Tag: vulnerability management

Cybersecurity strategy key takeaways

The US National Cybersecurity Strategy Through A Product Security Lens

The Biden administration has been increasing cybersecurity efforts signaling industries, such as automotive, medical devices, critical infrastructure, and others, that regulations are about to be tightened on product security. The US National Cybersecurity Strategy presented a unifying idea of cooperation between private and public sectors focusing on assessing and securing the internet and connected devices […]

Paul Cha LTOOD Blog

Learnings From a 40-Year-Long Automotive OEM Leader

Paul Cha is a cyber and product security leader, serving as the VP of Cybersecurity at LG Electronics Vehicle component Solutions. Paul held critical positions at Synopsis, Ford Motor Company, and Samsung prior to joining LG. He found his way to cybersecurity while working on his Ph.D. in risk management. Paul started his career in […]

Slava Bronfman

How Product Security Reached Maturity with Slava Bronfman

Slava Bronfman, Co-Founder & CEO of Cybellum discusses his experience with the Left to Our Own Devices podcast in watching the product security sector mature over the last decade with the.  —– Product security has been driving major changes throughout the automotive, medical, and industrial sectors. However, just a few short years ago, it was […]

John Santagate- AT Interview

John Santagate on Creating Secure And Resilient Supply Chains

Below is an interview between David Leichner, CMO at Cybellum, and John Santagate of Körber– originally published by Authority Magazine. —- The cascading logistical problems caused by the pandemic and the war in Eastern Europe, have made securing a reliable supply chain a national imperative. In addition, severe cyberattacks like the highly publicized Colonial pipeline attack, […]

Adam Boulton

What the Food and Building Industry Can Teach Us About Securing Embedded Systems

As one of the leading experts in product security with over 15 years of experience in security engineering and 120 cybersecurity patents under his belt, Adam Boulton is one of the most experienced software security professionals in the industry.  Currently the SVP of Security Technology and Innovation at Cybellum, the Left to Our Own Devices […]

RVWP Hive Mind

RVWP: How CISA Harnesses the Hive Mind to Combat Ransomware

Stepping in to help entire industries better manage their connected devices, CISA is providing critical live vulnerability data directly to CPSOs. It remains unclear if teams are set up in a way to digest the data into vulnerability management and malware detection activities. ———- Last week, CISA announced their new Ransomware Vulnerability Warning Pilot (RVWP), […]

Mirel Sehic

How Mirel Sehic Relies on Simplicity to Focus Product Security

If you are developing a modern medical, manufacturing, or logistics facility, there’s no doubt that a large portion of your investment was made into the electronic aspects of your device. Sensors, connected devices, and machinery are synchronized to deliver a streamlined experience. For facility operators, this includes elevators, HVAC systems, PLC controls, valves, pumps, and […]

KB Bank Case Study

How KB Kookmin Bank Secured Their Software Supply Chain With Cybellum

KB Kookmin Bank recognized the growing product security challenge in providing modern services based on increasingly complex software.  More suppliers. More open source. More weak points.  Understanding the trust of their customers was paramount. The bank was ready to rethink the tools they were using in order to better understand their product security posture and […]

Intro to Automotive Cybersecurity Standards and Regulations

As vehicles have come to rely heavily on software and an increasingly complex software supply chain, the cyber threat landscape continues to evolve. Automotive cybersecurity standards and regulations for safety are more critical than ever. Industry-wide recognition of automotive cybersecurity risks has pushed regulators and industry leaders to double-down on regulation. The recent adoption of […]

Subscribe to our blog to stay updated