Security Pattern OfficeJun 27Strengthening Vulnerability Management in Industrial Automation and Control Systems (IACS): THYTRONICIn the rapidly evolving landscape of technology and cybersecurity, the collaboration between Security Pattern and THYTRONIC represents a...
I. DondersMay 29All you need to know about SBOM Managementby Isabella Donders A software bill of materials (SBOM) has become a key element in supply chain security. This list of software...
Isabella Donders & Arianna GringianiMay 16Understanding the UK PSTI Act: What It is and How to Complyby Isabella Donders & Arianna Gringiani The Product Security and Telecommunications Infrastructure (PSTI) Act is a pivotal cybersecurity...
Isabella Donders & Arianna GringianiApr 4The Ultimate Guide to RED’s Newest Cybersecurity RequirementsThe connected world revolutionises the way we live and interact; it also brings security risks. A weakness in IoT devices could lead to much
Security Pattern OfficeFeb 1Integration of PQC in TLS Protocol for IoT DevicesWith the advent of quantum computing, traditional cryptographic algorithms face an imminent threat of being compromised, necessitating...