Why FDA Rejects the Cybersecurity Content of Regulatory Submissions
Harbor Labs Chief Scientist Dr. Avi Rubin identifies some of the most common reasons why the FDA rejects the cybersecurity content of regulatory submissions.
Surgical Robot System
As part of our Medical Device Security services, HarborLabs was contracted by a manufacturer of a specialized surgical robotics system to conduct a pre-market cyberthreat analysis in support of their 510(k) submission. Learn more about this case and our services.
Home Renal Dialysis System
As part of our Medical Device Security services, a major manufacturer of kidney dialysis systems engaged with HarborLabs to extend the functionality of their line of portable dialysis machines. Learn more about this case and our services.
Medical Systems and Third-Party Smart Devices
As more medical devices leverage phones and other consumer devices, are they introducing more risk to patients? We’ll go inside a conceptual hack and explore the impact of the crossover between unregulated third-party devices and smart medical devices.
Why Harbor Labs Supports The CVSS 3.0 Standard For Medical Device Security
The common vulnerability scoring system is a valuable tool, but how strictly should medical organizations rely on it? When assessing medical and healthcare technology, does it bring enough information, or does it fall short?
DIY Diabetics and FDA Policy
Technology is putting more control into patients’ hands and expanding their access to data. But how far is too far? HarborLabs’s Director of Medical Security provides his view of DIY technology regarding diabetes-care technology.
New FDA Guidance On WiFi-Managed Infusion Pumps Is Cybersafe And Cybersecure
HarborLabs’ CEO, Nick Yuran, was recently interviewed about misconceptions and concerns around the FDA’s new policies on wireless management of infusion pumps. Here are his thoughts regarding the interview and the overall risks involved.
Medical Device Manufacturer Must Do’s for Cybersecurity
Harbor Labs Director of Medical Security Dr. Mike Rushanan provides a comprehensive outline of the cybersecurity must-do’s necessary to meet regulatory approval. Based on years of experience working with the FDA and other regulatory bodies, Dr. Rushanan’s blog provides insights into the common pitfalls that can disqualify or delay regulatory approvals.
Guidelines for Source Code Review in Hi-Tech Litigation
This white paper presents basic guidelines for source code reviews to assist litigation teams in negotiating the terms of protective orders, to improve cost estimates, and to enable technical experts to streamline their analysis.
Best Practices for Ensuring Cybersecure and Cybersafe Medical Device Design
This white paper addresses best practices for ensuring cybersecure and cybersafe medical device design to mitigate the risk of compromise or misuse.
Negotiating a Protective Order for Code Reviews
Your Protective Order could set the stage for a successful code review and case or a long, arduous process. How do you ensure your analysts have the best access and avoid hardships as they look to help build your case?