min reading time


Download EUCC Study 2026 for the most important and up-to-date information about the new European Union Cybersecurity Certification Scheme


Learn everything you need to know for a successful Common Criteria certification project. Save costs and effort with your checklist.

This article maps the technical architecture of the EUCC against classic Common Criteria: assurance levels, vulnerability analysis requirements, and the evidence your team must deliver before certification. Learn how AVA_VAN level replaces EAL as the primary classification criterion, what Substantial and High assurance require in practice, and how conformity assessment works under Commission Implementing Regulation (EU) 2024/482.
min reading time

This article provides a comprehensive guide to meeting consumer IoT security standards using the ETSI EN 303 645 framework. It explains why this standard has become the global baseline for compliance, serving as a critical foundation for regulations like the UK PSTI Act and the upcoming EU Cyber Resilience Act (CRA). The post breaks down the 13 essential security provisions, such as banning default passwords and securing software updates, and outlines a structured assessment path from scope definition to accredited testing. Learn how to treat security as a design constraint to avoid market delays, leverage gap analysis for early detection of vulnerabilities, and turn technical compliance into a trusted competitive edge for your smart devices.
5
min reading time

This article provides a strategic guide to the new EUCC assurance levels, explaining what "Substantial" and "High" certifications actually mean for your market access. It demystifies the critical shift from simple EAL numbers to risk-based vulnerability analysis (AVA_VAN), detailing exactly which products require advanced penetration testing versus basic surveys. You will learn how to map your device to the correct assurance category, navigate the new mandatory lifecycle and patching requirements, and avoid the costly trap of over-engineering your compliance strategy.
5
min reading time