Skip to main content

Insights

Digital Transformation of Security Standards: Requirements Extraction using LLMs Insights

Digital Transformation of Security Standards: Requirements Extraction using LLMs

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) In this insight post, we present the approach CERTH proposes for enabling the automation of the identification and extraction of security requirements from security standards with Large Language Models (LLMs). Compliance with international security standards…
My Takeaways from the 1st CRA Expert Group Meeting: A Defining Moment for Cybersecurity in Europe Insights

My Takeaways from the 1st CRA Expert Group Meeting: A Defining Moment for Cybersecurity in Europe

By Roland Atoui, Red Alert Labs Sitting in the meeting room in Brussels, surrounded by some of the most influential cybersecurity experts and policymakers in Europe, I couldn’t help but feel the weight of the moment. The Cyber Resilience Act (CRA) is no longer a draft on paper - it’s…
Model-based security analysis Insights

Model-based security analysis

By András Földvári and András Pataricza, Budapest University of Technology and Economics  In today’s connected world, complex IoT systems play a critical role in several critical industries, where cybersecurity intrusions affecting the IT part may lead to severe or catastrophic consequences amplified by the controlled physical process. Here, the assurance…
The Evolution and Future of IoT: A Strategic Cybersecurity Outlook Insights

The Evolution and Future of IoT: A Strategic Cybersecurity Outlook

Paul Gedeon, Red Alert Labs The Internet of Things (IoT) has become a cornerstone of modern life, connecting devices across industries, homes, and entire cities. As we head towards an era of unprecedented connectivity, where trillions of devices will interact autonomously, the demand for secure, resilient IoT systems has never…