top of page
Welcome To The Embedded Product Cybersecurity News Center


How Hacking an Air Purifier Helps Understand RED and CRA
This blog reviews a published hack of a Air Purifier and evaluates it against RED and CRA requirements
Security Pattern Office
4 days ago

RED DA and CRA: How the Newest EU Cybersecurity Legislations Impact Your Products
Understand the applicability and requirements of the newest EU cybersecurity legislations: RED DA and CRA
Arianna Gringiani
Feb 27

Cybersecurity standards EN 18031 are now harmonized
Understand what the harmonization of the EN 18031 standards means for your business
Arianna Gringiani
Feb 6

Product Cybersecurity Compliance for 2025
This article presents the critical deadlines and the best practices for shaping product cybersecurity in 2025.
Security Pattern Office
Dec 31, 2024

FDA Artifact Deep-Dive #4: SBOM & Vulnerability Management
How do MDMs maintain a secure device? Most connected devices will be used for many years. Certainly new threats will emerge regularly...
John Salvato & Security Pattern Office
Dec 17, 2024

FDA Artifact Deep-Dive #3: Cybersecurity Evaluations
Device cybersecurity evaluations are a critical, widely understood, and practiced Design Verification activity for connected medical ...
John Salvato & Security Pattern Office
Dec 12, 2024

FDA Artifact Deep-Dive #2: Cybersecurity Risk Management (CRM)
What is Cybersecurity Risk Management (CRM)? Robust Cybersecurity Risk Management (CRM) prevents damage to...
John Salvato & Security Pattern Office
Dec 4, 2024

FDA Artifact Deep-Dive #1: Threat Modeling
What is a Threat Model? A secure development framework emphasizes that security requirements be integrated into the development process...
John Salvato & Security Pattern Office
Nov 6, 2024

FDA Blog Series: The importance of Secure Product Development for Medical Devices
For almost 30 years, medical device product developers have thought of design control in the simplistic model shown below from US FDA
John Salvato & Security Pattern Office
Oct 30, 2024

New RED Standards Published: Is Your Business Ready for Compliance?
Do you remember the Radio Equipment Directive (RED) Delegated Act (DA) on cybersecurity? In our previous blog post - The Ultimate Guide...
Arianna Gringiani
Oct 21, 2024

Leveraging Compliance Gap Analysis for ISA/IEC 62443-4-1 Certification: Riello UPS
Overview Riello Elettronica, founded in 1986 by Mr. Pierantonio Riello, has a presence today in the Electrical manufacturing industry...
Security Pattern Office
Oct 17, 2024


Strengthening Vulnerability Management in Industrial Automation and Control Systems (IACS): THYTRONIC
In the rapidly evolving landscape of technology and cybersecurity, the collaboration between Security Pattern and THYTRONIC represents a...
Security Pattern Office
Jun 27, 2024

All you need to know about SBOM Management
A software bill of materials (SBOM) has become a key element in supply chain security. This list of software components used within a...
I. Donders
May 29, 2024

Understanding the UK PSTI Act: What It is and How to Comply
The Product Security and Telecommunications Infrastructure (PSTI) Act is a pivotal cybersecurity legislation enacted in the United...
Isabella Donders & Arianna Gringiani
May 16, 2024

The Ultimate Guide to RED’s Newest Cybersecurity Requirements
The connected world revolutionises the way we live and interact; it also brings security risks. A weakness in IoT devices could lead to much
Isabella Donders & Arianna Gringiani
Apr 4, 2024


Integration of PQC in TLS Protocol for IoT Devices
With the advent of quantum computing, traditional cryptographic algorithms face an imminent threat of being compromised, necessitating...
Security Pattern Office
Feb 1, 2024
bottom of page