New Search

Can't find what you're looking for? Try another search!

15 search results for:

1Blog Post

Cybersecurity Concerns for Manufacturers in 2024

Cybersecurity Concerns for Manufacturers in 2024 The more networked and data-centric manufacturing becomes, the more manufacturing leaders ought not consider cybersecurity as something that only concerns the IT department. New SEC reporting rules and high-profile hacks against manufacturers with multimillion-dollar price tags last year curtly demonstrate the point. Org-wide planning provides the best defense against […]

3Blog Post

[Webinar Recap] Critical Alignment for Security, Safety & Product Development Teams

Critical Alignment for Security, Safety & Product Development Teams Break down silos to unite teams for the future of vehicle technology! Safety, security, and development teams tend to work in silos due to differing objectives, tooling, and methodologies; historical contexts; educational backgrounds; and even fundamental terminology. The increasing interconnectivity of vehicles makes it hard to […]

4Blog Post

What You Need to Know: ANSI/AAMI SW96:2023 — Medical Device Security

What You Need to Know: ANSI/AAMI SW96:2023 — Medical Device Security A comprehensive guide to understanding ANSI/AAMI SW96:2023 and mitigating security risks Introduction Managing risk around a medical device’s entire lifecycle has become increasingly complex. Many devices use third-party components, which is especially true for devices that require a network to operate. This increased need […]

5Blog Post

[Webinar Recap] DO-326 Airborne Security Assurance, Threat Modeling, and DevSecOps

Cyber vulnerabilities can have a significant impact on safety-critical systems. Today there is an unprecedented level of digital interconnectivity in everything from vehicle sensors to rovers on the surface of Mars. The aerospace industry has a high degree of cyber connectedness where a negative impact could cause harm to not only aircraft but financial systems, […]

8Blog Post

[Webinar Recap] Effectively Managing Cybersecurity in Jama Connect® for Automotive and Semiconductor Industries

If you’re in the automotive or semiconductor industries – cybersecurity is likely top of mind. During this informative session Effectively Managing Cybersecurity in Jama Connect for Automotive and Semiconductor Industries, Kevin Dibble, Principal Consultant at Reinnovate Consulting, and Matt Mickle, Director of Automotive Solutions at Jama Software®, offer insights on how the right tooling solution […]

9Blog Post

What is DevSecOps? A Guide to Building Secure Software

What is DevSecOps? A Guide to Building Secure Software DevSecOps has gained popularity as a secure and dependable software development methodology in the fast-paced world of software development. But what is DevSecOps really, and why is it so crucial? DevOps is a set of techniques that stresses collaboration and automation between development and operations teams. […]

10Blog Post

A Guide to Automotive Cybersecurity: Part 2

In part 2 of our blog series, we cover the second half of our eBook, “A Guide to Road Vehicle Cybersecurity According to ISO 21434” – Click HERE for part 1. To read the entire eBook, click HERE.  A Guide to Automotive Cybersecurity: Part 2 Cybersecurity V-model Much like other automotive standards, ISO 21434 defines […]