drj logo

"*" indicates required fields

This field is for validation purposes and should be left unchanged.
Name*
Zip Code*
Please enter a number from 0 to 100.
Strength indicator
I agree to the Terms of Service and Privacy Policy*
Yes, of course I want to receive emails from DRJ!

Already have an account? Log in

drj logo

Welcome to DRJ

Already registered user? Please login here

Login Form

Register
Forgot password? Click here to reset

Create new account
(it's completely free). Subscribe

x
Skip to content
Disaster Recovery Journal
  • EN ESPAÑOL
  • SIGN IN
  • SUBSCRIBE
  • THE JOURNAL
    • Why Subscribe to DRJ
    • Digital Edition
    • Article Submission
    • DRJ Annual Resource Directories
    • Article Archives
    • Career Spotlight
  • EVENTS
    • DRJ Spring 2026
    • DRJ Scholarship
    • Other Industry Events
    • Schedule & Archive
    • Send Your Feedback
  • WEBINARS
    • Upcoming Webinars
    • On Demand
  • MENTOR PROGRAM
  • RESOURCES
    • New to Business Continuity?
    • White Papers
    • DR Rules and Regs
    • Planning Groups
    • Business Resilience Decoded
    • DRJ Glossary of Business Continuity Terms
    • Careers
  • ABOUT
    • Advertise with DRJ
    • Board and Committees
      • Executive Council Members
      • Editorial Advisory Board
      • Career Development Committee
      • DEI
      • Glossary Committee
      • Rules and Regulations Committee
  • Podcast

Experts Warn of Cybersecurity Risks in Open-Source Software

by Jon Seals | November 21, 2024 | | 0 comments

Manufacturers of connected devices, machines, and systems that use open-source software face an exceptionally high risk

DUESSELDORF – Manufacturers of connected devices, machines, and systems must be particularly vigilant when using open-source software in their products under the new EU Cyber Resilience Act (CRA). Although open-source programmes themselves are not directly bound by the CRA’s stringent rules, manufacturers of products that incorporate them are fully accountable. Jan Wendenburg, CEO of the Duesseldorf-based cyber security company ONEKEY and his team of cyber security experts, warned against this “open source trap”. The EU’s Cyber Resilience Act (CRA) mandates that manufacturers and distributors (importers and resellers) of connected devices must provide software updates even after delivery to ensure long-term protection against cyberattacks. Companies found in serious violation of the CRA could face fines of up to €15 million or 2.5% of their global annual revenue, whichever is higher. “If open-source software with exploitable vulnerabilities is used in new connected devices, liability does not automatically fall on the software provider but rather on the entity bringing the product with integrated software to market,” emphasizes Jan Wendenburg.

Is Open Source Synonymous with Potentially Insecure Software?

Background: The EU’s Cyber Resilience Act takes into account the specific needs of the open-source community. This approach aims to exempt non-commercial projects, universities, civil society organizations, and public administrations from the strict cybersecurity regulations. “While this is commendable as it supports research, development, and volunteer efforts, the reduced requirements could potentially lead to insecure software,” analyses cybersecurity expert Jan Wendenburg.

Jan Wendenburg is also ambivalent about the special role of the so-called “stewards” of open source projects in the Cyber Resilience Act. For these organisations, which develop open source software in a business environment, the CRA regulation provides for weakened security rules. For example, they are completely exempt from fines. Nevertheless, they must provide a cybersecurity strategy for their programmes, are not allowed to ignore identified vulnerabilities in the software and must cooperate with the CRA authorities.

Cyber Resilience Act Flawed from the Start

“Despite all the sympathy for the open source community, the numerous exceptions and mitigations for players in this sector have meant that the protective wall of defence against cyber criminals that the EU is currently building with the Cyber Resilience Act was full of holes from the outset,” analyses Jan Wendenburg. He points to the discrepancy between the lower requirements for the development of open source programmes on the one hand and the full compliance with obligations as soon as the software is used commercially as part of a “product with digital elements” on the other. “Manufacturers of OT and IoT devices are therefore well advised to rethink their open source activities,” recommends the ONEKEY CEO. This refers to machine control systems (Operation Technology, OT), which are widely used in Industry 4.0, and devices for the Internet of Things (IoT), for example in smart homes.

