Remove 2026 Remove Firmware Remove Technology
article thumbnail

Cybersecurity in Aviation: Rising Threats and Modernization Efforts

SecureWorld News

The expanding threat landscape: vulnerabilities and attack types The aviation ecosystem is an intricate web of airlines, airports, air navigation service providers, maintenance suppliers, and third-party technology vendors. A cyberattack on any link, be it a ground-handling contractor or a software provider, can trigger cascading failures.

article thumbnail

FIPS 140-3 and You, Part Three

Thales Cloud Protection & Licensing

Since FIPS 140-2 was established in 1998, technology has transformed significantly impacting everyone, including certifications. The FIPS 140-3 compliance mandate is more closely aligned to international standards and designed to match new and evolving technologies.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

2025 Supply Chain Threat Landscape: AI, APIs, and the Weakest Link

SecureWorld News

In another case, a medical device manufacturer's firmware update system was targeted; malware was inserted into life-saving equipment (like pacemakers and insulin pumps), raising alarms about physical safety. Looking ahead: staying ahead of evolving threats As we head into 2026, supply chain security will only grow in importance.

article thumbnail

Luna HSMs FIPS 140-3 Validation

Thales Cloud Protection & Licensing

Security standards, like technology, are always evolving, making compliance challenging for customers and vendors alike. A change in technology that is. FIPS 140-3 is more closely aligned to international standards and better suited to today's technologies. Why did they change something like a compliance standard? And that’s it!

Firmware 133
article thumbnail

Attacks Escalating Against Linux-Based IoT Devices

eSecurity Planet

CrowdStrike’s numbers highlight not only the threat to open-source technologies – see Log4j – but also from IoT devices, long a concern for enterprises as they become more connected and more intelligent. Microsoft Azure last year said it was able to stave off a record DDoS attack against a European customer. Threats to Open Source, IoT.

IoT 145
article thumbnail

FIPS 140-3 and You, Part Three

Security Boulevard

Since FIPS 140-2 was established in 1998, technology has transformed significantly impacting everyone, including certifications. The FIPS 140-3 compliance mandate is more closely aligned to international standards and designed to match new and evolving technologies.

article thumbnail

Understanding CISA's New Guide on Software Bill of Materials (SBOM)

SecureWorld News

[RELATED: CISA has a page dedicated to Information and Communications Technology Supply Chain Security.] In February of this year, CISA announced the renewal of the Information and Communications Technology Supply Chain Risk Management Task Force.

Software 109