-
Cybersecurity Requirements for Medical Devices
The IEEE established a Medical Cybersecurity Certification Program, and atsec is the first IEEE recognized testing lab!
-
Artificial Intelligence in Evaluation, Validation, Testing and Certification
AI is becoming increasingly prevalent and powerful – how is atsec planning to use it?
-
First Post-Quantum Algorithm Certificate issued by CAVP3
atsec obtained the first validation for a post-quantum cryptographic algorithm using the ACVP.
-
The IoT Security Global Certification Challenges
With IoT devices now integral to our lives, how will we protect the data they collect from cyber criminals?
-
CEST (Confidential Evaluation of Software Trustworthiness) project finished
The Confidential Evaluation of Software Trustworthiness research project has been completed!
-
atsec is recognized as a SCAS Testing laboratory in the German NESAS certification scheme
As one of the first companies in Germany, atsec has become a certified evaluation laboratory in the German Network Equipment Security Assurance Scheme Cybersecurity Certification Scheme – German Implementation (NESAS CCS-GI) scheme maintained by BSI (Bundesamt für Sicherheit in der Informationstechnik). This certification scheme is based on the…
-
New Cyber Resilience Act in the European Union
On September 15, 2022, the EU Commission presented a proposal for a new Cyber Resilience Act to protect consumers and businesses from products with inadequate security features. This EU legislation introduces mandatory cybersecurity requirements for products with digital elements, throughout their whole lifecycle. The EU legislation will impose:…
-
Securing the Software Supply Chain
All components comprising a software product are ultimately the responsibility of the developer of that product, even if one or more of those components is supplied by a third party. This is especially true when the product is evaluated for Common Criteria (CC) certification. Recently, the National Security…
-
Challenges and Opportunities
Many of us who have been in the evaluation and certification (validation) business have seen the development, not only of security requirements and schemes, but also how the “security echo system” works. A few weeks ago, I was generously given the opportunity to share some ideas at the…