1
min reading time
Trident HSM is the second Signature Activation Module we have evaluated which achieved eIDAS conformity.
Receiving positive feedback is a perfect way to start a week.
"CCLAB efficiently supported us throughout the whole change management process. The predictability, accurate scheduling, and supportive mindset helped us to finish the project in time."
Thank you. It is always a pleasure to collaborate with innovative companies, such as i4p Informatikai Kft.
TRIDENT is the first HSM in the world to combine high-level hardware security and multi-party computation in order to provide the highest level of data protection required in business.
See more at https://www.i4p.com
This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.
Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.
Read and learn more about the Radio Equipment Directive (RED), download our free material now.
Achieving Common Criteria certification is a crucial step for developers and organizations aiming to demonstrate the security and reliability of their IT products. However, the certification process is known for its complexity, requiring strict adherence to extensive documentation and evaluation protocols. Developers often face challenges in understanding intricate requirements, structuring their submissions, and ensuring compliance with rigorous standards.
6
min reading time
The rapid evolution of emerging technologies is reshaping industries and introducing unprecedented levels of innovation. However, this technological advancement also brings new security risks, necessitating stringent compliance with internationally recognized standards. One such standard is Common Criteria (CC), a globally accepted framework for evaluating the security properties of IT products. While CC evaluation ensures a product meets rigorous security requirements, applying this framework to emerging technologies presents several challenges. This article will explore these challenges in detail and provide insights into overcoming them.
7
min reading time
Cloud computing offers unparalleled flexibility, allowing organizations to process vast amounts of data efficiently. However, security remains a major concern. Cloud security standards provide guidelines to secure cloud environments, while Common Criteria (CC) ensures IT products meet stringent security requirements. This article explores the role of cloud services in IoT, the associated security risks, and how aligning Common Criteria evaluation with cloud security standards enhances cybersecurity.
7
min reading time