
1
min reading time
CCLab has joined the FIDO Alliance.
We are proud to announce that CCLab has recently earned the membership of the FIDO Alliance as an Accredited Security Laboratory.
Being the first in Central and Eastern Europe, we are beyond happy to join the Alliance that is working to change the nature of authentication.
These open standards are more secure, simpler for consumers to use, and easier for service providers to manage. Our colleagues have been trained and accredited to consult and evaluate, let us know if you're interested. hashtag#CCLab hashtag#FIDO hashtag#FIDOAlliance hashtag#cclab


Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.


This downloadable infographics introduces the Common Criteria Evaluation process to you. Explore now for free.


Get your FREE A-Z supporting material for smart meter security standards. Learn more about the Swiss METAS data security evaluation projects of smart metering devices.

As the 11 September 2026 reporting deadline approaches, understanding the Cyber Resilience Act (CRA) is essential for all manufacturers of digital products. This blog post explores the key differences and overlaps between the CRA and the EUCC certification scheme, providing a clear roadmap for compliance, risk categorization, and long-term market access.
9
min reading time

Smart toys are more than just software; they are radio equipment and thus subject to strict EU regulations. Our analysis explores the interplay between RED, the CRA, and the AI Act, while outlining the essential cybersecurity testing processes for a safe market entry.
7
min reading time

Legacy systems power critical operations across industries worldwide, yet they present unique challenges when organizations pursue Common Criteria certification. The clock is ticking for manufacturers and enterprises who must navigate complex compliance requirements while maintaining operational continuity. Organizations pursuing Common Criteria certification must address unique challenges when dealing with legacy infrastructure, but with the right approach, success is achievable. The urgency cannot be overstated. Regulatory deadlines approach rapidly, and the cost of non-compliance continues to escalate. Legacy systems that once served as reliable workhorses now require strategic transformation to meet modern security standards. This guide provides actionable strategies to prepare your legacy infrastructure for certification success.
10
min reading time