Security Pattern OfficeSep 30Exposing a Critical, Systemic Flaw in JWT: Introducing the 'Back to the Future' Attack
Maria Chiara MolteniJul 24The Emergence of Quantum Computers and Their Impact on the Security of Embedded Devices
Arianna Gringiani & Alberto BattistelloJun 24The Five Self-Assessment Activities for Compliance to RED Cybersecurity Essential Requirements
Arianna GringianiApr 30What Manufacturers Must Do to Meet EN 18031 (RED DA) Vulnerability Management Requirements
Security Pattern OfficeMar 31Our Week at Embedded World ‘25: Between Compliance Challenges and Solutions
Arianna GringianiFeb 27RED DA and CRA: How the Newest EU Cybersecurity Legislations Impact Your Products
John Salvato & Security Pattern OfficeDec 17, 2024FDA Artifact Deep-Dive #4: SBOM & Vulnerability Management
John Salvato & Security Pattern OfficeDec 12, 2024FDA Artifact Deep-Dive #3: Cybersecurity Evaluations
John Salvato & Security Pattern OfficeDec 4, 2024FDA Artifact Deep-Dive #2: Cybersecurity Risk Management (CRM)
John Salvato & Security Pattern OfficeOct 30, 2024FDA Blog Series: The importance of Secure Product Development for Medical Devices
Security Pattern OfficeOct 17, 2024Leveraging Compliance Gap Analysis for ISA/IEC 62443-4-1 Certification: Riello UPS
Arianna GringianiOct 16, 2024The European Council adopted the Cyber Resilience Act - Are you prepared?
Security Pattern OfficeSep 22, 2024Protect Your Future with DEKRA and Security Pattern: A Recap of a Successful Cybersecurity Event