Uncategorized

  • CRA standardisation request CEN CENELEC ETSI: A 2026 compliance guide

    CRA standardisation request CEN CENELEC ETSI: A 2026 compliance guide

    The CRA standardisation request is the European Commission's official instruction to Europe’s main standardisation bodies: CEN, CENELEC, and ETSI. In simple terms, it's the kick-off for creating the detailed technical rulebooks—called harmonised standards—that will define how manufacturers can meet the legal duties of the Cyber Resilience Act. Following these standards will give you a clear,…

  • Your Guide to CRA Common Specifications and EU Market Access

    Your Guide to CRA Common Specifications and EU Market Access

    Think of CRA common specifications as the EU's official technical manual for digital product security. They are detailed technical standards drafted by the European Commission, which become legally mandatory whenever official harmonised standards aren't available or suitable. These rules exist to ensure that all ‘products with digital elements’ meet a consistent, enforceable cybersecurity baseline before…

  • Your Guide to CRA Harmonised Standards for Full Compliance

    Your Guide to CRA Harmonised Standards for Full Compliance

    Harmonised standards under the Cyber Resilience Act (CRA) are your most direct, pre-approved path to proving a product meets its legal requirements. Think of them as certified recipes for cybersecurity; follow a standard that’s listed in the Official Journal of the European Union, and you gain a legal "presumption of conformity." This single benefit can…

  • Your Guide to the SonarQube Maven Plugin in 2026

    Your Guide to the SonarQube Maven Plugin in 2026

    For any team running on Maven, the SonarQube Maven plugin is the most direct way to embed continuous code analysis into your build lifecycle. It lets you run mvn sonar:sonar to find bugs, vulnerabilities, and code smells without needing a separate scanner installation or complex CI/CD scripts. It is, quite simply, the native way to…

  • The 12 Best Logos Open Source Tools and Libraries for 2026

    The 12 Best Logos Open Source Tools and Libraries for 2026

    In a world of expensive subscriptions, finding high-quality tools for creating and managing brand assets can be a significant hurdle. But what if you could access a professional-grade creative suite without the licensing fees? This guide dives deep into the world of logos open source, showcasing 12 powerful tools and libraries that empower startups, developers,…

  • A Developer’s Guide to Spring Boot Actuator

    A Developer’s Guide to Spring Boot Actuator

    Spring Boot Actuator is a sub-project of Spring Boot that adds production-ready features to your application. It provides built-in HTTP endpoints to monitor and manage your service, giving you immediate insights without writing complex custom code. What Is Spring Boot Actuator and Why You Need It Imagine deploying a new application into production. How do…

  • Open South Code: open south code essentials for EU compliance in 2026

    Open South Code: open south code essentials for EU compliance in 2026

    If you’ve stumbled here looking for “open south code,” you’re in the right place, even if the term isn’t quite right. You’re most likely looking for information on open source code, a cornerstone of modern software development. But that typo also points to something real and increasingly important: the OpenSouthCode conference in Malaga, a major…

  • A Guide to AWS Secrets Manager for EU Compliance

    A Guide to AWS Secrets Manager for EU Compliance

    Think of your application’s database credentials and API keys as the master keys to your business. Hardcoding them directly into your source code is the digital equivalent of leaving these keys under the doormat—a convenient but dangerously outdated practice. AWS Secrets Manager is the secure digital vault built to fix this, protecting credentials, managing their…

  • No Root Firewall Guide for IoT and Embedded Systems

    No Root Firewall Guide for IoT and Embedded Systems

    A no root firewall acts as a dedicated security guard for individual applications, controlling their internet access without needing the ‘master keys’ to the entire system (root privileges). This is a major shift away from traditional firewalls that demand deep system integration, offering a far more contained and secure way to manage network traffic—especially for…

  • A Developer’s Guide to the GCC -o Option

    A Developer’s Guide to the GCC -o Option

    The gcc -o option is a fundamental flag that tells the GCC compiler exactly what to name your output file. Instead of letting the compiler fall back to a generic, easily-overwritten file named a.out, this flag gives you complete control. It’s how you produce a clearly named executable or other build artefact. Why Is the…

