Guidelines for Source Code Review in Hi-Tech Litigation
This white paper presents basic guidelines for source code reviews to assist litigation teams in negotiating the terms of protective orders, to improve cost estimates, and to enable technical experts to streamline their analysis.
Regulatory Science Meets Cyber Science; Why It’s So Much More than a Pen Test
HarborLabs CEO Nick Yuran distinguishes cybersecurity from cyberscience, and explains why understanding the shared scientific disciplines of regulators and security professionals are important in achieving positive regulatory outcomes.
Guidelines for Source Code Comparison in Litigation
Harbor Labs Director of Firmware Security Dr. Paul Martin describes the strategies, tools, and methodologies used at Harbor Labs when performing source code comparisons in support of litigation consulting and investigation engagements.
Medical Device Manufacturer Must Do’s for Cybersecurity
Harbor Labs Director of Medical Security Dr. Mike Rushanan provides a comprehensive outline of the cybersecurity must-do’s necessary to meet regulatory approval. Based on years of experience working with the FDA and other regulatory bodies, Dr. Rushanan’s blog provides insights into the common pitfalls that can disqualify or delay regulatory approvals.
Guidelines for Source Code Review in Hi-Tech Litigation
This white paper presents basic guidelines for source code reviews to assist litigation teams in negotiating the terms of protective orders, to improve cost estimates, and to enable technical experts to streamline their analysis.
Best Practices for Ensuring Cybersecure and Cybersafe Medical Device Design
This white paper addresses best practices for ensuring cybersecure and cybersafe medical device design to mitigate the risk of compromise or misuse.
Negotiating a Protective Order for Code Reviews
Your Protective Order could set the stage for a successful code review and case or a long, arduous process. How do you ensure your analysts have the best access and avoid hardships as they look to help build your case?
HarborLabs Contribution to Apple vs. Epic
HarborLabs provided extensive technical litigation support to Apple in their recent case against Epic. Learn more about the case, our contribution, and read excerpts of the testimony provided by HarborLabs Chief Scientist, Dr. Avi Rubin.
Automatic External Defibrillator
As part of our Medical Device Security services, HarborLabs assisted a leading manufacturer to help resolve a security issue that was impeding regulatory approvals and corporate business objectives. Learn more about this case and our services.
Surgical Robot System
As part of our Medical Device Security services, HarborLabs was contracted by a manufacturer of a specialized surgical robotics system to conduct a pre-market cyberthreat analysis in support of their 510(k) submission. Learn more about this case and our services.
Regulatory Science Meets Cyber Science; Why It’s So Much More than a Pen Test
HarborLabs CEO Nick Yuran distinguishes cybersecurity from cyberscience, and explains why understanding the shared scientific disciplines of regulators and security professionals are important in achieving positive regulatory outcomes.
Guidelines for Source Code Comparison in Litigation
Harbor Labs Director of Firmware Security Dr. Paul Martin describes the strategies, tools, and methodologies used at Harbor Labs when performing source code comparisons in support of litigation consulting and investigation engagements.
Medical Device Manufacturer Must Do’s for Cybersecurity
Harbor Labs Director of Medical Security Dr. Mike Rushanan provides a comprehensive outline of the cybersecurity must-do’s necessary to meet regulatory approval. Based on years of experience working with the FDA and other regulatory bodies, Dr. Rushanan’s blog provides insights into the common pitfalls that can disqualify or delay regulatory approvals.
Guidelines for Source Code Review in Hi-Tech Litigation
This white paper presents basic guidelines for source code reviews to assist litigation teams in negotiating the terms of protective orders, to improve cost estimates, and to enable technical experts to streamline their analysis.