• November 20, 2025

    AI is transforming cybersecurity at a pace never seen before. While organizations rely on AI to automate protection and detect threats faster, cybercriminals are using the same technology to enhance attacks, bypass defenses, and exploit new vulnerabilities. This article explores how AI simultaneously strengthens and undermines cybersecurity and why this duality has created a new, high-speed arms race.

  • October 30, 2025

    In this article, we examine the actual significance of a cybersecurity management system audit according to ISO 21434 in the context of the tension between formal documentation and real product risk. While many organizations tend to view audits as mere verification checks, the actual purpose is to assess whether the organization is capable of developing secure and robust products. We show how auditors look beyond the documentation and assess the effectiveness of the cybersecurity processes applied in relation to specific product and process risks.

  • April 24, 2025

    As part of the SALSA research project, INVENSITY conducted a TARA following ISO/SAE 21434 to ensure cybersecurity for external Human-Machine Interfaces (eHMI) in autonomous vehicles. By identifying assets, analyzing threats, and prioritizing risks early in development, this approach strengthens both safety in mixed traffic and public trust in automated driving. The analysis highlights how proactive, security-by-design thinking is essential for resilient and socially accepted vehicle technologies.

  • April 15, 2024

    The article stresses cybersecurity's importance, highlighting the Cyber Resilience Act, which emphasizes strong measures and European Commission regulations to enhance digital product security.

  • March 20, 2024

    The article stresses cybersecurity's importance, highlighting the Cyber Resilience Act, which emphasizes strong measures and European Commission regulations to enhance digital product security.

  • March 6, 2024

    Fuzzing is a negative testing approach that involves providing invalid or random data as inputs to a software system. By identifying vulnerabilities early on, companies are enabled to secure their software development cycle and avert financial and legal damages, in alignment with ISO 21434 and the upcoming EU Cyber Resilience Act.

  • September 4, 2023

    Development in the automotive industry is constantly being driven forward. One of the results are complex systems that can be vulnerable to cyber attacks. Björn Engelhardt explains the role vulnerability management plays in making your systems safe and secure.

  • September 27, 2021

    In January of this year, the new regulation UN R155 came into effect, requiring cybersecurity to gain approval for the first time. In an interview with our Head of Cybersecurity, Jana Karina von Wedel, the cybersecurity expert talks about why this regulation is relevant and what it changes for various stakeholders.

  • October 22, 2020

    Why does the topic of cybersecurity become more and more important in the field of product development? How can a tool make carrying out a TARA easier? Jana Karina von Wedel, cybersecurity expert, answers these and further questions in our interview.