aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
aster.cloud aster.cloud
  • /
  • Platforms
    • Public Cloud
    • On-Premise
    • Hybrid Cloud
    • Data
  • Architecture
    • Design
    • Solutions
    • Enterprise
  • Engineering
    • Automation
    • Software Engineering
    • Project Management
    • DevOps
  • Programming
    • Learning
  • Tools
  • About
  • Data
  • Software

New European Union Cybersecurity Proposal Takes Aim At Cybercrime

  • Aelia Vita
  • September 28, 2022
  • 4 minute read
  • The European Union is advancing legislation to strengthen security requirements for all digital hardware and software products.
  • The proposal aims to curb cybercrime, which cost the global economy an estimated €5.5 trillion in 2021.
  • Many personal devices that are connected to the internet are particularly vulnerable to hacks.

Lawmakers are seeking to strengthen cybersecurity requirements across the European Union, advancing new legislation to bolster security requirements for all digital hardware and software products. The proposed law, titled the Cyber Resilience Act, would cover everything from computers and mobile phones to smart kitchen appliances and digital children’s toys.

“When it comes to cybersecurity, Europe is only as strong as its weakest link: be it a vulnerable Member State or an unsafe product along the supply chain,” said Thierry Breton, the EU’s commissioner for the internal market.


Partner with aster.cloud
for your next big idea.
Let us know here.



From our partners:

CITI.IO :: Business. Institutions. Society. Global Political Economy.
CYBERPOGO.COM :: For the Arts, Sciences, and Technology.
DADAHACKS.COM :: Parenting For The Rest Of Us.
ZEDISTA.COM :: Entertainment. Sports. Culture. Escape.
TAKUMAKU.COM :: For The Hearth And Home.
ASTER.CLOUD :: From The Cloud And Beyond.
LIWAIWAI.COM :: Intelligence, Inside and Outside.
GLOBALCLOUDPLATFORMS.COM :: For The World's Computing Needs.
FIREGULAMAN.COM :: For The Fire In The Belly Of The Coder.
ASTERCASTER.COM :: Supra Astra. Beyond The Stars.
BARTDAY.COM :: Prosperity For Everyone.

The proposed legislation, which was unveiled by the European Commission earlier this month, mandates that products are designed, developed and produced in ways that mitigate cybersecurity risks. This includes, for example, requirements to sell products in a secure default configuration, to maintain a thorough product identification system and to ensure that exploitable vulnerabilities can be addressed through security updates, among other cybercrime disclosure rules.

In recent years, the number of personal devices that are connected to the internet has grown significantly.

Yet many of these so-called Internet of Things products are highly vulnerable to hacks and cybercrimes. In fact, ransomware attacks occur worldwide every 11 seconds and cost the global economy an estimated €20 billion last year, according to the EU. Meanwhile, DDoS attacks—malicious efforts to disrupt or cut off access to internet services or websites—cost just the EU economy roughly €65 billion in 2020.

Read More  How Carbon-Free Is Your Cloud? New Data Lets You Know

In Belgium, for example, nearly 1,000 businesses were hit by cybercrimes in 2021—a 300% increase compared to the year prior, according to an analysis by Mastercard. The majority of cyber attacks entailed malware and ransomware strikes.

“We deserve to feel safe with the products we buy in the single market,” said Margrethe Vestager, executive vice president of the European Commission for A Europe Fit for the Digital Age. “The Cyber Resilience Act will ensure the connected objects and software we buy comply with strong cybersecurity safeguards.”

An official at the Microsoft Digital Crimes Unit shows a heat map of malicious computer networks in Western Europe in 2013. Image: REUTERS/Jason Redmond

Reinforced cybersecurity protocols are also expected to help companies and manufacturers—especially smaller businesses that may not have the technical resources or financial means to survive a cyberattack.

Earlier this year, the World Economic Forum’s Global Cybersecurity Outlook reported that the average cost of a cyber breach for a company was $3.6 million. Moreover, targeted companies saw stock prices fall and spent on average 280 days identifying and responding to a cyberattack.

“Technology leaders, companies and their boards of directors would do well to pay attention to these developments and recognize that cyber strategy is a business strategy and understanding cyber risk is part of good governance in the digital age,” said Daniel Dobrygowski, the head of governance and trust at the Forum’s Centre for Cybersecurity.

The proposed Cyber Resilience Act was welcomed by industry groups such as the TIC Council, a global organisation covering the independent testing, inspection and certification sectors. “The proposal constitutes a good first step towards a more cyber-resilient single market,” said Martin Michelot, the TIC Council’s executive director for Europe.

Read More  New Research Shows CIOs Need Greater Cross-team Collaboration To Drive Digital Transformation

The legislation was first put forth by European Commission President Ursula von der Leyen in November 2021. If the act is approved by the European Parliament and the European Council, EU countries will have two years to adapt the new rules.

“Digital trust is a necessity in a global economy reliant on ever-increasing connectivity, data use and new innovative technologies,” said Akshay Joshi, the head of industry and partnerships at the Forum’s Centre for Cybersecurity. “As common citizens increasingly become wary of the technologies they interact with, this regulation will further enhance transparency and allow end users to make informed choices.”

