Introducing the ISMS Essentials module: a new era in Information Security Management
We are thrilled to announce that the first version of the much-anticipated ISMS Essentials content module is now publicly available! This module represents our initial attempt to create an information model for the basics of information security management, and you...
At Metso, cybersecurity is everyone’s responsibility – from top management to employees and partners
The cybersecurity threat landscape has grown more severe, leading industrial customers to impose increasingly stringent cybersecurity requirements on their suppliers. Additionally, the new European cybersecurity legislation, driven by the NIS2 directive, now mandates that manufacturing companies ensure proper cybersecurity management.
The research behind the Cyberismo solution
The ideas behind the Cyberismo solution come from years of practical experience, and they have been documented in peer-reviewed research articles. The Cyberismo research papers are open access, which means that they are distributed online, free of charge or other...
Announcing the technology preview of Cyberismo solution
Make a difference in cybersecurity with the Cyberismo solution Development teams are facing increasing requirements for cybersecurity and compliance to protect their users and stakeholders from more and more serious cybersecurity threats. However, adopting...
NIS2 puts cybersecurity to the top management agenda
We introduced the EU NIS2 directive in our previous NIS2 blog post. The deadline when NIS2 requirements will start to apply is approaching soon, so most impacted organisations are probably well on their way to being compliant. However, the improved level of...
How to succeed in an ISO 27001 project: Case Modulight
About Modulight Modulight Corporation is a biomedical laser company that designs and manufactures products for oncology, ophthalmology, and genetics. The company also provides solutions for selected high value-add applications including quantum computing and...
The aspects of the EU CRA that I think about at night
The EU Cyber Resilience Act is a fundamental change. Its impacts range from portfolio and product management and procurement to development, manufacturing, maintenance and cyber security response. The following mind map summarises the aspects of the act that I...
Panel discussion about EU Cyber Resilience Act on April 12th, 2024
Seadot Cybersecurity is arranging a free-of-charge panel discussion about the new EU Cyber Resilience Act (CRA) on Friday, April 12th, 2024. Join Olle E Johansson from Edvina, Martin Jerling from Assa Abbloy and Henry Haverinen from Cyberismo in this in-depth...
Take control of your supply chain – part 1
Chances are that if you are building any type of non-trivial software product, you are standing on the shoulders of giants and rely on an existing ecosystem of open source or commercial components. You cannot really compile even the simplest Hello World in C...
Why the EU Cyber Resilience Act is a Big Deal – Part 3
This post is the third part of a series of blog posts, where we discuss the impacts of the new EU Cyber Resilience Act and compare it briefly to the industrial cybersecurity standard IEC 62443. In this Part 3, we will discuss the practical implications that the act...