Intertek Blog: Cybersecurity
08 Oct 2024
Preparing for Radio Equipment Directive (RED) Cybersecurity Compliance
What EN 18031 Means for Electrical Product Manufacturers
02 Jul 2024
OWASP Sets the Standard for Safe Software Across Industries
Enhancing Software Security through Education, Community Building, and Collaboration
11 Jun 2024
Securing Digital and Physical Worlds with IEC 62443 and ISO 27001
Choosing the Right Cybersecurity Standard for Optimal Protection
04 Jun 2024
Ensuring Cybersecurity in Medical Devices
A Proactive Approach can Streamline Compliance and Reduce Vulnerabilities
14 May 2024
Strategies to Mitigate Insider Cybersecurity Threats
How Employees Can Unintentionally Compromise Cybersecurity
16 Apr 2024
The Future of Healthcare – The Evolution of AI and ML in Medical Devices
Improving patient outcomes while ensuring privacy, security, and regulatory compliance
14 Dec 2023
Software in a Medical Device vs. Software as a Medical Device: Understanding the Differences - Part 2
Medical Software Development
12 Dec 2023
Software in a Medical Device vs. Software as a Medical Device: Understanding the Differences - Part 1
A look at the convergence of hardware-centric medical devices and software-driven solutions
07 Nov 2023
Cyberattacks in the Food Industry: A Recipe for Potential Disaster
Increased use of Technology Exposes Cybersecurity Vulnerabilities
13 Jun 2023
Cyber Threat Landscape of the Healthcare Sector
A single cybersecurity breach can cost a hospital system $10 million USD
04 Apr 2023
Radio Equipment Directive (RED) Now includes Cybersecurity Requirements
Measures aim to improve network resilience, protect consumer privacy, and reduce the risk of fraud
14 Feb 2023
New Mobile Payment Standard an Advancement for Tap to Phone Technology
MPoC standard enables secure payments using smart phones and tablets
05 Jan 2023
Connected Vehicle Cybersecurity Threats: Part 2
A look at what to expect in connected vehicle trends for 2023
13 Dec 2022
Connected Vehicle Cybersecurity Threats: Part 1
A look at what to expect in connected vehicle trends for 2023
29 Nov 2022
Transport Layer Security: What Stakeholders Need to Know about Communication Security
Transport Layer Securities are designed to provide security at the transport layer to prevent third parties from eavesdropping or tampering with messages
04 Oct 2022
Keeping IoT Consumer Products Safe from Cyber Threats
5 key areas of cybersecurity to focus on when developing and manufacturing secure connected consumer products
20 Sep 2022
Cybersecurity Trends in the Manufacturing Industry
Top 5 cybersecurity vulnerabilities and how to prevent cybercrime. Learn about recent trends so you can safeguard your systems and devices
23 Aug 2022
The Danger of Administrator Password Reuse
Don't let password fatigue lead you to sacrifice security for convenience
19 Jul 2022
FDA Guidance for Medical Device Cybersecurity: What Manufacturers Need to Know
The importance of identifying vulnerabilities and controlling risk to demonstrate product safety and effectiveness
21 Jun 2022
Common Criteria and the EU Cybersecurity Act
The European Union (EU) is pacing up the efforts to keep its citizens safe
17 May 2022
ETSI Extends Consumer IoT Device Standard to Home Gateways with ETSI EN 303 645
The ETSI EN 303 645 European cybersecurity standard was developed to ensure consumer IoT devices are protected from cybersecurity threats
19 Apr 2022
Single Sign-On Technology: Friend or Foe?
Single sign-on authentication technology offers numerous benefits and conveniences, but proper implementation is required to enhance security
01 Mar 2022
Ensuring Secure Processing of Payment Transactions
Industry stakeholders are leading the effort to develop standards to enhance global payment account data security
18 Jan 2022
Specifications for Automotive Cybersecurity: Part 1
Cybersecurity management system requirements
23 Nov 2021
Navigating Cybersecurity Standards and Regulations for Medical Devices
Keeping patient information and networks secure
07 Sep 2021
Part 2: Operational Technology Risk Assessments and Cybersecurity Principles
An 8-Step Guide
11 Dec 2020
Establishing Accredited Cybersecurity Test Certification Programs, Part 2
The Testing and Certification Process for Products/Systems
08 Dec 2020
Establishing Accredited Cybersecurity Test Certification Programs, Part 1
Program Support for ITS Products/Systems
04 Dec 2020
The Evolution of Penetration Test Reports
Is it Time to Treat Cyber Risk like Financial Risk?
03 Nov 2020
Cybersecurity in a Mass Remote Working World
Considerations to Secure and Protect Systems and Data
11 Aug 2020
Department of Defense Information Network Approved Products List Certification
Understanding the Process
23 Jun 2020
Passwords and Secure Authentication – A Proportionate Approach
Tips on Creating Strong Passwords
27 Feb 2020
FIPS: Is it Chaos or New CMVP Entropy Requirements?
An Update on IG G7.18 Entropy Estimation and Compliance with SP 800-90
16 Jan 2020
FIPS: Time is Money
Difficulties of Managing Specialized Documentation for Different Certifications
07 Nov 2019
FIPS: Important update on algorithm testing
Automated Cryptographic Validation Protocol (ACVP)
11 Sep 2018
Hazards and Safety Requirements of Internet of Things (IoT)
A high-level summary of standards on the horizon for the connected world