New Search

Can't find what you're looking for? Try another search!

16 search results for:

1Blog Post

Understanding ISO/IEC 27001: A Guide to Information Security Management

Understanding ISO/IEC 27001: A Guide to Information Security Management In today’s interconnected world, the importance of securing sensitive information cannot be overstated. Organizations face numerous threats to their information assets, ranging from cyberattacks to data breaches. To address these challenges, many businesses turn to internationally recognized standards for information security management, with ISO/IEC 27001 standing […]

2Blog Post

Cybersecurity Concerns for Manufacturers in 2024

Cybersecurity Concerns for Manufacturers in 2024 The more networked and data-centric manufacturing becomes, the more manufacturing leaders ought not consider cybersecurity as something that only concerns the IT department. New SEC reporting rules and high-profile hacks against manufacturers with multimillion-dollar price tags last year curtly demonstrate the point. Org-wide planning provides the best defense against […]

4Blog Post

[Webinar Recap] Critical Alignment for Security, Safety & Product Development Teams

Critical Alignment for Security, Safety & Product Development Teams Break down silos to unite teams for the future of vehicle technology! Safety, security, and development teams tend to work in silos due to differing objectives, tooling, and methodologies; historical contexts; educational backgrounds; and even fundamental terminology. The increasing interconnectivity of vehicles makes it hard to […]

5Blog Post

What You Need to Know: ANSI/AAMI SW96:2023 — Medical Device Security

What You Need to Know: ANSI/AAMI SW96:2023 — Medical Device Security A comprehensive guide to understanding ANSI/AAMI SW96:2023 and mitigating security risks Introduction Managing risk around a medical device’s entire lifecycle has become increasingly complex. Many devices use third-party components, which is especially true for devices that require a network to operate. This increased need […]

6Blog Post

[Webinar Recap] DO-326 Airborne Security Assurance, Threat Modeling, and DevSecOps

Cyber vulnerabilities can have a significant impact on safety-critical systems. Today there is an unprecedented level of digital interconnectivity in everything from vehicle sensors to rovers on the surface of Mars. The aerospace industry has a high degree of cyber connectedness where a negative impact could cause harm to not only aircraft but financial systems, […]

9Blog Post

[Webinar Recap] Effectively Managing Cybersecurity in Jama Connect® for Automotive and Semiconductor Industries

If you’re in the automotive or semiconductor industries – cybersecurity is likely top of mind. During this informative session Effectively Managing Cybersecurity in Jama Connect for Automotive and Semiconductor Industries, Kevin Dibble, Principal Consultant at Reinnovate Consulting, and Matt Mickle, Director of Automotive Solutions at Jama Software®, offer insights on how the right tooling solution […]

10Blog Post

What is DevSecOps? A Guide to Building Secure Software

What is DevSecOps? A Guide to Building Secure Software DevSecOps has gained popularity as a secure and dependable software development methodology in the fast-paced world of software development. But what is DevSecOps really, and why is it so crucial? DevOps is a set of techniques that stresses collaboration and automation between development and operations teams. […]