article thumbnail

Texas scrutinizes four more car manufacturers on privacy issues

Malwarebytes

The Notice delivered to Hyundai discusses covered data, which is defined as any information or data about a vehicle manufactured, sold, or leased by you, regardless of whether deidentified or anonymized. The car manufacturers involved in that complaint are Toyota, Lexus, Mazda, Chrysler, Dodge, Fiat, Jeep, Maserati, and Ram.

article thumbnail

Risk Management and Threat Modeling

Adam Shostack

Threat modeling finds threats; risk management helps us deal with the tricky ones. One the most common questions I’m asked is “what’s the relationship of threat modeling to risk management?” The simple answer is that threat modeling always precedes and sometimes feeds into risk management. The bully threatened to beat him up.”

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

FDA Playbook Engineers Safety Into Medical Device Manufacturing

SecureWorld News

As connected healthcare devices become more pervasive and critical to patient outcomes, the cyber risks tied to their design, production, and deployment grow exponentially. According to the report, "Cybersecurity risk management should begin during product concept and continue throughout the total product lifecycle (TPLC)."

article thumbnail

PTZOptics cameras zero-days actively exploited in the wild

Security Affairs

GreyNoise worked with VulnCheck to disclose the two vulnerabilities responsibly. “The vulnerabilities impact NDI-enabled pan-tilt-zoom (PTZ) cameras from multiple manufacturers. Attackers can also trigger flaws to extract network details to infiltrate connected systems, increasing the risk of data breaches and ransomware attacks.

article thumbnail

From Risk to ROI: How Security Maturity Drives Business Value

Thales Cloud Protection & Licensing

From Risk to ROI: How Security Maturity Drives Business Value madhav Tue, 08/12/2025 - 04:30 Cyber threats are like moving targets—constantly evolving and increasingly pervasive. Additionally, the framework provides a phased strategy for implementing data security, prioritizing three key objectives: compliance, risk management, and security.

article thumbnail

Safety and Security in Automated Driving

Adam Shostack

Lets explore the risks associated with Automated Driving. Safety First For Automated Driving " is a big, over-arching whitepaper from a dozen automotive manufacturers and suppliers. One of the "minimal risk" maneuvers listed (table 4) is an emergency stop. It's important to remember that driving is incredibly dangerous.

article thumbnail

The Cyber Resilience Act (CRA)!

Adam Shostack

The Act calls this “risk management,” and I’ll come back to that.) The cybersecurity risk assessment shall be documented and updated as appropriate during a support period to be determined in accordance with paragraph 8 of this Article. If your documentation is behind a paywall, you can keep the risk assessment behind that same wall.