New Search

Can't find what you're looking for? Try another search!

35 search results for:

21Blog Post

A Guide to Road Vehicle Cybersecurity: Part 1

In part 1 of this 2-part blog series, we overview our eBook, “A Guide to Road Vehicle Cybersecurity According to ISO 21434” – Click HERE for part 2.  To read the entire eBook, click HERE.  A Guide to Road Vehicle Cybersecurity: Part 1 As the automotive industry becomes more complex and more connected, cybersecurity is […]

22Blog Post

What is GAMP®5 and How Does Its Guidance Help Regulated Companies Using Computerized Systems?

In this blog, we define GAMP®5, the framework for a risk-based approach, with an introduction and conclusion provided by Jakob Khazanovich, Medical Device Solutions Consultant at Jama Software®. This blog contains details sourced from the International Society for Pharmaceutical Engineering. What is GAMP®5 and How Does Its Guidance Help Regulated Companies Using Computerized Systems? When […]

23Blog Post

When Evaluating Product Development Software Tools, Not All Cloud is Equal

In this blog, we’ll recap our whitepaper, “When Evaluating Product Development Software Tools, Not All Cloud is Equal” – To download the entire whitepaper, click HERE. When Evaluating Product Development Software Tools, Not All Cloud is Equal As product development has become increasingly complex to manage across siloed teams and tools, the need for organizations […]

24Blog Post

Jama Software® Receives SOC 2 Type 2 Attestation

In this blog, we recap our press release on Jama Software® becoming the ONLY requirements management vendor that is SOC 2 Type 2 compliant on the application layer and data center offerings. Jama Software® Receives SOC 2 Type 2 Attestation Jama Software is the only vendor in the requirements management and traceability space that is […]

25Blog Post

FDA Updates to the Medical Device Cybersecurity Guidance

FDA Updates to the Medical Device Cybersecurity Guidance With an increase in connected medical devices, cybersecurity has become a hot topic for regulatory agencies. In the last few years, cybersecurity incidents have impacted medical devices and hospital networks disrupting the delivery of medical care and potentially putting patients at risk. Cybersecurity is the process of […]

27Blog Post

How EN 50128 Establishes Functional Safety Standards for Railway Software

How EN 50128 Establishes Functional Safety Standards for Railway Software In increasingly complex, rapidly evolving, and highly regulated industries, product development teams must build safety-critical products, while streamlining risk management and keeping accuracy and security at the forefront. This blog post will define functional safety and EN 50128 and explain why compliance with safety standards […]

28Blog Post

[Webinar Recap] Implementing Requirements Management for ISO 21434

In this blog, we recap the “Implementing Requirements Management for ISO 21434” webinar. As the automotive industry becomes more complex and more connected, cybersecurity is emerging as a major concern, and therefore priority, for development teams. According to Juniper Research, there are 206 million cars on the road with embedded connectivity and by 2025, the […]

30Blog Post

What is the Urgency Behind Automotive Cybersecurity?

What is the Urgency Behind Automotive Cybersecurity? From a Market Perspective: As automobiles are growing increasingly connected, digitized, and complex, automotive cybersecurity has become top of mind. Made up of hundreds of “tiny computers” – each with its own networks and servers – a singular vehicle is open to millions of opportunities for cyber-attack. In […]