{"id":540791,"date":"2026-05-18T17:01:35","date_gmt":"2026-05-18T15:01:35","guid":{"rendered":"https:\/\/silicon-saxony.de\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/"},"modified":"2026-05-18T17:01:35","modified_gmt":"2026-05-18T15:01:35","slug":"adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden","status":"publish","type":"post","link":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/","title":{"rendered":"adesso: Cyber Resilience Act &#8211; Strategic opportunity instead of regulatory burden"},"content":{"rendered":"<p><img decoding=\"async\" style=\"width: 25%;\" src=\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg\"><\/p>\n<p>In the following, we classify the CRA, show who is affected and why manufacturers of software and hardware should act now and how adesso supports them in doing so.<\/p>\n<h2 class=\"\">What is the Cyber Resilience Act?&nbsp;<\/h2>\n<p>The Cyber Resilience Act is an EU regulation that regulates the cyber security of &#8220;products with digital elements&#8221;. This refers to products that send, receive or process data, i.e. practically all networked hardware and software products.<\/p>\n<h3 class=\"\">The objectives of the CRA are:<\/h3>\n<ul>\n<li>fewer vulnerabilities in products placed on the EU market<\/li>\n<li>more cybersecurity for consumers and businesses<\/li>\n<li>a uniform legal framework for the entire EU internal market instead of a patchwork of national regulations<\/li>\n<\/ul>\n<h3 class=\"\">Manufacturers must ensure, among other things, that:<\/h3>\n<ul>\n<li>their products meet basic cybersecurity requirements<\/li>\n<li>risks are considered over the entire product lifecycle<\/li>\n<li>security updates are provided<\/li>\n<li>actively exploited vulnerabilities are reported and fixed<\/li>\n<\/ul>\n<p>Important: The CRA does not regulate the operation of IT and OT infrastructures &#8211; other regulations such as the NIS2 Directive apply for this. e.g. the NIS2 directive. The focus of the CRA is clearly on the products themselves.&nbsp;<\/p>\n<h2 class=\"\">Who is affected by the Cyber Resilience Act?&nbsp;<\/h2>\n<p>The CRA specifies the requirements for manufacturers of products with digital elements that are placed on the EU internal market. This means that, conversely, manufacturers outside the EU who wish to place their products on the EU internal market are also affected. <\/p>\n<h3 class=\"\">This includes, for example:<\/h3>\n<ul>\n<li>Machines, equipment and embedded systems with connectivity<\/li>\n<li>Controllers, gateways, sensors and networked components<\/li>\n<li>Software products, firmware, apps and cloud services (necessary for the functionality of the product) that are part of a product<\/li>\n<li>IoT platforms and digital services that are necessary for the functioning of a product<br \/>In addition to manufacturers, the CRA also addresses:<\/li>\n<li>Importers: they must ensure that only compliant products enter the EU market.<\/li>\n<li>Distributors: They bear responsibility in the wider supply chain and are not allowed to sell products that are obviously not CRA-compliant.<\/li>\n<\/ul>\n<p>The CRA also becomes part of the CE marking. As with other product regulations (machinery, Radio Equipment Directive \/ RED), the declaration of conformity is issued as an EU declaration of conformity for each individual CE-marked product placed on the market. This means that violations of the CRA can be punished with fines or even bans.<\/p>\n<h2 class=\"\">When do I have to act?&nbsp;<\/h2>\n<p>The CRA came into force on December 11, 2024. For manufacturers, two dates are decisive:<\/p>\n<h3 class=\"\">September 11, 2026<\/h3>\n<p>As of this date, the reporting obligations under Article 14 already apply. This applies to actively exploited vulnerabilities in products with digital elements that fall within the scope of the CRA &#8211; including existing products on the market.<\/p>\n<h3 class=\"\">December 11, 2027<\/h3>\n<p>As of this date, the CRA is fully applicable. All new products with digital elements that are placed on the market from this date must comply with the requirements of the CRA.<\/p>\n<p>This means that the notification obligation will apply in just 6 months. There is therefore an acute need for action, particularly in the area of complex networked systems and IoT solutions. We are already hearing from our customers that the first audits or customer inquiries are on the table.<\/p>\n<h4 class=\"\">The CRA affects many areas in a company&nbsp;<\/h4>\n<p>The CRA does not just affect one project or one department, but the entire company. The most important areas and topics that need to be considered are:<\/p>\n<ul>\n<li>Organization &amp; processes<br \/>o&nbsp; &nbsp; defined roles and responsibilities (Product Security Officer)<br \/>o&nbsp; &nbsp; regulated reporting channels for security incidents and vulnerabilities<br \/>o&nbsp; &nbsp; documentation that supports both development and compliance<\/li>\n<li>Product development &amp; Architecture<br \/>o&nbsp; &nbsp; Threat analyses and risk assessments for products<br \/>o&nbsp; &nbsp; &#8220;Security by Design&#8221; and &#8220;Security by Default&#8221; in development and architecture<br \/>o&nbsp; &nbsp; Dealing with open source components and third-party software<\/li>\n<li>Secure Development Lifecycle (DevSecOps)<br \/>o&nbsp; &nbsp; Integration of security tests (SAST\/DAST, dependency scans, SBOM) into the CI\/CD pipeline<br \/>o&nbsp; &nbsp; clear processes for vulnerability management and patch development<\/li>\n<li>Operation and support<br \/>o&nbsp; &nbsp; Definition of support and update periods<br \/>o&nbsp; &nbsp; Structured handling of legacy products that are still in the field<\/li>\n<\/ul>\n<h2 class=\"\">Mastering the challenges of CRA together with adesso&nbsp;<\/h2>\n<p>Thanks to our expertise from countless projects, the development and operation of modern IoT platforms and our own product development of the Smart Product Platform, we have developed the adesso Secure Software Development Life Cycle Process for Smart Products. In doing so, adesso supports manufacturers along the entire path to CRA compliance &#8211; from the initial site assessment to ongoing, secure operation.