1
min reading time
As soon as the news started to come out regarding COVID-19 pandemic situation, CCLAB has immediately acted and we introduced some urgent measures.
Our professionals have found a secure and comforting way to provide a protected IT environment to support our day-to-day operation.
Since the beginning of this week, CCLAB employees are working from home, using the latest technologies on the highest security level.
Not just our people, but all the data we work with are safe and sound.
As soon as we experience any other issues affecting our operations, we will send an immediate note to our clients and partners.
Until then, we are fully at your disposal.
This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.
Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.
Get your FREE A-Z supporting material for smart meter security standards. Learn more about the Swiss METAS data security evaluation projects of smart metering devices.
The journey of achieving Common Criteria certification represents just the beginning of a complex, ongoing process that demands continuous attention and strategic management. Organizations worldwide invest significant resources in obtaining these prestigious security certifications, yet many underestimate the critical importance of proper lifecycle management once their products become Common Criteria certified. Effective CC certification lifecycle management ensures continuous security assurance, regulatory compliance, and market credibility throughout a product’s operational lifespan.
9
min reading time
Last-minute compliance gaps can derail launch schedules. Designing with the Radio Equipment Directive in 2025 in mind from the very beginning reduces risks, shortens approvals, and creates a competitive advantage.
8
min reading time
Imagine this: weeks from launching a connected device in Europe, hardware set, software frozen, marketing ready, then a wall. A Notified Body flags missing cybersecurity evidence under the Radio Equipment Directive (RED). The fix? A costly, months-long redesign. This happens more often than teams expect. Last-minute failures on cybersecurity aren’t always due to weak security, but missing evidence or test docs RED demands. And it’s not just Europe, globally, security rules are tightening, and buyers are asking tougher questions before contracts. RED’s Articles 3.3(d), 3.3(e), and 3.3(f) are shaping secure-by-design norms worldwide. Manufacturers treating them as a baseline not only pass audits but gain an edge. Embedding these principles early cuts risk, streamlines compliance, and proves to customers that security isn’t an afterthought. Let’s unpack why.
8
min reading time