Increasing Use of Open Source in OT and IoT

Open source technology is increasingly being used in the development and deployment of OT and IoT platforms. More than 100 open source projects for OT/IoT are documented in EU initiatives alone, covering a wide range of software components such as gateways, middleware for edge computing and cloud platforms. The EU is actively promoting open source projects for the OT/IoT sector.

Jan Wendenburg analyses: “While open source offers many benefits, it also presents significant challenges in OT and IoT integration. The CRA regulation introduces additional security requirements that need to be met. What’s new is the aspect of liability—any mistake could cost product manufacturers dearly.”

Software Bill of Materials and Vulnerability Assessment Are Crucial

The ONEKEY CEO advises manufacturers of networked devices, machines and systems to carry out an automatic SBOM and vulnerability analysis before products are launched on the market. The abbreviation stands for “Software Bill of Materials”, which is a list of all software components that are identified. The cyber resilience is then checked for vulnerabilities and documented. The first step is a comparison with the CVE (Common Vulnerabilities and Exposures) database, which is maintained by the Massachusetts Institute of Technology Research and Engineering (MITRE) on behalf of the US government. Between 500 and 2,000 new entries of known vulnerabilities are added each month. Experts estimate that around 25 to 30 per cent of these relate to open source software. The next step is to check for unknown, so-called zero-day vulnerabilities. “However, according to the CRA, it is not enough to perform this check only when a new OT/IoT product is introduced to the market; it must be checked again and again throughout the entire product lifecycle,” clarifies Jan Wendenburg. He adds: “In the case of IoT devices for smart homes, for example, a life cycle of five years is usually assumed, but for machine control systems for Industry 4.0, the life cycle can be ten, 20 or more years.”

ONEKEY is the leading European specialist in Product Cybersecurity & Compliance Management and part of the investment portfolio of PricewaterhouseCoopers Germany (PwC). The unique combination of an automated Product Cybersecurity & Compliance Platform (PCCP) with expert knowledge and consulting services provides fast and comprehensive analysis, support, and management to improve product cybersecurity and compliance from product purchasing, design, development, production to end-of-life. 

Critical vulnerabilities and compliance violations in device firmware are automatically identified in binary code by AI-based technology in minutes – without source code, device, or network access. Proactively audit software supply chains with integrated Software Bill Of Materials (SBOM) generation. “Digital Cyber Twins” enable automated 24/7 post-release cybersecurity monitoring throughout the product lifecycle. 

The patent-pending, integrated Compliance Wizard™ already covers the upcoming EU Cyber Resilience Act (CRA) and existing requirements according to IEC 62443-4-2, ETSI EN 303 645, UNECE R 155 and many others.

The Product Security Incident Response Team (PSIRT) is effectively supported by the integrated automatic prioritisation of vulnerabilities, significantly reducing the time to remediation.

Leading international companies in Asia, Europe and the Americas already benefit from the ONEKEY Product Cybersecurity & Compliance Platform and ONEKEY Cybersecurity Experts.

Contact us: ONEKEY GmbH,
Kaiserswerther Str. 45, 40477 Duesseldorf, Germany,
Sara Fortmann, e-mail: sara.fortmann@onekey.com,
website: https://onekey.com

Related Content

  1. How Risk Management Helps Prevent Financial Crises
    Mitigating Financial Crises: The Need for Strong Risk Management Strategies in the Banking Sector
  2. Disaster Recovery Journal
    Lineaje Unveils First-of-its-Kind Open-Source Manager to Advance Continuous Software Supply Chain Security
  3. Disaster Recovery Journal
    Backup Software’s New Countermeasures to Detect, Protect, and Recover from Ransomware

Recent Posts

Dawsongroup tcs USA Introduces Modern Temperature-Controlled Solutions in the U.S., Challenging Outdated Supply Chain Infrastructure

January 14, 2026

SIOS Technology VP Shares 2026 IT Predictions: High Availability Evolves Into a Strategic Foundation for Security, AI, and Hybrid Cloud

January 14, 2026

BackBox and Nomios Partner to Help Enterprises Accelerate Their Network Automation and Cyber Maturity Journey

January 14, 2026

Edgewood Police Department Launches on the Mark43 Public Safety Platform in Under 30 Days, Modernizing Public Safety Operations

January 14, 2026

Florida’s Altitude Water Declared ‘Sustainable Water Company of the Year,’ Highlighting Rapid Growth & Global Mission

January 14, 2026

GrowthPal Raises $2.6M to Turn M&A from Relationship-Driven Guesswork into an AI-Led Growth Engine