<\/p>\n<h3 class=\"\">1. GAP analysis<\/h3>\n<ul>\n<li>Analysis of your products with digital elements and their architecture<\/li>\n<li>Evaluation of existing processes in development, operation and support<\/li>\n<li>Comparison with the requirements of the CRA and relevant standards (e.g. IEC 62443, ISO 27001)<\/li>\n<li>Clear overview: Where do you stand today, where are there gaps, where is a lot already in place<\/li>\n<\/ul>\n<h3 class=\"\">2. Plan measures<\/h3>\n<ul>\n<li>Prioritize the fields of action, taking into account the product strategy and roadmap<\/li>\n<li>Define a pragmatic implementation plan &#8211; from MVP to scalable solution<\/li>\n<li>Coordinate with stakeholders from development, IT, OT, legal and management<\/li>\n<\/ul>\n<h3 class=\"\">3. Implement measures<\/h3>\n<ul>\n<li>Establish a secure development lifecycle for your hardware and software products<\/li>\n<li>Adapt architecture, toolchain and processes (e.g. SBOM, vulnerability management, reporting)<\/li>\n<li>Implementation of security mechanisms in embedded systems, cloud backends and IoT platforms<\/li>\n<li>We contribute our experience from software engineering, IoT and platform projects &#8211; from the edge to the cloud.<\/li>\n<\/ul>\n<h3 class=\"\">4. Continuous implementation &amp; CRA-compliant operation<\/h3>\n<ul>\n<li>Establishment of structured vulnerability and patch management<\/li>\n<li>Assistance in preparing for audits and in CE conformity assessment<\/li>\n<li>Ongoing further development of processes and solutions if the threat situation or regulatory requirements change<\/li>\n<\/ul>\n<p>&#8211; &#8211; &#8211; &#8211; &#8211; &#8211;<\/p>\n<h4 class=\"\">Further links<\/h4>\n<p>\ud83d\udc49&nbsp;<a href=\"http:\/\/www.adesso.de\" target=\"_blank\">www.adesso.de<\/a>&nbsp;<\/p>\n<p><i>Graphic: adesso<\/i><\/p>\n","protected":false},"excerpt":{"rendered":"<p>May 13, 2026. Connected products are now standard &#8211; from machines and systems to embedded devices and cloud and IoT platforms. At the same time, the pressure is increasing: customers expect secure products, cyber attacks are on the rise and the EU is significantly tightening the regulatory screw. With the Cyber Resilience Act (CRA), the cyber security of products is being given a binding, Europe-wide framework for the first time. The CRA is already in force and the first measures must be implemented within a few months! In our view, the CRA is not unnecessary regulation, but offers manufacturers opportunities to stand out from the market with good products with a high level of security. This is precisely where it is decided whether a company uses the CRA as a compulsory exercise or as a lever for better, more robust products.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":"","_links_to":"","_links_to_target":""},"categories":[4764],"tags":[1942,2043,1982,1987],"class_list":["post-540791","post","type-post","status-publish","format-standard","hentry","category-software-en","tag-data-security","tag-digitalization","tag-resilience","tag-technological-sovereignty"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>adesso: Cyber Resilience Act - Strategic opportunity instead of regulatory burden - Silicon Saxony<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"adesso: Cyber Resilience Act - Strategic opportunity instead of regulatory burden - Silicon Saxony\" \/>\n<meta property=\"og:description\" content=\"May 13, 2026. Connected products are now standard - from machines and systems to embedded devices and cloud and IoT platforms. At the same time, the pressure is increasing: customers expect secure products, cyber attacks are on the rise and the EU is significantly tightening the regulatory screw. With the Cyber Resilience Act (CRA), the cyber security of products is being given a binding, Europe-wide framework for the first time. The CRA is already in force and the first measures must be implemented within a few months! In our view, the CRA is not unnecessary regulation, but offers manufacturers opportunities to stand out from the market with good products with a high level of security. This is precisely where it is decided whether a company uses the CRA as a compulsory exercise or as a lever for better, more robust products.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/\" \/>\n<meta property=\"og:site_name\" content=\"Silicon Saxony\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-18T15:01:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg\" \/>\n<meta name=\"author\" content=\"publizer2silisax\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"publizer2silisax\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/\"},\"author\":{\"name\":\"publizer2silisax\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\"},\"headline\":\"adesso: Cyber Resilience Act &#8211; Strategic opportunity instead of regulatory burden\",\"datePublished\":\"2026-05-18T15:01:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/\"},\"wordCount\":956,\"image\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg\",\"keywords\":[\"Data Security\",\"Digitalization\",\"Resilience\",\"Technological Sovereignty\"],\"articleSection\":[\"Software\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/\",\"url\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/\",\"name\":\"adesso: Cyber Resilience Act - Strategic opportunity instead of regulatory