drj logo

"*" indicates required fields

Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!
This field is for validation purposes and should be left unchanged.

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
DRJ Fall 2025 Dallas Show
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Fall 2025
    • DRJ Spring 2025
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • DRJ ACADEMY
    • DRJ Academy
    • Beginner’s Guide to BC
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • DEI
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

Cyber Resilience Act Bans Products with Known Vulnerabilities

by Jon Seals | June 5, 2024 | | 0 comments

In future, manufacturers will no longer be allowed to place smart products with known security vulnerabilities on the EU market – if they do, they could face severe penalties

DUESSELDORF, Germany – In the US alone, 14,286 CVEs have been published on the National Institute of Standards and Technology website so far in 2024. Common Vulnerabilities and Exposures (CVEs) are security gaps and weaknesses in computer systems that could allow a hacker to launch an attack. Under the forthcoming EU Cyber Resilience Act (CRA), devices may soon no longer be allowed to be supplied with known and exploitable vulnerabilities. If such vulnerabilities are present, the manufacturer, seller, or importer, along with the company’s entire management, will be held liable. When it comes to cyber resilience, the legislation of the Cyber Resilience Act makes it clear that customers – both residential and commercial – have an effective right to secure software. However, the race to be the first to discover vulnerabilities continues: organisations would be well advised to implement both effective CVE detection and impact assessment now to better scrutinise their own products and protect themselves against the serious consequences of vulnerability scenarios. “The CRA requires all vendors to perform mandatory testing, monitoring and documentation of the cybersecurity of their products, including testing for unknown vulnerabilities known as ‘zero days’,” said Jan Wendenburg, CEO of ONEKEY, a cybersecurity company based in Duesseldorf, Germany.

Know your own weaknesses

The term “zero-day” refers to newly discovered security vulnerabilities that hackers can exploit before the manufacturer or developer has had a chance to fix them, essentially giving them “zero days” to address the issue. Many manufacturers and distributors are not sufficiently aware of potential vulnerabilities in their own products. For example, in industrial control systems, these vulnerabilities can often be hidden within components containing proprietary firmware from suppliers. In general, hardware and firmware as well as all Internet of Things (IoT) devices can be affected by such vulnerabilities. With the ONEKEY Compliance Wizard, ONEKEY’s cybersecurity experts offer a comprehensive cybersecurity assessment of products with digital elements. By combining automated vulnerability detection, CVE prioritisation and filtering with a holistic, interactive compliance questionnaire, the effort and cost of cybersecurity compliance processes are significantly reduced and the risk of fines is minimised. “If you don’t want to be at the front of the queue for fines when the CRA starts, you need to create processes now to analyse and patch your own risks,” advised ONEKEY’s Jan Wendenburg.

Risk Assessment and Software Bill of Materials

A CRA assessment can be used to determine current and future compliance with CRA requirements and identify any potential need for action at an early stage. Companies can draw on the knowledge of ONEKEY’s cyber security experts. Under the new requirements, manufacturers and importers must also maintain comprehensive documentation of the software and firmware components of their products. In accordance with the CRA regulations, a Software Bill of Materials (SBOM) must be created and monitored.

This means that the entire supply chain can be documented with regard to the security of products and components – including purchased components with their own firmware. These requirements can only be efficiently mapped with automation at a reasonable cost. With the ONEKEY platform, firmware can be automatically analysed for vulnerabilities and an SBOM can be generated. In future, all devices will require either a security self-declaration or external certification. “Automation can significantly reduce the effort required to prepare for self-declaration or certification. We are making this easily available with the ONEKEY platform. Now it is up to the companies to implement the necessary measures to comply with the CRA,” summarised Jan Wendenburg of ONEKEY.

ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of an automated Product Cybersecurity & Compliance Platform (PCCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life. 

Critical vulnerabilities and compliance violations in device firmware are automatically identified in binary code by AI-based technology in minutes – without source code, device, or network access. Proactively audit software supply chains with integrated software bill of materials (SBOM) generation. “Digital Cyber Twins” enable automated 24/7 post-release cybersecurity monitoring throughout the product lifecycle. 

The patent-pending, integrated Compliance Wizard™ already covers the upcoming EU Cyber Resilience Act (CRA) and existing requirements according to IEC 62443-4-2, ETSI EN 303 645, UNECE R 155 and many others.

The Product Security Incident Response Team (PSIRT) is effectively supported by the integrated automatic prioritisation of vulnerabilities, significantly reducing the time to remediation.

Leading international companies in Asia, Europe and the Americas already benefit from the ONEKEY Product Cybersecurity & Compliance Platform and ONEKEY Cybersecurity Experts.

Related Content

  1. Disaster Recovery Journal
    Inaugurating Benchmarks for Disaster Preparedness
  2. Disaster Recovery Journal
    Unlocking Resilience
  3. Operational Resilience: At Its Core, It’s ‘Business Continuity Done Right’

Recent Posts

Salt Security Introduces Cloud Connect for AWS: Instant, Agentless API Security with Full Visibility in Minutes

June 18, 2025

TENEX.AI and WitnessAI Partner to Deliver Managed Security and Compliance Services for Enterprise AI

June 18, 2025

Starburst Named a Leader & Fast Mover in 2025 GigaOm Radar for Data Lakes & Lakehouses

June 18, 2025

HighPoint Launches Custom Cable Design and Manufacturing Services for Enterprise Solutions

June 18, 2025

Introducing Kusari Inspector: Empowering Developers with Real-Time Software Security Insights in Every Pull Request

June 17, 2025

HackerOne Launches Technology Alliance Program to Advance AI-Powered Security Ecosystem and Customer Innovation

June 16, 2025

Archives

  • June 2025 (36)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2025

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal is the industry’s largest resource for business continuity, disaster recovery, crisis management, and risk management, reaching a global network of more than 138,000 professionals. Offering weekly webinars, the latest industry news, rules and regulations, podcasts, the industry’s only official mentoring program, a quarterly magazine, and two annual live conferences, DRJ is leading the way to keep professionals up-to-date and connected in an ever-changing world.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2025 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy