Skip to main content
All Posts By

Anna Marton, Safepay Systems

18 security requirement categories to protect the IoT supply chain News

18 security requirement categories to protect the IoT supply chain

To secure IoT, security needs to be considered at all stages of the supply chain - design phase, implementation phase, distribution phase, deployment phase, operational phase, upgrading phase, and decommissioning phase. We have identified, analysed, and selected 174 requirements from a number of guidelines, best practices, standards, regulations, and other…
First Union Rolling Work Programme for European cybersecurity certification News

First Union Rolling Work Programme for European cybersecurity certification

On 7. February 2024, the Commission published the first Union Rolling Work Programme for European cybersecurity certification. The work programme fulfils the requirement of the Cybersecurity Act, Title III: the European Cybersecurity Certification Framework, for the establishment of voluntary European cybersecurity certification schemes. While three European cybersecurity certification schemes under…
Using digital twins for improving the security of cyber-physical systems – the DOSS approach Insights

Using digital twins for improving the security of cyber-physical systems – the DOSS approach

By Levente Buttyán, CrySyS Lab, Budapest University of Technology and Economics  Digital twins are virtual copies of physical devices or entire systems that can be used to address various challenges in the design, testing, and operation of those devices and systems. During the design phase, a digital twin can, for…
Capgemini report on consumer-facing connected products News

Capgemini report on consumer-facing connected products

Capgemini conducted a global survey of more than 10,000 consumers in November 2023 to understand consumer interest in consumer-facing connected products – wearables, home automation, health monitoring products, and fitness systems. The report explores the topic in-depth, but we summon here only the most relevant findings from our perspective. 67%…
Deliverable D2.1 IoT supply chain security requirements Deliverables

Deliverable D2.1 IoT supply chain security requirements

D2.1 builds on best practices and guidelines, standards and regulations, and other private sources that analyze supply chain security and privacy requirements, attacks, and vulnerabilities. It classifies a set of domain-agnostic security requirements, applicable in diverse environments, that a trusted supply chain should fulfill. In the context of the DOSS…