<![CDATA[Security Pattern]]>https://www.securitypattern.com/blogRSS for NodeSun, 26 Apr 2026 22:40:57 GMT<![CDATA[Security Pattern and Element publish the 'EN 18031 Asset Identification Guide']]>https://www.securitypattern.com/post/en-18031-asset-identification-guide69c15dfe36a1fdc193bb641eThu, 26 Mar 2026 09:46:11 GMTSecurity Pattern Office<![CDATA[Security Pattern Spins Out ARIANNA as New Cybersecurity Company, Appoints CEO and CTO]]>https://www.securitypattern.com/post/security-pattern-spins-out-arianna69c12b5a32b5c00587e0cadaMon, 23 Mar 2026 14:26:51 GMTSecurity Pattern Office<![CDATA[Our Three Year Journey with ORSHIN]]>https://www.securitypattern.com/post/our-three-year-journey-with-orshin69957dbfe46cb5907d9b7aa7Wed, 18 Feb 2026 09:51:21 GMTMaria Chiara Molteni<![CDATA[Exposing a Critical, Systemic Flaw in JWT: Introducing the 'Back to the Future' Attack]]>https://www.securitypattern.com/post/introducing-the-back-to-the-future-attack68dbf45ffc357fbe9016d5aaTue, 30 Sep 2025 15:46:59 GMTSecurity Pattern Office<![CDATA[Security Pattern Releases Powerful ARIANNA Platform Update]]>https://www.securitypattern.com/post/security-pattern-releases-powerful-arianna-platform-update68496eba9bd4fc2c176cb3e7Thu, 14 Aug 2025 08:15:29 GMTSecurity Pattern Office<![CDATA[The Emergence of Quantum Computers and Their Impact on the Security of Embedded Devices]]>https://www.securitypattern.com/post/the-emergence-of-quantum-computers-and-their-impact-on-the-security-of-embedded-devices68810846e601119bd99badb5Thu, 24 Jul 2025 08:04:16 GMTMaria Chiara Molteni<![CDATA[The Five Self-Assessment Activities for Compliance to RED Cybersecurity Essential Requirements]]>https://www.securitypattern.com/post/the-five-essential-self-assessment-activities-for-red-da-compliance685967ddb62ad3b0c7a38624Tue, 24 Jun 2025 12:44:33 GMTArianna Gringiani & Alberto Battistello<![CDATA[What Manufacturers Must Do to Meet EN 18031 (RED DA) Vulnerability Management Requirements]]>https://www.securitypattern.com/post/en-18031-red-da-vulnerability-management-requirements6810fd79b826b2fa87a4772aWed, 30 Apr 2025 08:20:48 GMTArianna Gringiani<![CDATA[How Hacking an Air Purifier Helps Understand RED and CRA]]>https://www.securitypattern.com/post/hacking-an-air-purifier-red-and-cra67eaafae807640cc34f5f0bdMon, 31 Mar 2025 15:23:39 GMTFederico Gorla<![CDATA[Our Week at Embedded World ‘25: Between Compliance Challenges and Solutions ]]>https://www.securitypattern.com/post/embedded-world-2567ea6f1b3352fee7c94c7f22Mon, 31 Mar 2025 11:15:43 GMTSecurity Pattern Office<![CDATA[RED DA and CRA: How the Newest EU Cybersecurity Legislations Impact Your Products]]>https://www.securitypattern.com/post/how-the-newest-eu-cybersecurity-legislations-impact-your-products67c0351b10139ef67469546aThu, 27 Feb 2025 12:21:44 GMTArianna Gringiani<![CDATA[Cybersecurity standards EN 18031 are now harmonized]]>https://www.securitypattern.com/post/cybersecurity-standards-en-18031-are-now-harmonized67a499ab3861bda4dc5f3fddWed, 05 Feb 2025 23:00:00 GMTArianna Gringiani<![CDATA[Product Cybersecurity Compliance for 2025]]>https://www.securitypattern.com/post/product-cybersecurity-compliance-for-202567616aa5e18e0e3a472ba587Mon, 30 Dec 2024 23:00:00 GMTSecurity Pattern Office<![CDATA[FDA Artifact Deep-Dive #4: SBOM & Vulnerability Management]]>https://www.securitypattern.com/post/fda-artifact-deep-dive-4-sbom-vulnerability-management676170dad2057084f3092f45Tue, 17 Dec 2024 13:07:09 GMTJohn Salvato & Security Pattern Office<![CDATA[FDA Artifact Deep-Dive #3: Cybersecurity Evaluations]]>https://www.securitypattern.com/post/fda-artifact-deep-dive-3-cybersecurity-evaluations675aa37bd2fb635eb956a6a3Thu, 12 Dec 2024 09:05:36 GMTJohn Salvato & Security Pattern Office<![CDATA[FDA Artifact Deep-Dive #2: Cybersecurity Risk Management (CRM)]]>https://www.securitypattern.com/post/fda-artifact-deep-dive-2-cybersecurity-risk-management-crm67515d5043a8e44b31cdd1b2Tue, 03 Dec 2024 23:00:00 GMTJohn Salvato & Security Pattern Office<![CDATA[Advancing Medical Device Security: Key Insights from MEDICA 2024]]>https://www.securitypattern.com/post/advancing-medical-device-security-key-insights-from-medica-2024673e10e7901fa448e8178145Sun, 17 Nov 2024 23:00:00 GMTSecurity Pattern Office<![CDATA[FDA Artifact Deep-Dive #1: Threat Modeling]]>https://www.securitypattern.com/post/fda-artifact-deep-dive-1-threat-modeling672b486b77554f64fa6c8feaWed, 06 Nov 2024 11:23:55 GMTJohn Salvato & Security Pattern Office<![CDATA[FDA Blog Series: The importance of Secure Product Development for Medical Devices]]>https://www.securitypattern.com/post/fda-blog-series-the-importance-of-secure-product-development-for-medical-devices6720ddb0f6a2fb9571d49bf4Wed, 30 Oct 2024 10:40:50 GMTJohn Salvato & Security Pattern Office<![CDATA[New RED Standards Published: Is Your Business Ready for Compliance?]]>https://www.securitypattern.com/post/new-red-standards-published-is-your-business-ready-for-compliance6715432a5e91714856429931Sun, 20 Oct 2024 22:00:00 GMTArianna Gringiani