

Insights & Updates
Exploring the future of IoT compliance and security.
December 19, 2024 · Certification,RED,CRA,Cybersecurity,RegulationImagine trying to orchestrate a symphony where the music keeps changing mid-performance, half the orchestra doesn’t have the updated score, and the conductor is juggling multiple conflicting requests. That’s the reality many notified bodies and testing labs face when certifying connected products...December 1, 2024 · IoTSecurity,Cybersecurity,IoTAs our homes become more connected, the question of cybersecurity is more critical than ever. Enter the U.S. Cyber Trust Mark—a voluntary certification program set to raise the bar for security standards in consumer IoT devices. If you're a smart home enthusiast, here's what you need to know. ...November 25, 2024 · IoT,IoTsecurityIn today's digital landscape, businesses heavily rely on the Domain Name System (DNS), especially within the Internet of Things (IoT). With IoT devices proliferating, DNS becomes crucial for network communication, connecting devices to servers and facilitating seamless data exchange. Consider a...October 25, 2024 · EU,cybersecurity,Regulation,IoTThe ETSI Security Conference 2024, held from October 14-17, was a whirlwind of insights, innovations, and reflections on cybersecurity's current and future state. While the event covered a broad spectrum of topics, from quantum-safe cryptography to AI security, one theme was particularly...October 12, 2024 · CRAIn an increasingly interconnected world, the security of digital products has become paramount. On October 10, 2024, the European Union took a significant step forward in addressing this challenge with the Council's adoption of the Cyber Resilience Act (CRA). This groundbreaking legislation sets...August 26, 2024 · MDRIn today’s world of emerging diseases, in which a new pathogen or virus is discovered on a daily-basis, the medical field is striving to develop its infrastructure & facilities to the maximum extent possible in order to tackle these life-threatening situations. Since the operational area here...August 2, 2024 · ICTproduct,Top10,CertificationThe transition from Common Criteria (CC) 3.1 Release 5 (R5) to CC:2022 marks a pivotal moment in the IT security certification landscape. Here, we present the top 10 things you need to know about this significant shift: 1. Introduction of a New Framework (Part 4) CC:2022 introduces Part 4, a...August 2, 2024 · CertificationIn today's digital age, secure authentication is more critical than ever. With the increasing frequency of data breaches and cyberattacks, ensuring that authentication mechanisms are robust and reliable is paramount. Certification programs play a vital role in this landscape, providing a...April 29, 2024 · EU,cybersecurityThe coming into force of the PSTI Act in the UK, scheduled for April 29, 2024, is poised to reshape the landscape of IoT device security. This pivotal moment demands a comprehensive understanding of the regulatory framework, necessitating a closer examination of the PSTI Act alongside the ETSI EN...April 16, 2024Following our first article on how to set up an IoT security honeypot, this second article gives insights into the data that our honeypot captured as well as a focus on the different malware loaders that we encountered. We will go over : Why changing default password is a must Understanding...April 2, 2024 · Regulation,Cybersecurity,Certification,Top10With the introduction of the European Common Criteria-based cybersecurity certification scheme (EUCC), the European Commission makes a significant advancement in a time when cybersecurity threats are more serious than ever. Supported by Regulation (EU) 2019/881, sometimes referred to as the...March 14, 2024 · IoTsecurity,IoTSeveral weeks ago, the cybersecurity community was buzzing about a supposed botnet abusing vulnerable smart toothbrushes in order to launch DDOS attacks on a Swiss company. While the news captured attention with sensational headlines, the lack of technical details and the improbable nature of the...February 23, 2024 · EU,ICTproduct,IoTDevices,cybersecurityNavigating Cybersecurity Compliance in the EU In an age where digital security breaches are increasingly common, the significance of robust cybersecurity measures cannot be overstated. As cyber threats evolve, safeguarding digital infrastructure and securing products against vulnerabilities is...September 25, 2023 · Cybersecurity,Regulation,EU,Top10In the ever-evolving realm of cybersecurity, staying ahead of the curve is paramount for businesses, especially within the European Union (EU). The revised Directive on Security of Network and Information Systems, known as NIS2, has emerged as a game-changer, significantly impacting EU...September 13, 2023 · Cybersecurity,RegulationThe digital age has transformed our world, bringing us smart homes, IoT devices, wearable tech, and more. These conveniences, powered by radio equipment, connect us in unprecedented ways, but they also present new challenges in cybersecurity. In response, the European Union has been working...More Posts
© 2025 Red Alert Labs | CyberPass. All rights reserved.
Terms & Conditions
Privacy Policy