1
min reading time
CCLab has joined the FIDO Alliance.
We are proud to announce that CCLab has recently earned the membership of the FIDO Alliance as an Accredited Security Laboratory.
Being the first in Central and Eastern Europe, we are beyond happy to join the Alliance that is working to change the nature of authentication.
These open standards are more secure, simpler for consumers to use, and easier for service providers to manage. Our colleagues have been trained and accredited to consult and evaluate, let us know if you're interested. hashtag#CCLab hashtag#FIDO hashtag#FIDOAlliance hashtag#cclab
Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.
This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.
Get your FREE A-Z supporting material for smart meter security standards. Learn more about the Swiss METAS data security evaluation projects of smart metering devices.
The European Union's digital infrastructure is continuously evolving to facilitate secure, cross-border electronic transactions. In this context, two crucial frameworks—the eIDAS regulation and the Common Criteria standard— play pivotal roles. eIDAS (Electronic Identification, Authentication, and Trust Services) aims to unify and enhance electronic identification systems across the EU. Meanwhile, the Common Criteria standard offers a comprehensive framework for evaluating the security of IT products and systems.
7
min reading time
The EUCC scheme, spearheaded by the European Union Agency for Cybersecurity (ENISA), was released in early 2024. It builds on the SOG-IS Common Criteria evaluation framework already used by 17 EU Member States.
7
min reading time
ICT (Information and Communication Technology) products, encompassing a wide range of digital devices and software, are inherently vulnerable due to their complexity and the ever-present potential for undiscovered security flaws. The interconnected nature of these products further amplifies the risk, as a single vulnerability can lead to widespread security breaches across networks and systems. To mitigate these risks, the strategic integration of cybersecurity certification requirements in ICT products has become paramount.
8
min reading time