Tag: supply chain security

Cracking AUTOSAR- A Missing Piece in the Product Security Puzzle

Securing automotive software is crucial to life long product security in the field…. But how can you secure a mystery box? As puzzling as it may be to call an AUTOSAR ECU a ‘mystery box’, this is essentially how many of today’s automotive manufacturers program their ECUs. Over the years, this closed system was enough […]

Platfrom vs. tools thumbnail

Why Security Pros Are Choosing a Unified Product Security Platform Over Generic Security Tools

As the connected devices and products we rely on have become increasingly software-reliant, securing them against cybersecurity and compliance risks has become a major concern for product security pros. Today’s evolving cybersecurity regulation for software-driven devices and products addresses the expanding threat landscape. As a result, companies are investing more and more in technologies that […]

What Are Today’s Top Automotive Cybersecurity Challenges?

It hasn’t been an easy year for cybersecurity pros in the automotive industry. Hackers are increasingly setting their sites on connected automotive products – David Colombo’s much-publicized ethical Tesla hack, a ransomware attack against Honda, and a suspected attack on a local Toyota supplier are only a few examples from the rapidly evolving threat landscape. […]

Cybersecurity vs. Time-to-market: Medical Device Pros Weigh In

In a highly-regulated sector like medical device manufacturing, time-to-market needs to be carefully balanced with security and compliance. In addition to the aggressive timeframes development and product teams are tasked with to get new innovation to the market, medical device manufacturers (MDMs) are also responsible for the security of connected systems and processes that have […]

5 Key Insights from the IMDRF Draft on Principles and Practices for Medical Device SBOMs

Recent years have shown an alarming increase in cyber attacks geared towards the healthcare sector. Just last year alone, the FBI reported that 148 ransomware attacks successfully penetrated healthcare organizations– more than any other industry. While there are many steps that can be taken, from securing the IT infrastructure to implementing better credential security practices, […]

Intro to Medical Device Standards and Regulations

Over the past few years, cybersecurity has become a major concern for medical device manufacturers (MDMs), for a number of reasons. First and foremost, medical devices are becoming connected like never before with multiple communication channels. They are becoming increasingly software-driven, with rapidly growing code bases, reliant on a complex software supply chain, consisting of […]

Cybellum Wins Three Coveted Global InfoSec Awards during RSA Conference 2022

Cybellum Wins 3 Awards for Cybersecurity in 10th Annual Global InfoSec Awards at RSAC 2022

NIST Issues Updated Guidance for Supply Chain Cybersecurity Risk Management

NIST Issues Updated Guidance for Supply Chain Cybersecurity Risk Management

The National Institute of Standards and Technology (NIST) published an updated guidance on managing supply chain cybersecurity risks on May 5th 2022, titled “Cybersecurity Supply Chain Risk Management Practices for Systems and Organizations” (C-SCRM), for organizations that are acquirers and end users of products, software and services. The update includes a detailed list of C-SCRM […]

Medical Device Security: 2022 Trends and Predictions

Report reveals that nearly 90% of product security professionals feel they need to improve on key areas such as SBOM analysis and compliance readiness Israel, Tel Aviv, April 20, 2022 – Cybellum, the leading provider of the Product Security Platform that enables product and device manufacturers and suppliers to continuously detect, manage, and remediate cyber threats and […]

Licensing: The Double-Edged Sword of Open Source Software

Open-source software libraries are the backbone of modern software development and a critical piece of the software supply chain. Engineers don’t need to recreate existing functionality; instead, development efforts can be accelerated using open-source software (OSS) libraries. These days, almost 98% of applications use open-source libraries. Using open-source libraries does bring unique risks. Beyond security […]

Subscribe to our blog to stay updated