January 14, 2026

Archives

  • January 2026 (29)
  • December 2025 (45)
  • November 2025 (58)
  • October 2025 (78)
  • September 2025 (65)
  • August 2025 (59)
  • July 2025 (70)
  • June 2025 (54)
  • May 2025 (59)
  • April 2025 (91)
  • March 2025 (57)
  • February 2025 (47)
  • January 2025 (73)
  • December 2024 (82)
  • November 2024 (41)
  • October 2024 (87)
  • September 2024 (61)
  • August 2024 (65)
  • July 2024 (48)
  • June 2024 (55)
  • May 2024 (70)
  • April 2024 (79)
  • March 2024 (65)
  • February 2024 (73)
  • January 2024 (66)
  • December 2023 (49)
  • November 2023 (80)
  • October 2023 (67)
  • September 2023 (53)
  • August 2023 (72)
  • July 2023 (45)
  • June 2023 (61)
  • May 2023 (50)
  • April 2023 (60)
  • March 2023 (69)
  • February 2023 (54)
  • January 2023 (71)
  • December 2022 (54)
  • November 2022 (59)
  • October 2022 (66)
  • September 2022 (72)
  • August 2022 (65)
  • July 2022 (66)
  • June 2022 (53)
  • May 2022 (55)
  • April 2022 (60)
  • March 2022 (65)
  • February 2022 (50)
  • January 2022 (46)
  • December 2021 (39)
  • November 2021 (38)
  • October 2021 (39)
  • September 2021 (50)
  • August 2021 (77)
  • July 2021 (63)
  • June 2021 (42)
  • May 2021 (43)
  • April 2021 (50)
  • March 2021 (60)
  • February 2021 (16)
  • January 2021 (554)
  • December 2020 (30)
  • November 2020 (35)
  • October 2020 (48)
  • September 2020 (57)
  • August 2020 (52)
  • July 2020 (40)
  • June 2020 (72)
  • May 2020 (46)
  • April 2020 (59)
  • March 2020 (46)
  • February 2020 (28)
  • January 2020 (36)
  • December 2019 (22)
  • November 2019 (11)
  • October 2019 (36)
  • September 2019 (44)
  • August 2019 (77)
  • July 2019 (117)
  • June 2019 (106)
  • May 2019 (49)
  • April 2019 (47)
  • March 2019 (24)
  • February 2019 (37)
  • January 2019 (12)
  • ARTICLES & NEWS

    • Business Continuity
    • Disaster Recovery
    • Crisis Management & Communications
    • Risk Management
    • Article Archives
    • Industry News

    THE JOURNAL

    • Digital Edition
    • Advertising & Media Kit
    • Submit an Article
    • Career Spotlight

    RESOURCES

    • White Papers
    • Rules & Regulations
    • FAQs
    • Glossary of Terms
    • Industry Groups
    • Business & Resource Directory
    • Business Resilience Decoded
    • Careers

    EVENTS

    • Fall 2025
    • Spring 2026

    WEBINARS

    • Watch Now
    • Upcoming

    CONTACT

    • Article Submission
    • Media Kit
    • Contact Us

    ABOUT DRJ

    Disaster Recovery Journal (DRJ) is the leading resource for business continuity, disaster recovery, crisis management, and risk professionals worldwide. With a global network of more than 138,000 practitioners, DRJ delivers essential insights through two annual conferences, a quarterly digital magazine, weekly webinars, and a rich library of online resources at www.drj.com. Our mission is to empower resilience professionals with the knowledge, tools, and connections they need to protect their organizations in a fast-changing world. Join our community by attending our events, subscribing to our publications, and following us on social media.

    LEARN MORE

    LINKEDIN AND TWITTER

    Disaster Recovery Journal is the leading publication/event covering business continuity/disaster recovery.

    Follow us for daily updates

    LinkedIn

    @drjournal

    Newsletter

    The Journal, right in your inbox.

    Be informed and stay connected by getting the latest in news, events, webinars and whitepapers on Business Continuity and Disaster Recovery.

    Subscribe Now
    Copyright 2026 Disaster Recovery Journal
    • Terms of Use
    • Privacy Policy

    Register to win a Free Pass to DRJ Spring 2026 | The Future Runs on Resilience

    Leave your details below for a chance to win a free pass to DRJ Spring 2026 | The Future Runs on Resilience. The winner will be announced on January 16. Join us for DRJ's 74th Conference!
    Enter Now