Browse our latest blog posts:

The Critical Entities Resilience Directive (CER) 101 

In parallel with the introduction of the NIS2 Directive, the European Commission has also adopted the Critical Entities Resilience (CER) Directive, focusing on the protection of public and private organizations against physical threats. Both of these Directives aim to increase resilience and counter threats that could disrupt society. It’s time to go deeper into the CER Directive and how it affects the healthcare sector and Medical Device Manufacturers (MDMs).

Read More

Security Vulnerability Metrics and their importance in maintaining the security of connected cars 

Over the last few years, the world has grown accustomed to the growing number of connected vehicles that have internet access and can interact with other devices. This rapid development, however, comes at an expense. The increase in potential cybersecurity risks is rapidly becoming one of the biggest challenges in the industry. What led to these risks and how can we address them? Discover more in our article!

Read More

Is your DRM strong enough against content key exploitation? 

Since many viewers opt to get access to premium content via illegal services, the video entertainment industry has become a profitable game for pirates. While pirates steal content in many ways, key extraction is one of the biggest headaches encountered by this industry. Are you curious how this trick is implemented and how it undermines the streaming service provider’s business? Explore in our article!

Read More

The complexity of medical device cybersecurity requirements: How to cope 

Mitigating cybersecurity risks for medical devices is increasingly a core focus area for regulators, who are driving the establishment of a consistent cybersecurity framework to better facilitate coordination among all parties involved. This emphasizes the importance of Medical Device Manufacturers (MDMs) being aware of and familiar with the latest requirements. The intertwining of requirements, however, creates significant complexity in the medical device cybersecurity ecosystem. How can you cope with this?

Read More

ChatGPT: A curveball for cybersecurity

Many of you will by now have heard of ChatGPT. It’s an interactive and incredibly powerful machine learning tool that can generate human-like responses across a wide range of topics. Every innovation, though, has its pros and cons. While ChatGPT was coded with good intentions, let’s explore how the tool could be problematic from a cybersecurity standpoint.

Read More

Network Information Systems Security (NIS2) 101 

A number of regulations have been put in place to help fortify medical devices and their manufacturing lines against potential attack patterns, including the revised Directive on the Security of Network and Information Systems (NIS2 Directive). The introduction of NIS2 will help form a better coordinated basis for cybersecurity action. Here’s what you need to know about it.

Read More

[FREE E-BOOK] The threats of game emulation to developers: Are you worried enough? 

No developer wants their game to be distributed unfettered from the day of launch. Sadly, this has happened more frequently since video game emulation is widely used. Game emulation is unfortunately being turned into a significant means for pirates to undermine developers’ businesses. What should developers do to deal with it and protect their precious titles? Download our free e-book to learn more!

Read More

Bots and hardware cheats in video games: How do you detect and fight them? 

Rather than spending long hours within a game environment, cheaters are using bots to advance through a title and build their in-game character. Using gaming bots and hardware cheats not only facilitates criminal money earnings, but also gives unscrupulous players the ability to super-enhance their in-game characters. What techniques are they using and what can you do to stop them? Read on to find that out! 

Read More
Loading