Supermicro wanted a list of open-source and third-party licenses along with vulnerabilities, directly from the final firmware for a compliant SBOM. A global technology leader committed to delivering innovation for Enterprise, Cloud, AI, and 5G Telco/Edge IT Infrastructure, Supermicro provides a broad range of application-optimized server solutions serving a variety of markets, including cloud […]
Learn how automation and deep visibility into the device make-up allow you to control security risks from the component level up to the entire device, at scale, taking your vulnerability management program to the next level.
Our CEO Slava Bronfman talked with Steven Bowcut at the Brilliance Security Podcast. They discussed the current and future cybersecurity threats in the automotive industry, and ways to mitigate them. Tune in to learn how the automotive industry is catching up to security risks.
Only 6% are fully ready for the upcoming UNECE WP.29 R155 regulation. That’s one of the key findings in our recent survey of OEMs and Tier-1s conducted with the ASRG. The survey sheds light on the current state of vulnerability management practices, covering issues such as: Time and effort for risk assessment Vulnerability management use […]
Strategy Analytics interviewed multiple executives at automotive OEM and Tier 1 suppliers to get a sense of the organizational measures that have been taken to confront the growing cybersecurity threat. Key finding include: OEMs face a supply chain cybersecurity challenge unmatched by any other industry Tier-1s claim that OEMs are not ready for WP.29 R155 […]
A knowledge hub that serves as a home for educational resources on medical cybersecurity regulations, standards and best-practices, intended to help medical device manufacturers and their suppliers navigate the troubled waters of compliance.
What are Cyber Digital Twins and how they can be used for cybersecurity analysis? As medical devices become hyper-connected and software driven, there’s a growing risk that cyber vulnerabilities introduced through accidental errors, lack of secure-coding practices, or insecure open source software, may be exploited by malicious entities. This is where Cyber Digital Twins […]
This eGuide, based on Cybellum’s extensive work with leading Medical Device manufacturers and their suppliers, outlines the building blocks of an effective vulnerability management program, that keeps your customers secure while complying with all current cybersecurity regulations. Download the free eGuide to learn how to: Assemble a vulnerability management team with the right job functions […]
With over 34% of all breaches happening in the healthcare sector, it is now clear that cybersecurity for medical devices CAN’T start at the production stage anymore. Product security needs to mature from a scanning event in time to a lifecycle thread within existing PLM processes. In this joint webinar with PTC, we discuss how […]
This report provides an in-depth snapshot of the current state of automotive software security. The report is based on extensive analysis of automotive ECU software by the Cybellum Research Lab. Key findings include: Automotive vulnerabilities are not “regular” vulnerabilities Aging software poses operational risk Automotive software is not immune to supply chain vulnerabilities Memory corruption […]
Find out why Frost & Sullivan believes Cybellum is favorably positioned to win trust among automakers and its solutions are “more reliable and process‐efficient than competitors”. After rigorous research, analysis and evaluation of multiple nominees, Frost & Sullivan concluded that Cybellum excels in the vehicle security and risk assessment space, in criteria such as: Addressing […]
What are Cyber Digital Twins and how they can be used for cybersecurity analysis? As IoT devices become hyper-connected and software driven, there’s a growing risk that cyber vulnerabilities introduced through accidental errors, lack of secure-coding practices, or insecure open source software, may be exploited by malicious entities. This is where Cyber Digital Twins […]
Mapping WP.29 CSMS Requirements to the ISO/SAE 21434 Standard Learn how the Cyber Security Management System (CSMS) requirements set in the UNECE WP.29 GRVA regulation map to the process requirements of the ISO/SAE 21434 standard.
In this 30 minutes webinar we will demonstrate how a better understanding of the context in which vehicle software components operate accelerates vulnerability management, helping product security teams focus on the risks that matter the most.
As automotive manufacturers continue their pursuit of the software-defined vehicle, they must recognize that cybersecurity approaches, processes, and tooling must evolve. Read what IDC Analyst Matt Arcaro, Research Manager, Digital Automotive and Transportation Strategies has to say about that as he discusses: Opportunities to enhance vehicle cybersecurity visibility and performance. Applying the concept of Digital […]
A knowledge hub that serves as a home for educational resources on cybersecurity regulations, standards and best-practices, intended to help OEMs and their suppliers navigate the troubled waters of compliance.
For many organizations, having a vulnerability management program comes down to searching for hacker chatter on the dark web and keeping an eye on published CVEs. Yet, in today’s world this is not enough. With threats on the rise, you need a fully scaled vulnerability management operation. This eGuide, based on Cybellum’s extensive work with […]
Learn How to Prepare for the WP.29 Automotive Cybersecurity Regulation – From Home In this 20-minute on-demand webinar, we discuss the current state of automotive cybersecurity and explain how stakeholders can prepare for UNECE WP.29. Presented by Eyal Traitel, VP Strategic Alliances at Cybellum.
A review of the latest ENISA (the European Union Agency for Cybersecurity) report on the importance of cybersecurity for connected cars. Download to get the ENISA guidelines, insights on the challenges the industry is facing today around automotive cybersecurity, and how recent standards suggest handling. This review includes a reference to each category in the […]