Articles by Editorial Team
The scope of EU Cyber Resilience Act (CRA) compliance
Explore the scope of the EU Cyber Resilience Act (CRA). Learn about the CRA's scope, and why secure OTA updates are essential for compliance.
|
4 min read
An overview of EU Cyber Resilience Act (CRA) compliance
Learn how the EU Cyber Resilience Act (CRA) enforces stringent cybersecurity requirements for PDEs. Explore compliance essentials in part 1 of a 4-part series.
|
5 min read
Challenges in complying with the EU Cyber Resilience Act (CRA)
Discover how manufacturers can achieve Cyber Resilience Act (CRA) compliance by tackling secure updates, SBOM management, and vulnerability tracking with robust OTA solutions.
|
7 min read
Proactive strategies to overcome EU CRA compliance challenges
Discover proactive strategies to navigate EU Cyber Resilience Act (CRA) compliance. Learn how to ensure long-term success.
|
4 min read
Driving secure innovation: ISO/SAE 21434 & UNECE compliance
ISO/SAE 21434 and UNECE R155/R156 standards reshape cybersecurity in software-defined vehicles. Compliance with these frameworks is essential for protecting consumers, ensuring vehicle safety, and driving innovation in the automotive industry.
|
7 min read
How OTA updates enhance software-defined vehicles
Discover how OTA updates enhance software-defined vehicles by improving safety, reducing recalls, and delivering benefit to producers and consumers.
|
7 min read
Enhancing maritime security and connectivity: The critical role of OTA updates in fleet management
Explore the critical role of OTA updates in maritime fleet management, ensuring enhanced security, performance, and continuous connectivity across vessels.
|
7 min read
Why is a robust over-the-air (OTA) update process critical in today’s digital age?
Lessons learned from Crowdstrike: organizations must embed digital resilience throughout their device management lifecycle.
|
7 min read
Monitoring a Fleet of IoT Devices: Key Areas of Focus
With the widespread adoption of IoT devices and their integration into critical infrastructure, safeguarding the security of these devices has become a par
|
2 min read