a) Disrupts or has the potential to disrupt normal operations,
b) Threatens confidentiality, integrity, or availability of information, or
c) Violates security policies or acceptable use.
a) Disrupts or has the potential to disrupt normal operations,
b) Threatens confidentiality, integrity, or availability of information, or
c) Violates security policies or acceptable use.
It is defined in paragraph 19 of Article 3 "Definitions" of CHAPTER I "GENERAL PROVISIONS"
It is defined in paragraph 19 of Article 3 "Definitions" of CHAPTER I "GENERAL PROVISIONS"
in products with digital elements and that are manufactured according to the same specifications as the components that
they are intended to replace.
in products with digital elements and that are manufactured according to the same specifications as the components that
they are intended to replace.
the definition laid down in this Regulation. ..." In the same paragraph, the "Directive (EU) 2022/2555" is mentioned. What is it?
the definition laid down in this Regulation. ..." In the same paragraph, the "Directive (EU) 2022/2555" is mentioned. What is it?
www.forbes.com/sites/daveyw...
www.forbes.com/sites/daveyw...
Here is a great experiment that shows why we need such requirement www.xda-developers.com/set-up-ssh-h...
Here is a great experiment that shows why we need such requirement www.xda-developers.com/set-up-ssh-h...
Union to carry out conformity assessments, in order to avoid bottlenecks and hindrances to market entry.
webgate.ec.europa.eu/single-marke...
Union to carry out conformity assessments, in order to avoid bottlenecks and hindrances to market entry.
webgate.ec.europa.eu/single-marke...
Cybersecurity is a vast field, much like the shadow of IT itself. There are as many sectors in cybersecurity as there are in IT. Here are key lessons I wish I knew earlier: 1. Cybersecurity is Extremely Diverse The field spans network…
Cybersecurity is a vast field, much like the shadow of IT itself. There are as many sectors in cybersecurity as there are in IT. Here are key lessons I wish I knew earlier: 1. Cybersecurity is Extremely Diverse The field spans network…
certification.enisa.europa.eu/news/first-e...
certification.enisa.europa.eu/news/first-e...
The rapid adoption of industrial automation, especially in Asia, presents both opportunities and cybersecurity risks. As manufacturing systems integrate more software-driven solutions, vulnerabilities in operational…
The rapid adoption of industrial automation, especially in Asia, presents both opportunities and cybersecurity risks. As manufacturing systems integrate more software-driven solutions, vulnerabilities in operational…
In industrial control systems (ICS), cybersecurity isn't just about protecting infrastructure from cyberattacks—it's also about ensuring availability as the top priority. Foundational Requirement 7, "Resource…
But...
industrialcyber.co/regulation-s...
But...
Sounds technical - but CRUCIALLY this is a practical, achievable measure to reduce unnecessary barriers to UK-EU trade. Proposed by @uktradebusiness.bsky.social in 2023!
youtu.be/XMAfeQQ2ZOM?...
#CRA #SBOM #OWASP
@owasp.org
The obligation of device manufacturers is to provide such security updates.
The obligation of device manufacturers is to provide such security updates.
owasp.org/www-project-...
owasp.org/www-project-...