Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mandatory Cyber Incident Reporting Arrives in 2026: What It Means for Businesses and How to Prepare

This year marks a pivotal shift in global cybersecurity regulation. Mandatory cyber incident reporting is no longer a recommendation—it is a legal obligation. Across major jurisdictions, regulations such as the EU’s Cyber Resilience Act (CRA), the NIS2 Directive, and the U.S. Cyber Incident Reporting for Critical Infrastructure Act (CIRCIA) are introducing strict reporting timelines, expanded scope, and significant penalties for non-compliance.

Leading Medical Imaging Provider Adopts Dedicated KeyScaler-as-a-Service (KSaaS) Environment to Enhance Security, Control, and Scalability

A global leader in point-of-care ultrasound and medical imaging solutions has transitioned to a dedicated KeyScaler-as-a-Service (KSaaS) environment, marking a significant step forward in its ability to scale securely, optimise performance, and gain deeper operational insight across its connected device ecosystem.

Why Automotive & Manufacturing Can't Afford to Delay Key Management Strategy

In automotive and manufacturing, digital transformation is no longer a future ambition—it’s operational reality. Connected vehicles, smart factories, and increasingly complex supply chains have introduced a new dependency: trusted device identity and secure key management at scale. And yet, many organisations are still: This gap is no longer just a technical issue—it’s a business risk.

What the Cyber Resilience Act guidance means for connected products

The latest European Commission guidance on the Cyber Resilience Act sends a clear message to manufacturers of connected products: cybersecurity must be designed in from the start, maintained throughout the product lifecycle, and supported by demonstrable processes for risk management, vulnerability handling and ongoing support. For organizations building, deploying and managing connected devices, this is a significant shift. The CRA is not simply another compliance exercise.

What RSAC 2026 Told Me About the Future of Cybersecurity

RSAC remains the cybersecurity event. It is where the industry gathers to compare notes, pressure-test assumptions, spot the next wave of market change and, just as importantly, build the partnerships that will shape what comes next. This year in San Francisco, that energy was unmistakable. There was real buzz across the city, from the show floor and executive meetings to the side events and industry gatherings that increasingly define RSAC week.

Falcon for XIoT Extends Asset Protection to Healthcare Environments

CrowdStrike Falcon for XIoT is extending its industry-leading protections to medical devices in healthcare environments. This will provide comprehensive security for patient care at a time when healthcare organizations are a key target for threat actors. As of January 2026, the HHS listed over 750 reported breaches within healthcare environments that were under investigation.

Turning Strategy into Proof: Why We Created the Industry PoV

by Darron Antill, CEO Device Authority Across the automotive and wider manufacturing industry, conversations around PKI and key management have moved from technical design discussions to board-level priorities. Regulatory frameworks such as UNECE WP.29, ISO 21434, and the emerging EU Cyber Resilience Act are fundamentally reshaping how OEMs and supply chain partners must think about cryptographic control.

The EU Cyber Resilience Act: What It Changes - and How Device Authority Helps Manufacturers Respond

The EU Cyber Resilience Act (CRA) establishes mandatory cybersecurity requirements for most products with digital elements placed on the EU market. It raises the baseline for secure-by-design/default engineering and, critically, makes post-market security support and evidence production a compliance obligation.

Common ICT infrastructure Mistakes That Weaken Security

A robust digital infrastructure is the backbone of modern organizational resilience. Yet, foundational missteps in designing and maintaining IT infrastructure create pervasive vulnerabilities, undermining security postures and business continuity. Here are the common mistakes that dangerously weaken security.

Cryptographic Key Management Is Becoming a Structural Constraint in Automotive - Download our Whitepaper

Automotive engineering teams are being asked to deliver faster, with less tolerance for failure. Software-defined vehicle programmes, secure OTA rollouts, zonal and service-oriented architectures, and continuous feature delivery are now baseline expectations. In parallel, regulatory pressure is increasing — from WP.29 (R155/R156), ISO/SAE 21434, and the forthcoming EU Cyber Resilience Act — tightening requirements around software integrity, traceability, and lifecycle governance.