article thumbnail

Medical Device Cyberthreat Modeling: Top Considerations

Data Breach Today

Besides not doing cyberthreat modeling at all, some the biggest mistakes medical device manufacturers can make are starting the modeling process too late in the development phase or using it simply as a "paper weight exercise," said threat modeling expert Adam Shostack of Shostack & Associates.

article thumbnail

The data-driven manufacturing revolution is underway

Information Matters

The World Economic Forum (WEF) has published a white paper making the case for manufacturing industries to ramp up their investments in data and analytics. According to the paper’s authors: Read more.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How a global research and manufacturing company achieves regulatory compliance

OpenText Information Management

As a Contract Research and Manufacturing organization with over 330 clients around the globe, regulatory compliance is non-negotiable for Syngene International. Its integrated scientific solutions necessitate careful documenting of trials, test results, product formulae, manufacturing processes, and more.

article thumbnail

On IoT Devices and Software Liability

Schneier on Security

New law journal article : Smart Device Manufacturer Liability and Redress for Third-Party Cyberattack Victims Abstract: Smart devices are used to facilitate cyberattacks against both their users and third parties.

IoT 95
article thumbnail

To Make the Internet of Things Safe, Start with Manufacturing

Thales Cloud Protection & Licensing

Typically, when they are manufactured, IoT devices receive their initial identity in the form of a “digital birth certificate.” Therefore, manufacturing is the first critical link in the chain to establish trust across the IoT. Digitally signing software and firmware to ensure integrity and protect from malware.

article thumbnail

Winnti Group was planning a devastating supply-chain attack against Asian manufacturer

Security Affairs

Winnti Group is back with a new modular Win backdoor that was used to infect the servers of a high-profile Asian mobile hardware and software manufacturer. ” reads the paper published by ESET. The post Winnti Group was planning a devastating supply-chain attack against Asian manufacturer appeared first on Security Affairs.

article thumbnail

Securing the International IoT Supply Chain

Schneier on Security

Together with Nate Kim (former student) and Trey Herr (Atlantic Council Cyber Statecraft Initiative), I have written a paper on IoT supply chain security. There's a lot of detail between here and there, though, and it's all in the paper. consumers generally requires that IoT manufacturers sell through a U.S. Selling to U.S.

IoT 118