Recent events, such as the Log4Shell / Log4J vulnerability, underscore the importance of best practices for cybersecurity in software development. And, with increasing cyber attacks, it’s more important than ever that organizations can pre-empt and respond to emerging...
Compliance & Regulatory
Medical Device Trends For 2024
2020 was a wild ride, especially for the medical device world. The pandemic shook things up, making everyone scramble to adjust to a new way of doing things. Now, four years later as we peek into 2024, the medical device scene is still changing. This blog post will...
The Tools For ISO 14971 Compliance for Medical Device Manufacturers
The journey from concept to market-ready medical device is no easy feat. The regulatory economy, development and legislation is intricate. Understandably, compliance with standards is non-negotiable to ensure the safety and efficacy of medical devices. One such...
Exploring the FDA’s Computer Software Assurance Model
In September 2022, the FDA ushered in a groundbreaking transformation in the medical device industry by unveiling a new draft guidance on software validation titled "Computer Software Assurance for Production and Quality System Software." For years, the medical...
Highlights from MasterControl Summit 2023
The MasterControl Summit 2023 was an event serving as a hub for professionals, experts, and thought leaders in quality management and regulatory compliance. It offers a platform for knowledge sharing, industry trends, innovation and best practices. Additionally it...
How To Reduce Cybersecurity Risks For Remote Workers
Remote working is an effective way to keep your business running 24/7, mitigate downtime and tap into new markets or expertise. Now, the world is flooded with companies utilizing remote work, digital nomads and gig workers to keep their competitive edge. But, the rise...
Use Nessus To Harden Your Cybersecurity
Cybersecurity should be baked into the onset of IT and product development processes. Additionally, treating cybersecurity as an afterthought opens your organization up to vulnerabilities and risk. Therefore hardening your IT product cybersecurity with a tool like...
How To Complete Computer Systems Validation (FDA)
What is Computer Systems Validation (CSV)? Additionally, why does the Food & Drug Administration (FDA) require them for the Medical Device industry? More importantly, how can CSVs be efficiently completed and managed? Let’s explore why you can’t skip that...
DevOps and CloudBees Accelerate Banking Innovation Part 2
In Part 1 of this article, we talked about the banking innovation industry threats and market conditions. We discussed how DevOps and CI/CD tools can help to mitigate threats. We also discussed why tools like Jenkins, CloudBees CD/RO and CloudBeesSoftware Delivery...
Computer Systems Validation: How To Avoid FDA Warning Letters C.F.R. 820.70(i)
Computer systems validation (CSV) is a standard regulatory exercise Med Device companies are required to complete. This is not new news. In fact, the content in this article may not be “new news” for you either, but as with other regulatory requirements, it’s useful...
CloudBees and DevOps Accelerate the Banking Industry Time to Market, Part 1
The Threats and Market Conditions The banking and financial industry faces some tough challenges that many other industries do not. The continually increasing regulations. The continuous threat of cyber-attacks. The disruptive innovation from outside of the sector....
9 Things You Need To Know About Cybersecurity and Protected Health Information (PHI) breaches
In the past 18 months, there have been breaches of security related to protected health information (PHI) at Broward Health, Florida Healthy Kids, and the Accellion FTA Hack. In turn, these breaches resulted in 11 more healthcare organizations getting exploited. ...