Introduction
Introduction Statistics Contact Development Disclaimer Help
Post AwEImKOqJkTArPcAPA by [email protected]
More posts by [email protected]
Post #AwEIkN2fWRpuTbJFXk by [email protected]
0 likes, 1 repeats
New blog, The Cyber Resilience Act (CRA)!The Cyber Resilience Act is going to c…
Post #AwEImKOqJkTArPcAPA by [email protected]
0 likes, 1 repeats
As a first concrete example, Annex 1, Part 1, can be read as a set of threats. …
Post #AwEIplMOXG4XLV6if2 by [email protected]
0 likes, 1 repeats
Going back to the CRA as a whole, Annex II, para 5 states:At minimum, the produ…
Post #AwEIqpbEG99cmcYUwi by [email protected]
0 likes, 1 repeats
It seems to me that the first paragraph requires you to diligently threat model…
Post #AwEIsQUwYZwzVnNNOS by [email protected]
0 likes, 1 repeats
Risk management and threat modelingThe terms are frequently used in very simila…
Post #AwEIwdc3jpixLRiFDk by [email protected]
0 likes, 0 repeats
The exact requirements are going to be defined by standards bodies, specificall…
Post #AwEIwdiRM6pPfEhLAO by [email protected]
0 likes, 1 repeats
What should you do?My general perspective is that technology producers should b…
You are viewing proxied material from pleroma.anduin.net. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.