Security archives
2 posts from February 2025
How to conduct a vulnerability assessment
By Luci Stanescu, 28 February 2025
The realm of information security is fraught with jargon, as anyone who has come across vulnerability-related terms can tell you. To complicate matters...
EU Cyber Resilience Act compliance: best practices for IoT manufacturers
By Stephanie Domas, 6 February 2025
The EU Cyber Resilience Act has considerable repercussions for the IoT device manufacturers. In this blog, we explore these new regulatory requirements and...