  • Penetration Testing as a Service: Secure Your Product for CRA Compliance

    Penetration Testing as a Service: Secure Your Product for CRA Compliance

    For product manufacturers and IoT vendors, the ground has shifted. The old approach of a single, annual security check just doesn’t cut it anymore. Regulations like the EU’s Cyber Resilience Act (CRA) now demand continuous vigilance, forcing a move to more modern, agile security practices. This is where Penetration Testing as a Service (PTaaS) comes…

  • A Developer’s Guide to the GCC -f Option

    A Developer’s Guide to the GCC -f Option

    The gcc -f option isn’t a single command. It’s a massive family of flags that give you direct, fine-grained control over how the GNU Compiler Collection (GCC) generates code. These options are the tools of the trade for any serious developer wanting to go beyond the defaults. With -f flags, you can influence everything from…

  • Unlock Faster Builds with the gcc -pipe option

    Unlock Faster Builds with the gcc -pipe option

    Ever heard of the gcc -pipe option? It’s a simple flag you can pass to your compiler, but it has a surprisingly big impact. In short, it tells GCC to use memory for all the intermediate steps of compilation instead of writing temporary files to your disk. This simple change means data gets passed directly…

  • A Guide to Black Duck Software for EU Compliance

    A Guide to Black Duck Software for EU Compliance

    At its core, Black Duck software is a powerful security tool that acts like a building inspector for your code. It automates the process of finding, inventorying, and analysing all the third-party and open-source components used in your applications—a process known in the industry as Software Composition Analysis (SCA). What Is Black Duck and How…

  • A Guide to the Qualys Cloud Agent for CRA Compliance

    A Guide to the Qualys Cloud Agent for CRA Compliance

    The Qualys Cloud Agent is a small, lightweight piece of software you install on your digital products to get continuous security and compliance monitoring. Think of it as a sensor that reports back on vulnerabilities, configurations, and inventory directly to the Qualys Cloud Platform. This gives you constant visibility into the security posture of your…

  • Your Practical OWASP Testing Guide for CRA Compliance in 2026

    Your Practical OWASP Testing Guide for CRA Compliance in 2026

    When you’re talking about web application security testing, the OWASP Testing Guide (OTG) is the framework that everyone builds on. It’s the industry-standard playbook, giving you a complete methodology and practical techniques to find and fix security vulnerabilities. What Is the OWASP Testing Guide The OWASP Testing Guide is essentially a detailed manual for testing…

  • Shift to Left Security for EU CRA Compliance

    Shift to Left Security for EU CRA Compliance

    To put it simply, shift to left is all about moving security and testing to the very beginning of the product development lifecycle, instead of treating them as an afterthought. If you picture the development process as a timeline from left to right, this strategy pulls critical checks from the far right (just before launch)…

  • Artefact vs Artifact A Guide for Technical and Compliance Teams

    Artefact vs Artifact A Guide for Technical and Compliance Teams

    When it comes to artefact vs artifact, the core of the issue isn’t about meaning—it’s about geography. The two words mean the exact same thing, but their spelling signals a regional preference. Think of it as the technical writing equivalent of “colour” versus “color.” The one you choose says a lot about your intended audience…

  • Master Terraform and Kubernetes with IaC for EKS, GKE, and AKS

    Master Terraform and Kubernetes with IaC for EKS, GKE, and AKS

    When you bring Terraform and Kubernetes together, you create a single, declarative workflow for managing the entire lifecycle of your infrastructure and the applications running on it. This powerful pairing uses Infrastructure as Code (IaC) to automate everything from provisioning a cloud-managed cluster like EKS or GKE to deploying complex workloads, guaranteeing a setup that’s…

  • XDR vs EDR: Key Differences for Cyber Resilience (xdr vs edr)

    XDR vs EDR: Key Differences for Cyber Resilience (xdr vs edr)

    When you get down to it, the difference between XDR and EDR is all about scope. Endpoint Detection and Response (EDR) is like posting a dedicated security guard at each individual device—think of a connected thermostat or a smart factory sensor. It’s hyper-focused on that single asset. In contrast, Extended Detection and Response (XDR) acts…

Download free CRA Checklist 2025

The definitive CRA checklist for assessing your organization’s readiness for the Cyber Resilience Act.

    Regulus Logo
    Privacy Overview

    This website uses cookies so that we can provide you with the best user experience possible. Cookie information is stored in your browser and performs functions such as recognising you when you return to our website and helping our team to understand which sections of the website you find most interesting and useful.