News & Insights

Thought leadership for the Medical Device Industry

Find Content

Cybersecurity Labeling for Medical Devices

Cybersecurity Labeling for Medical Devices

Cybersecurity Labeling for Medical DevicesGarrett Schumacher, MS, CISSP
Published on: 14/10/2025

Cybersecurity labeling connects design intent to real-world device use. It communicates to clinicians, IT administrators, and healthcare delivery organizations how to install, configure, maintain, and retire a device securely.

CybersecurityBlogsSecurity Guides
Design-Time Security Risk Management for Medical Devices

Design-Time Security Risk Management for Medical Devices

Design-Time Security Risk Management for Medical DevicesGarrett Schumacher, MS, CISSP
Published on: 24/09/2025

By identifying and mitigating risks at design time, manufacturers avoid embedding vulnerabilities into their systems and ensure compliance with international regulations and standards.

CybersecurityBlogsSecurity Guides
VEL-CAL: Cryptographic Assurance Levels

VEL-CAL: Cryptographic Assurance Levels

VEL-CAL: Cryptographic Assurance LevelsGarrett Schumacher, MS, CISSP
Published on: 23/08/2025

The Velentium Medical Cryptographic Assurance Levels (VEL-CAL) framework defines a tiered classification system for selecting cryptographic primitives and configurations in medical device systems.

CybersecurityBlogsSecurity Guides
Total Product Life-Cycle Security for Medical Devices

Total Product Life-Cycle Security for Medical Devices

Total Product Life-Cycle Security for Medical DevicesGarrett Schumacher, MS, CISSP
Published on: 04/08/2025

Cybersecurity isn’t just a test before launch. At Velentium Medical, it’s built into every phase of development and maintenance. Our Total Product Life-Cycle process ensures your device is secure by design and safe in the field, backed by our templates and expertise to help you navigate the full process.

CybersecurityBlogsSecurity Guides
Security Requirements and Controls

Security Requirements and Controls

Security Requirements and ControlsGarrett Schumacher, MS, CISSP
Published on: 22/07/2025

Security requirements define what must happen. Controls define how. This distinction is critical for safe, secure product development.

CybersecurityBlogsSecurity Guides
Navigating Cybersecurity during FDA eSTAR Submissions

Navigating Cybersecurity during FDA eSTAR Submissions

Navigating Cybersecurity during FDA eSTAR SubmissionsGarrett Schumacher, MS, CISSP
Published on: 10/04/2025

The FDA’s electronic submission system, eSTAR, requires structured cybersecurity artifacts for 510(k), de novo, and PMA submissions. Our guide shows how to complete each section, map your docs, and stay compliant with the latest expectations. Use these graphics and resources to navigate a critical process for getting your products to market.

CybersecurityBlogsSecurity Guides

Safe. Secure. Effective.

One stop for secure Medical Device R&D, product development, contract

manufacturing, and postmarket services

Velentium Medical logo

© 2025 Velentium Medical LLC. All Rights Reserved.