News

NEN 7510 for healthcare sector information security updated

The NEN 7510 standard for information security in the healthcare sector has been revised. The new NEN 7510-1:2024 was published on 16 December 2024 and replaces the previous version, NEN 7510:2017+A1:2020. The old version of the standard can still be used for certification under accreditation until 20 February 2027.

ISO 27001 and ISO 42001: A perfect match for information security and AI management

To implement AI safely and responsibly, international standards such as ISO 27001 and ISO 42001 play a crucial role. While ISO 27001 focuses on data protection, an AI management system (AIMS) under ISO 42001 is designed to manage and optimize the use of AI within an organization. By combining ISO 27001 and ISO 42001, businesses can develop a stronger and more proactive approach to information security.

The importance of input validation in IoT security

Cybersecurity has been a passion of mine for years. My journey in this field began out of curiosity, leading me to specialize in web penetration testing. Since joining Kiwa, my focus has shifted to IoT security, with an emphasis on testing against standards like ETSI EN 303645. One topic that consistently fascinates me is input validation—an area where web penetration testing and IoT security assessments often intersect.

Revised NEN 7510 published

To keep quality standards relevant and up-to-date, they are periodically revised. Following the revision of ISO 27001 in 2022, a new version of the NEN 7510 has recently been published. Below, we highlight some of the key changes in the NEN 7510:2024.

Interfaces

I am Jelte Derksen, an ethical hacker working at Kiwa NL. I got into the field of ethical hacking after initially pursuing studies that were, frankly, a terrible fit. Consequently, I pivoted into IT as a SCADA administrator. Once I had a solid grasp of the basics, I transitioned into IoT development and Data Engineering before landing in the field of security.

5 misconceptions about product legislation

Product legislation is quite a complex landscape. Especially if it is not your core business. In practice, we therefore often hear misunderstandings regarding product legislation. Read some common misconceptions in this article.

Cybersecurity product legislation

5 thoughts on how to start with cybersecurity not only for compliance reasons

Kiwa is of course known for being the independent party for testing and certification, but we support broader than that. In addition to compliance, we also find it important to think along with our customers' business continuity, which is why we think it is important to emphasize that you should not only focus on compliance, but also from a risk based perspective.

Information security - RED

5 steps to compliance and cybersecurity

There are a number of aspects that help to achieve in a structured way to arrive at a law and regulation compliant product or more importantly a cybersecure product. Sometimes starting with the topics listed below can be difficult due to a lack of available capacity or knowledge. Therefore start early, invest in training and education and get as much information as possible.

Compliance and cybersecurity

5 quick wins to achieve rapid improvements in a product's cybersecurity

Getting your product's cybersecurity in order can be very complicated. But there are some things that are relatively easy to organize and help you to quickly improve your product's cybersecurity.

Top 5 most common cyber non-conformities

By conducting testing and certification projects, we learn a lot, including which aspects contribute to a fast turnaround time of projects, but also which non-conformities are relatively common. Therefore, we made an overview of the most common non-conformities. Make sure they don’t happen to you!

Contact

Cyber Security Certification
Nederland
+31 (0)88 998 49 00

Protect your data!

Internet, (big) data and the internet of things… They offer great advantages, but also come with risks. This infographic gives you insights on the threats and opportunities when we look at data protection.