Security archives

2 posts from February 2025

How to conduct a vulnerability assessment

By Luci Stanescu, 28 February 2025

The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters...

EU Cyber Resilience Act compliance: best practices for IoT manufacturers

By Stephanie Domas, 6 February 2025

The EU Cyber Resilience Act has considerable repercussions for the IoT device manufacturers. In this blog, we explore these new regulatory requirements and...