If it's on our mind, it should be on yours too

Newsroom/Blog

Press Releases

Thirdwayv’s SeamlessConnect™ Solution Ensures High-Reliability Cloud Communication for Mission-Critical IoT System Devices

Latest addition to company’s easy-to-deploy end-to-end solution suite improves IoT system availability and control June 22, 2020 09:10AM Eastern Daylight Time Irvine, Calif.,  —(BUSINESS WIRE)—Thirdwayv, a leading provider of end-to-end connectivity and security solutions for IoT applications, today announced it has added the SeamlessConnect ™ solution to its family of connectivity and security-by-design building blocks for deploying mission-critical…

Thirdwayv Completes Its Advisory Board with Addition of Five Leaders from the IoT, Security, Healthcare and Pharmaceutical Industries

Business Wire: March 24, 2020 Irvine, Calif., – Thirdwayv, a leading provider of end-to-end connectivity and security solutions for IoT applications, today announced it has completed the formation of its Advisory Board with the appointment of five executives from a cross section of industries and disciplines that are fueling the next major wave of connected…

Thirdwayv Appoints Dr. Aiman Abdel-Malek as Exec Chairman to Advisory Board

July 12, 2019 12:00 PM Eastern Daylight Time IRVINE, Calif.–(BUSINESS WIRE)–Thirdwayv, a leading provider of end-to-end connectivity and security solutions for IoT applications, today announced formation of its Advisory Board and the appointment of medical device and digital health industry veteran Aiman Abdel-Malek, Ph.D. as its executive chairman. Dr. Abdel-Malek brings more than 20 years…

In the News

Protecting hospitals from supply-chain counterfeits and other security threats

September 10, 2021

Chief security officers and other stakeholders protecting the integrity of healthcare organization supply chains face growing challenges. Thirdwayv’s Vinay Gokhale, VP of Business Development, shares in this article in Security Magazine how smarter, connected supply chains carrying a flow of…

Read More

Multi-Layered Security is Best Antidote Against Internet of Medical Things (IoMT) Cyberattacks

April 30, 2021

The chronic security ills of connected medical devices have now become a progressive, systemic disease during the pandemic as practitioners grow increasingly reliant on remote patient monitoring, telemedicine and other long-distance IoMT-based care models. Threats abound inside the hospital, too,…

Read More

How to Protect Hospitals from Consignment Counterfeits and Other Threats in Today’s Internet of Medical Things

February 18, 2021

Internet of Medical Things (IoMT) technology is central to healthcare delivery in applications ranging from connected implantable devices to streamlining the supply chain. Device security in these and other applications is often neglected, which is particularly dangerous as the industry…

Read More

Blog

FDA Cybersecurity Playbook is out – so what?

The FDA’s long-awaited playbook on cybersecurity for medical devices is out, and while it covers critical topics related to preparedness and response, we hope it’ll soon be followed by efforts that focus on threat prevention.  The Playbook thoughtfully covers fundamental concerns for Healthcare Delivery Organizations  (HDOs) in managing cyber attacks on Healthcare and Public Health infrastructure…

Stop by for a visit at Cold Chain Global Forum – Philadelphia, Sept 24

You might ask how “Temperature Control” relates to the “Internet of Things”.  Well, if you’re interested in tracking temperature of critical assets automatically and efficiently, the days of manual data logs, inspections and reports are going away quickly.  IoT devices that provide real-time information including temperature data can provide much greater value than conventional systems. …

Don’t get nicked by “Z-Shave”

While malware hacks such as WannaCry, Fancy Bear and Petya get widespread news coverage, Z-Shave “Man in the Middle” attacks could be much more relevant to the world of IoT.  As Catalin Cimpanu writes in this article, the Z-Shave vulnerability could impact more than 100 million devices that use the Z-Wave wireless protocol! The Z-Shave attack exploits the fact that two wireless “Things” that are designed to talk to each other never…