-
Continue reading →: Insights and Recommendations on Comparing and Enabling Mutual Recognition of Cybersecurity Labels Between Japan and EuropeAuthors: Roland Atoui & Isaac Dangana Introduction The photovoltaic (PV) sector is rapidly becoming “digital infrastructure,” not just power electronics. Modern PV and storage deployments increasingly rely on networked inverters, gateways, and cloud-connected monitoring/control functions, which expands both the attack surface and the potential impact of a successful compromise. The…
-
Continue reading →: MWC26: Where Cybersecurity, Legislation, and AI MeetAuthor: Arantxa Herranz The comparison between the technology sector and the automotive industry is not new. Indeed, there have been many occasions when the similarities and differences between the two have been put on the table to discuss various issues. Once again, at the Huawei European Cybersecurity Workshop, some speakers…
-
Continue reading →: Commission preliminarily finds TikTok’s addictive design in breach of the Digital Services ActToday,Feburary 2, the European Commission preliminarily found TikTok in breach of the Digital Services Act for its addictive design. This includes features such as infinite scroll, autoplay, push notifications, and its highly personalised recommender system. (source: https://ec.europa.eu/commission/presscorner/detail/en/ip_26_312) Risk assessment The Commission’s investigation preliminarily indicates that TikTok did not adequately assess…
-
Continue reading →: How to build better trust standards to implement security by designAuthors: Roland Atoui & Isaac Dangana Introduction: Bridging the gap Everyone wants Security by Design, but few are able to make it a regular practice over time. The reasons why enterprises are unable to achieve this lofty ideal are many and varied but this article will focus on one of…
-
Continue reading →: When One Breach Cripples a Nation: Inside the Devastating Rise of Ransomware in 2024-2025Authors: Yassine El Hadi & Paul Gedeon Today, ransomware attacks are among the most damaging types of cybercrime. This threat can even lead to the downfall of organizations of a medium or large size. Malefactors take advantage of double and triple extortion by locking the data, stealing it, threatening to…
-
Continue reading →: Insights into the European Penetration Testing Ecosystem and Tool TechnologiesAuthors: Ayman Khalil & Paul Gedeon Beyond the Hoodie Cyberattacks are no longer rare, one-off events. For many organizations, they’re part of the weekly reality, something you plan for, like outages, supplier delays, or equipment failures. Because much of our economy now depends on connected systems, penetration testing has moved…
-
Continue reading →: Simpler EU digital rules and new digital wallets to save billions for businesses and boost innovationEurope’s businesses, from factories to start-ups, will spend less time on administrative work and compliance and more time innovating and scaling-up, thanks to the European Commission’s new digital package. This initiative opens opportunities for European companies to grow and to stay at the forefront of technology while at the same time promoting…
-
Continue reading →: Trusted: How a Technical Term Became the Secret Code of CybersecurityIf you’ve been in the cybersecurity industry long enough, you’ll notice a strange phenomenon: certain words quietly start showing up everywhere. You don’t remember exactly when they arrived, but suddenly they’re in every policy memo, every vendor brochure, every audit checklist. “Trusted” is one of those words.Its story is longer—and…
-
Continue reading →: BSI TR-03185-2 supports secure Free Software developmentThe German Federal Office for Information Security (BSI) has published the Technical Guideline TR-03185-2 “Secure Software Lifecycle for Open Source Software” (OSS). It was created in dialogue with the OSS community and provides simple, abstract, and practicable criteria that define a framework for the secure development of OSS. This is also calledFree / Libre and Open-Source…
-
Continue reading →: Europe’s Cyber Reality Check: Insights from ENISA’s Threat Landscape 20251. A New Kind of Cyber Era Let’s be honest: Europe’s digital ecosystem has never been more connected—or more vulnerable.ENISA’s newly released Threat Landscape 2025 (ETL 2025) report gives a sharp, evidence-driven snapshot of what’s really happening beneath that surface.Based on data from July 2024 to June 2025, the report…
