1
min reading time
A fraction of aspect and at the same time unthinkable damages.
Here at CCLab, we have always kept our focus on the most critical corners of IT and high-security solutions.
We have been able to develop and widen our experiences throughout the years.
In 2019 our Smart Metering Division has handled a number of projects and we have been able to refocus some of our resources towards the field of IoT.
We believe in the new digital era where IoT devices available with state of the art security.
Thanks to jtsec’s retrospect of 2019, it is easier than ever to identify and understand schemas within high-security products.
As in 2019, we have successfully evaluated 5 products within Common Criteria. We stand proudly in the midfield next to most acknowledged laboratories by the number of evaluations.
See the international report.
This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.
Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.
Download our ETSI EN 303 635 infographics today and learn about the product certification process for this consumer IoT device cybersecurity standard.
This year, CCLab sponsored the opening reception of the International Common Criteria Conference (ICCC) in Qatar. Like in previous years, CCLab experts were present during the event meeting the most important stakeholders of Common Criteria. The ICCC is a highly prestigious professional event now in its 23rd year. It provides opportunities for networking and various forums to discuss CC policy and development. It is aimed at participants involved in the specification, development, evaluation, certification, and validation of IT security products and systems.
5
min reading time
In an era where digital threats grow in complexity and frequency, cybersecurity is no longer a secondary consideration but an essential part of manufacturing operations. Compliance with security standards offers manufacturers a structured approach to managing the growing risks of digital threats and securely handling sensitive data. Compliance also helps companies meet industry regulations, protect intellectual property, and avoid potentially devastating financial losses.
8
min reading time
The Industrial Internet of Things (IIoT) has transformed the manufacturing industry, enabling real-time monitoring, improved operational efficiency, and better decision-making processes. IIoT systems integrate industrial equipment with advanced data analytics and cloud connectivity, creating smarter, more autonomous industrial environments. However, the rise of IIoT systems has also introduced significant cybersecurity challenges. As more devices connect to networks, vulnerabilities and threats in manufacturing systems increase, requiring robust security measures to protect sensitive data and ensure operational continuity.
7
min reading time