top of page
Welcome To The Embedded Product Cybersecurity News Center


Arianna Gringiani
2 days ago
RED DA and CRA: How the Newest EU Cybersecurity Legislations Impact Your Products
Understand the applicability and requirements of the newest EU cybersecurity legislations: RED DA and CRA

Arianna Gringiani
Feb 6
Cybersecurity standards EN 18031 are now harmonized
Understand what the harmonization of the EN 18031 standards means for your business

Security Pattern Office
Dec 31, 2024
Product Cybersecurity Compliance for 2025
This article presents the critical deadlines and the best practices for shaping product cybersecurity in 2025.

John Salvato & Security Pattern Office
Dec 17, 2024
FDA Artifact Deep-Dive #4: SBOM & Vulnerability Management
How do MDMs maintain a secure device? Most connected devices will be used for many years. Certainly new threats will emerge regularly...

John Salvato & Security Pattern Office
Dec 12, 2024
FDA Artifact Deep-Dive #3: Cybersecurity Evaluations
Device cybersecurity evaluations are a critical, widely understood, and practiced Design Verification activity for connected medical ...

John Salvato & Security Pattern Office
Dec 4, 2024
FDA Artifact Deep-Dive #2: Cybersecurity Risk Management (CRM)
What is Cybersecurity Risk Management (CRM)? Robust Cybersecurity Risk Management (CRM) prevents damage to...

John Salvato & Security Pattern Office
Nov 6, 2024
FDA Artifact Deep-Dive #1: Threat Modeling
What is a Threat Model? A secure development framework emphasizes that security requirements be integrated into the development process...

John Salvato & Security Pattern Office
Oct 30, 2024
FDA Blog Series: The importance of Secure Product Development for Medical Devices
For almost 30 years, medical device product developers have thought of design control in the simplistic model shown below from US FDA

Arianna Gringiani
Oct 20, 2024
New RED Standards Published: Is Your Business Ready for Compliance?
Do you remember the Radio Equipment Directive (RED) Delegated Act (DA) on cybersecurity? In our previous blog post - The Ultimate Guide...

Security Pattern Office
Oct 17, 2024
Leveraging Compliance Gap Analysis for ISA/IEC 62443-4-1 Certification: Riello UPS
Overview Riello Elettronica, founded in 1986 by Mr. Pierantonio Riello, has a presence today in the Electrical manufacturing industry...


Security Pattern Office
Jun 27, 2024
Strengthening Vulnerability Management in Industrial Automation and Control Systems (IACS): THYTRONIC
In the rapidly evolving landscape of technology and cybersecurity, the collaboration between Security Pattern and THYTRONIC represents a...

I. Donders
May 28, 2024
All you need to know about SBOM Management
A software bill of materials (SBOM) has become a key element in supply chain security. This list of software components used within a...

Isabella Donders & Arianna Gringiani
May 16, 2024
Understanding the UK PSTI Act: What It is and How to Comply
The Product Security and Telecommunications Infrastructure (PSTI) Act is a pivotal cybersecurity legislation enacted in the United...

Isabella Donders & Arianna Gringiani
Apr 4, 2024
The Ultimate Guide to RED’s Newest Cybersecurity Requirements
The connected world revolutionises the way we live and interact; it also brings security risks. A weakness in IoT devices could lead to much


Security Pattern Office
Feb 1, 2024
Integration of PQC in TLS Protocol for IoT Devices
With the advent of quantum computing, traditional cryptographic algorithms face an imminent threat of being compromised, necessitating...
bottom of page