Skip to main content
Tag

security by design

My Takeaways from the 1st CRA Expert Group Meeting: A Defining Moment for Cybersecurity in Europe Insights

My Takeaways from the 1st CRA Expert Group Meeting: A Defining Moment for Cybersecurity in Europe

By Roland Atoui, Red Alert Labs Sitting in the meeting room in Brussels, surrounded by some of the most influential cybersecurity experts and policymakers in Europe, I couldn’t help but feel the weight of the moment. The Cyber Resilience Act (CRA) is no longer a draft on paper - it’s…
Model-based security analysis Insights

Model-based security analysis

By András Földvári and András Pataricza, Budapest University of Technology and Economics  In today’s connected world, complex IoT systems play a critical role in several critical industries, where cybersecurity intrusions affecting the IT part may lead to severe or catastrophic consequences amplified by the controlled physical process. Here, the assurance…
The Evolution and Future of IoT: A Strategic Cybersecurity Outlook Insights

The Evolution and Future of IoT: A Strategic Cybersecurity Outlook

Paul Gedeon, Red Alert Labs The Internet of Things (IoT) has become a cornerstone of modern life, connecting devices across industries, homes, and entire cities. As we head towards an era of unprecedented connectivity, where trillions of devices will interact autonomously, the demand for secure, resilient IoT systems has never…
The DOSS IoT Supply Trust Chain (STC) Concept Insights

The DOSS IoT Supply Trust Chain (STC) Concept

By András Vilmos, DOSS Project Coordinator The Supply Chain Security Challenge In today's interconnected world, businesses and individuals increasingly rely on IoT devices, software, and services from a variety of sources, making supply chain security critical. The complexity and opacity of modern supply chains, combined with the implicit trust placed…
Automatic Vulnerability Categorization: Are Large Language Models (LLMs) the solution? Insights

Automatic Vulnerability Categorization: Are Large Language Models (LLMs) the solution?

By Miltiadis Siavvas,  Information Technologies Institute (ITI) of the Centre for Research and Technology-Hellas (CERTH) Problem Statement The early identification and mitigation of software vulnerabilities is critical for the development of secure software. To facilitate the vulnerability identification and mitigation process, several tools and techniques have been proposed over the…
Automated Penetration Testing of IoT systems using formal and AI-based techniques Insights

Automated Penetration Testing of IoT systems using formal and AI-based techniques

By Gábor Pék, CrySyS Lab, Budapest University of Technology and Economics  Automated penetration testing is one of the recent challenges of cyber-security with the visionary goal of discovering and exploiting system- and software vulnerabilities with no human involvement at all. Over the last couple of years various automated and semi-automated…