Skip to main content
Tag

IoT architecture

A simple coding mistake led to the CrowdStrike outage? Well, this is not surprising! Insights

A simple coding mistake led to the CrowdStrike outage? Well, this is not surprising!

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) CrowdStrike disruption is an infamous incident that led to a global IT outage in July 2024, which is known to be one of the worst IT disruptions in history, described by analysts as “the largest…
Why the Cyber Resilience Act (CRA) matters for IoT manufacturers Insights

Why the Cyber Resilience Act (CRA) matters for IoT manufacturers

Dinesh Sharma, asvin GmbH The Importance of  the CRA The EU’s Cyber Resilience Act (CRA) sets strict cybersecurity requirements for all connected products, including IoT devices. For manufacturers, CRA compliance is essential to ensure secure, trustworthy, and market-ready products. From 2027 onward, only devices meeting these standards will be allowed…
OSCAL in Europe: A Foundation for the Digital Security Passport Insights

OSCAL in Europe: A Foundation for the Digital Security Passport

By Sara Nieves Matheu Garcia, University of Murcia, Department of Communications and Information Engineering Cybersecurity documentation is often scattered across reports, spreadsheets, and ad hoc formats, making it difficult to exchange, validate, or automate. The Open Security Controls Assessment Language (OSCAL), developed by NIST, addresses this challenge by providing a…
Cybersecurity compliance: the RED Delegated Act and the CRA Insights

Cybersecurity compliance: the RED Delegated Act and the CRA

By Anna Marton, Safepay Systems As the EU tightens cybersecurity rules for digital products, an important deadline is approaching for manufacturers of connected devices. The RED Delegated Act (RED-DA) targets wireless equipment with specific cybersecurity requirements starting in August 2025, and from 2027 onward, the Cyber Resilience Act (CRA) will…
Conceptual overview of the DOSS Digital Cybersecurity Twin Framework, part 1. Insights

Conceptual overview of the DOSS Digital Cybersecurity Twin Framework, part 1.

Within the DOSS IoT Supply Trust Chain (STC) Concept, we apply a digital twin framework, called the Digital Cybersecurity Twin (DCT). The DCT enables us to perform the automated vulnerability scanning and penetration testing of an IoT system in a virtualized environment, on a digital twin. This way, we can…
Digital Transformation of Security Standards: Requirements Extraction using LLMs Insights

Digital Transformation of Security Standards: Requirements Extraction using LLMs

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) In this insight post, we present the approach CERTH proposes for enabling the automation of the identification and extraction of security requirements from security standards with Large Language Models (LLMs). Compliance with international security standards…
My Takeaways from the 1st CRA Expert Group Meeting: A Defining Moment for Cybersecurity in Europe Insights

My Takeaways from the 1st CRA Expert Group Meeting: A Defining Moment for Cybersecurity in Europe

By Roland Atoui, Red Alert Labs Sitting in the meeting room in Brussels, surrounded by some of the most influential cybersecurity experts and policymakers in Europe, I couldn’t help but feel the weight of the moment. The Cyber Resilience Act (CRA) is no longer a draft on paper - it’s…