Medical device security management – what you need to know

There is little doubt that the future of healthcare will rely more on always-connected devices, Software as a Medical Device (SaMD), cloud computing and vast amounts of data processing. However, moving medical devices outside of the security provided within a managed hospital network and placing them at our homes increases the risk of cyberattacks. So, how manufacturers can face the ongoing challenge of ensuring security of their devices and the ever-increasing pressure by the regulatory bodies?  

Read More

Rail and Cybersecurity: The growing gap

The rail industry is growing in usage and connectivity. As one drives the other, the importance of cybersecurity will only increase. As the rail industry prospers, it becomes a more desirable target to increasingly skilled and equipped hackers and new demands are put upon aging, potentially difficult to replace infrastructure.

Read More

How creative studios can protect their content with Irdeto (part 1)

Digital video piracy is widespread, growing, diverse and continues to affect the bottom line of studios. The negative influences of piracy are not limited to revenue loss but include bandwidth consumption, job losses and brand reputation. Piracy is not only damaging if an entire film is leaked or pirated, but this also negatively affects short clips such as dailies, scenes, and trailers.

Read More

Who goes there? Why router authentication may be an ISP’s weakest link

Many ISPs underestimate the level of risk to their own backend infrastructure from poorly secured household routers. The growing use of intelligent CPE to deliver data-centric, value-added services to the home in concert with cloud-based servers means that routers are now more tightly coupled to the service provider’s core network than ever before. This blog outlines the dangers to ISP revenue, reputation and quality of service if CPE authentication processes are inadequate. We’ll also look at how ISPs can add a trusted and unclonable identity into each device to safeguard the integrity of their own network and services.

Read More
Loading

Subscribe to the Blog