Skip to main content
All Posts By

Anna Marton, Safepay Systems

Software Requirements Classification using Large Language Models (LLMs) Insights

Software Requirements Classification using Large Language Models (LLMs)

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) The definition of software requirements, both functional and non-functional, is the first step of the Software Development Lifecycle (SDLC). The correct specification of these requirements is critical for the production of high-quality and dependable software…
Summary of the 4th IoT Day Roundtable “IoT Supply Chain Security: Challenges and Impacts” News

Summary of the 4th IoT Day Roundtable “IoT Supply Chain Security: Challenges and Impacts”

On the occasion of the Global IoT Day,  we successfully organized the 4th IoT Day Roundtable on April 8, 2024, titled “IoT Supply Chain Security: Challenges and Impacts”. With the participation of speakers from ENISA, NIST, EUROSMART, BEUC, ECSO, EY, TÜVIT and ourselves, the DOSS project, we managed to give…
The UK Product Security and Telecommunications Infrastructure (PSTI) Regulation comes into force on 29 April 2024 News

The UK Product Security and Telecommunications Infrastructure (PSTI) Regulation comes into force on 29 April 2024

The PSTI applies to all “internet connectable products” and “network connectable products” (together “relevant connectable products”), except for “exempted products”. While the definition of relevant connectable products is rather complex, all M2M, IoT products, including connected vehicles and smart TV as well as home Wi-Fi routers belong in the scope. The PSTI…
Top 10 (+2) Things You Need to Know About the EUCC Implementing Act Insights

Top 10 (+2) Things You Need to Know About the EUCC Implementing Act

The European Common Criteria-based cybersecurity certification scheme (EUCC) By Roland Atoui and Ayman Khalil, Red Alert Labs   With the introduction of the European Common Criteria-based cybersecurity certification scheme (EUCC), the European Commission makes a significant advancement in a time when cybersecurity threats are more serious than ever. Supported by…
The Federal Communications Commission approves “U.S. Cyber Trust Mark” labeling program for consumer IoT products News

The Federal Communications Commission approves “U.S. Cyber Trust Mark” labeling program for consumer IoT products

On 14. March 2024, the US Federal Communications Commission (FCC) approved, based on criteria developed by the NIST, a voluntary program that would create a cybersecurity label for consumer IoT and smart devices, like (not limited to) home security cameras, voice-activated shopping devices, internet-connected appliances, fitness trackers, garage door openers,…
Ma Y, Gelenbe E, Liu K. 2024. Impact of IoT System Imperfections and Passenger Errors on Cruise Ship Evacuation Delay. Sensors. 2024, 24, 1850. Publications

Ma Y, Gelenbe E, Liu K. 2024. Impact of IoT System Imperfections and Passenger Errors on Cruise Ship Evacuation Delay. Sensors. 2024, 24, 1850.

Journal: Sensors. 2024, 24, 1850 Authors: Ma Y, Gelenbe E, Liu K. Abstract: Cruise ships and other naval vessels include automated Internet of Things  (IoT)-based evacuation systems for the passengers and crew to assist them in case of emergencies and accidents. The technical challenges of assisting passengers and crew to…
Virtual Roundtable “IoT supply chain security: challenges and impacts” – 8. April 2024 News

Virtual Roundtable “IoT supply chain security: challenges and impacts” – 8. April 2024

We are pleased to announce that we carry on the tradition of the Global IoT Day Roundtable with our upcoming event on 8. April 2024. This year’s topic is: "IoT supply chain security: challenges and impacts". Join the experts from the European Commission, ENISA, NIST, ETSI, ECSO, BEUC, TUVIT, and EY, as…