Post AwEImKOqJkTArPcAPA by [email protected] | |
More posts by [email protected] | |
Post #AwEIkN2fWRpuTbJFXk by [email protected] | |
0 likes, 1 repeats | |
New blog, The Cyber Resilience Act (CRA)!The Cyber Resilience Act is going to c… | |
Post #AwEImKOqJkTArPcAPA by [email protected] | |
0 likes, 1 repeats | |
As a first concrete example, Annex 1, Part 1, can be read as a set of threats. … | |
Post #AwEIplMOXG4XLV6if2 by [email protected] | |
0 likes, 1 repeats | |
Going back to the CRA as a whole, Annex II, para 5 states:At minimum, the produ… | |
Post #AwEIqpbEG99cmcYUwi by [email protected] | |
0 likes, 1 repeats | |
It seems to me that the first paragraph requires you to diligently threat model… | |
Post #AwEIsQUwYZwzVnNNOS by [email protected] | |
0 likes, 1 repeats | |
Risk management and threat modelingThe terms are frequently used in very simila… | |
Post #AwEIwdc3jpixLRiFDk by [email protected] | |
0 likes, 0 repeats | |
The exact requirements are going to be defined by standards bodies, specificall… | |
Post #AwEIwdiRM6pPfEhLAO by [email protected] | |
0 likes, 1 repeats | |
What should you do?My general perspective is that technology producers should b… |