Skip to main content
Category

Insights

Are Large Language Models (LLMs) the key to accurate Vulnerability Detection? Insights

Are Large Language Models (LLMs) the key to accurate Vulnerability Detection?

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) The increasing reliance of our everyday lives on software-intensive systems, renders their security an aspect of utmost importance. Hence, there is a strong need for advanced mechanisms for enabling the early identification and elimination of…
A simple coding mistake led to the CrowdStrike outage? Well, this is not surprising! Insights

A simple coding mistake led to the CrowdStrike outage? Well, this is not surprising!

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) CrowdStrike disruption is an infamous incident that led to a global IT outage in July 2024, which is known to be one of the worst IT disruptions in history, described by analysts as “the largest…
Why the Cyber Resilience Act (CRA) matters for IoT manufacturers Insights

Why the Cyber Resilience Act (CRA) matters for IoT manufacturers

Dinesh Sharma, asvin GmbH The Importance of  the CRA The EU’s Cyber Resilience Act (CRA) sets strict cybersecurity requirements for all connected products, including IoT devices. For manufacturers, CRA compliance is essential to ensure secure, trustworthy, and market-ready products. From 2027 onward, only devices meeting these standards will be allowed…
OSCAL in Europe: A Foundation for the Digital Security Passport Insights

OSCAL in Europe: A Foundation for the Digital Security Passport

By Sara Nieves Matheu Garcia, University of Murcia, Department of Communications and Information Engineering Cybersecurity documentation is often scattered across reports, spreadsheets, and ad hoc formats, making it difficult to exchange, validate, or automate. The Open Security Controls Assessment Language (OSCAL), developed by NIST, addresses this challenge by providing a…
Cybersecurity compliance: the RED Delegated Act and the CRA Insights

Cybersecurity compliance: the RED Delegated Act and the CRA

By Anna Marton, Safepay Systems As the EU tightens cybersecurity rules for digital products, an important deadline is approaching for manufacturers of connected devices. The RED Delegated Act (RED-DA) targets wireless equipment with specific cybersecurity requirements starting in August 2025, and from 2027 onward, the Cyber Resilience Act (CRA) will…
Conceptual overview of the DOSS Digital Cybersecurity Twin Framework, part 1. Insights

Conceptual overview of the DOSS Digital Cybersecurity Twin Framework, part 1.

Within the DOSS IoT Supply Trust Chain (STC) Concept, we apply a digital twin framework, called the Digital Cybersecurity Twin (DCT). The DCT enables us to perform the automated vulnerability scanning and penetration testing of an IoT system in a virtualized environment, on a digital twin. This way, we can…
Digital Transformation of Security Standards: Requirements Extraction using LLMs Insights

Digital Transformation of Security Standards: Requirements Extraction using LLMs

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) In this insight post, we present the approach CERTH proposes for enabling the automation of the identification and extraction of security requirements from security standards with Large Language Models (LLMs). Compliance with international security standards…