybersecurity Strategy presented a unifying idea of cooperation between private and public sectors focusing on assessing and securing the internet and connected devices […]

Slava Bronfman

How Product Security Reached Maturity with Slava Bronfman

Slava Bronfman, Co-Founder & CEO of Cybellum discusses his experience with the Left to Our Own Devices podcast in watching the product security sector mature over the last decade with the.  —– Product security has been driving major changes throughout the automotive, medical, and industrial sectors. However, just a few short years ago, it was […]

John Santagate- AT Interview

John Santagate on Creating Secure And Resilient Supply Chains

Below is an interview between David Leichner, CMO at Cybellum, and John Santagate of Körber– originally published by Authority Magazine. —- The cascading logistical problems caused by the pandemic and the war in Eastern Europe, have made securing a reliable supply chain a national imperative. In addition, severe cyberattacks like the highly publicized Colonial pipeline attack, […]

Adam Boulton

What the Food and Building Industry Can Teach Us About Securing Embedded Systems

As one of the leading experts in product security with over 15 years of experience in security engineering and 120 cybersecurity patents under his belt, Adam Boulton is one of the most experienced software security professionals in the industry.  Currently the SVP of Security Technology and Innovation at Cybellum, the Left to Our Own Devices […]

RVWP Hive Mind

RVWP: How CISA Harnesses the Hive Mind to Combat Ransomware

Stepping in to help entire industries better manage their connected devices, CISA is providing critical live vulnerability data directly to CPSOs. It remains unclear if teams are set up in a way to digest the data into vulnerability management and malware detection activities. ———- Last week, CISA announced their new Ransomware Vulnerability Warning Pilot (RVWP), […]

Mirel Sehic

How Mirel Sehic Relies on Simplicity to Focus Product Security

If you are developing a modern medical, manufacturing, or logistics facility, there’s no doubt that a large portion of your investment was made into the electronic aspects of your device. Sensors, connected devices, and machinery are synchronized to deliver a streamlined experience. For facility operators, this includes elevators, HVAC systems, PLC controls, valves, pumps, and […]

KB Bank Case Study

How KB Kookmin Bank Secured Their Software Supply Chain With Cybellum

KB Kookmin Bank recognized the growing product security challenge in providing modern services based on increasingly complex software.  More suppliers. More open source. More weak points.  Understanding the trust of their customers was paramount. The bank was ready to rethink the tools they were using in order to better understand their product security posture and […]

Subscribe to our blog to stay updated