The EU’s Cyber Resilience Act joins several other pieces of legislation proposed around the world that aim to curb cybercrime, which cost the global economy €5.5 trillion in 2021. By 2025, cybercrime damages are expected to surpass €10 trillion.

Earlier this year, the United States enacted a new law bolstering cybercrime disclosure requirements for companies working in critical infrastructure sectors. The policy followed a major ransomware attack in May 2021 against Colonial Pipeline, which operates the country’s largest pipeline system for jet fuel, gasoline and diesel. The attack, which was reportedly launched through an old corporate virtual private network, paralysed pipelines across the US East Coast and resulted in Colonial Pipeline paying roughly $5 million worth of Bitcoin to the hackers. The US Justice Department later recovered nearly half of the ransom payment.

Today, the US Securities and Exchange Commission and the US Congress are also pursuing new regulations to strengthen and standardise cybersecurity benchmarks and cybercrime disclosure requirements.

Read More  Cloud CISO Perspectives: December 2022

“Regulation has an important role to play in incentivizing cyber resilience,” Dobrygowski added.

This feature was originally appeared in WeForum.


For enquiries, product placements, sponsorships, and collaborations, connect with us at [email protected]. We'd love to hear from you!

Our humans need coffee too! Your support is highly appreciated, thank you!

Aelia Vita

Related Topics
  • Cyber Resilience Act
  • Cybercrime
  • Cybersecurity
  • DDoS
  • Europe
  • Internet Of Things
  • IoT
You May Also Like
Getting things done makes her feel amazing
View Post
  • Computing
  • Data
  • Featured
  • Learning
  • Tech
  • Technology

Nurturing Minds in the Digital Revolution

  • April 25, 2025
View Post
  • Software
  • Technology

Canonical Releases Ubuntu 25.04 Plucky Puffin

  • April 17, 2025
View Post
  • Software
  • Technology

IBM Accelerates Momentum in the as a Service Space with Growing Portfolio of Tools Simplifying Infrastructure Management

  • March 27, 2025
View Post
  • Data
  • Engineering

Hiding in Plain Site: Attackers Sneaking Malware into Images on Websites

  • January 16, 2025
Vehicle manufacturing
View Post
  • Software

IBM Study: Vehicles Believed to be Software Defined and AI Powered by 2035

  • December 12, 2024
IBM and Ferrari Premium Partner
View Post
  • Data
  • Engineering

IBM Selected as Official Fan Engagement and Data Analytics Partner for Scuderia Ferrari HP

  • November 7, 2024
dotlah-smartnation-singapore-lawrence-wong
View Post
  • Data
  • Enterprise
  • Technology

Growth, community and trust the ‘building blocks’ as Singapore refreshes Smart Nation strategies: PM Wong

  • October 8, 2024
nobel-prize-popular-physics-prize-2024-figure1
View Post
  • Data
  • Featured
  • Technology

They Used Physics To Find Patterns In Information

  • October 8, 2024

Stay Connected!
LATEST
  • What is cloud bursting?
    • June 18, 2025
  • What is confidential computing?
    • June 17, 2025
  • Oracle adds xAI Grok models to OCI
    • June 17, 2025
  • Fine-tune your storage-as-a-service approach
    • June 16, 2025
  • 5
    Advanced audio dialog and generation with Gemini 2.5
    • June 15, 2025
  • 6
    A Father’s Day Gift for Every Pop and Papa
    • June 13, 2025
  • 7
    Global cloud spending might be booming, but AWS is trailing Microsoft and Google
    • June 13, 2025
  • Google Cloud, Cloudflare struck by widespread outages
    • June 12, 2025
  • What is PC as a service (PCaaS)?
    • June 12, 2025
  • 10
    Apple services deliver powerful features and intelligent updates to users this autumn
    • June 11, 2025
about
Hello World!

We are aster.cloud. We’re created by programmers for programmers.

Our site aims to provide guides, programming tips, reviews, and interesting materials for tech people and those who want to learn in general.

We would like to hear from you.

If you have any feedback, enquiries, or sponsorship request, kindly reach out to us at:

[email protected]
Most Popular
  • 1
    Crayon targets mid-market gains with expanded Google Cloud partnership
    • June 10, 2025
  • By the numbers: Use AI to fill the IT skills gap
    • June 11, 2025
  • 3
    Apple supercharges its tools and technologies for developers to foster creativity, innovation, and design
    • June 9, 2025
  • Apple-WWDC25-Apple-Intelligence-hero-250609 4
    Apple Intelligence gets even more powerful with new capabilities across Apple devices
    • June 9, 2025
  • Apple-WWDC25-Liquid-Glass-hero-250609_big.jpg.large_2x 5
    Apple introduces a delightful and elegant new software design
    • June 9, 2025
  • /
  • Technology
  • Tools
  • About
  • Contact Us

Input your search keywords and press Enter.