burden - Silicon Saxony\",\"isPartOf\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg\",\"datePublished\":\"2026-05-18T15:01:35+00:00\",\"author\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\"},\"breadcrumb\":{\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#primaryimage\",\"url\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg\",\"contentUrl\":\"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/silicon-saxony.de\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"adesso: Cyber Resilience Act &#8211; Strategic opportunity instead of regulatory burden\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#website\",\"url\":\"https:\/\/silicon-saxony.de\/en\/\",\"name\":\"Silicon Saxony\",\"description\":\"Germany&#039;s Hightech Network - Semiconductors, Software, Robotics\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/silicon-saxony.de\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6\",\"name\":\"publizer2silisax\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g\",\"caption\":\"publizer2silisax\"},\"url\":\"https:\/\/silicon-saxony.de\/en\/author\/publizer2silisax\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"adesso: Cyber Resilience Act - Strategic opportunity instead of regulatory burden - Silicon Saxony","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/","og_locale":"en_US","og_type":"article","og_title":"adesso: Cyber Resilience Act - Strategic opportunity instead of regulatory burden - Silicon Saxony","og_description":"May 13, 2026. Connected products are now standard - from machines and systems to embedded devices and cloud and IoT platforms. At the same time, the pressure is increasing: customers expect secure products, cyber attacks are on the rise and the EU is significantly tightening the regulatory screw. With the Cyber Resilience Act (CRA), the cyber security of products is being given a binding, Europe-wide framework for the first time. The CRA is already in force and the first measures must be implemented within a few months! In our view, the CRA is not unnecessary regulation, but offers manufacturers opportunities to stand out from the market with good products with a high level of security. This is precisely where it is decided whether a company uses the CRA as a compulsory exercise or as a lever for better, more robust products.","og_url":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/","og_site_name":"Silicon Saxony","article_published_time":"2026-05-18T15:01:35+00:00","og_image":[{"url":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg","type":"","width":"","height":""}],"author":"publizer2silisax","twitter_card":"summary_large_image","twitter_misc":{"Written by":"publizer2silisax","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#article","isPartOf":{"@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/"},"author":{"name":"publizer2silisax","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6"},"headline":"adesso: Cyber Resilience Act &#8211; Strategic opportunity instead of regulatory burden","datePublished":"2026-05-18T15:01:35+00:00","mainEntityOfPage":{"@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/"},"wordCount":956,"image":{"@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg","keywords":["Data Security","Digitalization","Resilience","Technological Sovereignty"],"articleSection":["Software"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/","url":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/","name":"adesso: Cyber Resilience Act - Strategic opportunity instead of regulatory burden - Silicon Saxony","isPartOf":{"@id":"https:\/\/silicon-saxony.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#primaryimage"},"image":{"@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg","datePublished":"2026-05-18T15:01:35+00:00","author":{"@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6"},"breadcrumb":{"@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#primaryimage","url":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg","contentUrl":"https:\/\/cdn.pblzr.de\/dacbb27c-1270-4041-b681-e2b95f06f8a1\/2026\/05\/adesso-logo-400x300_TEXT.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/silicon-saxony.de\/en\/adesso-cyber-resilience-act-strategic-opportunity-instead-of-regulatory-burden\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/silicon-saxony.de\/en\/"},{"@type":"ListItem","position":2,"name":"adesso: Cyber Resilience Act &#8211; Strategic opportunity instead of regulatory burden"}]},{"@type":"WebSite","@id":"https:\/\/silicon-saxony.de\/en\/#website","url":"https:\/\/silicon-saxony.de\/en\/","name":"Silicon Saxony","description":"Germany&#039;s Hightech Network - Semiconductors, Software, Robotics","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/silicon-saxony.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/098cd473f5dd7707320dd1e252e15ac6","name":"publizer2silisax","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/silicon-saxony.de\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c4acbd63e28aa0bc7909adc90d5ef38c3fdb5e4c7922782d8eca389d00ffbd0d?s=96&d=mm&r=g","caption":"publizer2silisax"},"url":"https:\/\/silicon-saxony.de\/en\/author\/publizer2silisax\/"}]}},"_links":{"self":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts\/540791","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/comments?post=540791"}],"version-history":[{"count":0,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/posts\/540791\/revisions"}],"wp:attachment":[{"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/media?parent=540791"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/categories?post=540791"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/silicon-saxony.de\/en\/wp-json\/wp\/v2\/tags?post=540791"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}