Comply with CRA
  • CRA Compliance tool.
  • Guides to CRA
    • Summary of the Cyber Resilience Act (CRA)
    • What is the Cyber Resilience Act
    • What to expect from Cyber Resilience Act (CRA) fines?
    • How to prepare for the Cyber Resilience Act (CRA)
  • Videos and Podcasts About CRA
    • Understanding the Cyber Resilience Act (CRA)
    • Industry Readiness for CRA
    • The Cyber Resilience Act Explained
    • Navigating Cyber Resilience Act (CRA) Compliance
    • Cyber Resilience Act (CRA) Standards
  • CRA Examples and stories
    • Preparing for CRA with SAMMY
  • CRA FAQ
    • What is CRA?
    • Where does CRA apply?
    • Why was CRA created?
    • When does CRA apply?
    • Who does CRA apply to?

Home

Home
Cyber Resilience Act (CRA) vs Cybersecurity Act (CSA) illustration

27

Mar

Cyber Resilience Act (CRA) vs Cybersecurity Act (CSA)

  • Nicolas Montauban
  • Compliance, CRA, CSA, Cyber Resilience Act, Cybersecurity Act, Regulation

As we navigate 2026, the EU’s digital landscape has fundamentally shifted. While the Cyber Resilience […]

Read Article
CRA vs DORA illustration

27

Mar

Cyber Resilience Act (CRA) vs. Digital Operational Resilience Act (DORA)

  • Nicolas Montauban
  • CRA, Cyber Resilience Act, Digital Operational Resilience Act, DORA

Imagine you are a software vendor selling a banking app in 2026. Are you a[…]

Read Article
Cyber Resilience Act vs NIS2 illustration

26

Mar

Cyber Resilience Act (CRA) vs NIS2: Similarities and Differences

  • Nicolas Montauban
  • AppSec, Compliance, CRA, Cyber Resilience Act, Cybersecurity, NIS2, Security

If you are doing business in Europe, cybersecurity is no longer an optional feature, it[…]

Read Article
does the cyber resilience act vary by country featured image

23

Mar

Does the Cyber Resilience Act (CRA) vary by country?

  • Nicolas Montauban
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity

Does the Cyber Resilience Act (CRA) vary by country? Yes and no, and that is[…]

Read Article
why was the cyber resilience act introduced featured image

20

Mar

Why was the Cyber Resilience Act (CRA) introduced?

  • Nicolas Montauban
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity

The Cyber Resilience Act (CRA) was introduced because the EU wanted to reduce the number[…]

Read Article
by when do you need to comply with the cyber resilience act timeline featured image

18

Mar

By when do you need to comply with the Cyber Resilience Act (CRA)?

  • Nicolas Montauban
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity

By when do you need to comply with the Cyber Resilience Act (CRA)? The short[…]

Read Article
who needs to comply with the cyber resilience act featured image

17

Mar

Who needs to comply with the Cyber Resilience Act (CRA)?

  • Nicolas Montauban
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity

Who needs to comply with the Cyber Resilience Act (CRA)? In most cases, it is[…]

Read Article
CRA Standards

13

Mar

Cyber Resilience Act (CRA) Standards

  • Dag Flachet
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity

This deep-dive session, led by Angelo D’Amato (Founder of Vulnir and rapporteur for CRA standards[…]

Read Article
Webinar on CRA

09

Mar

Navigating Cyber Resilience Act (CRA) Compliance

  • Dag Flachet
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity

Navigating EU CRA Compliance: Expert Webinar Series with Maxim Baele Are you prepared for the[…]

Read Article
CRA Compliance

01

Dec

How to prepare for the Cyber Resilience Act (CRA)

  • Aram Hovsepyan
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity

The upcoming Cyber Resilience Act (CRA) is a EU regulation that was published on November[…]

Read Article

24

Apr

What to expect from Cyber Resilience Act (CRA) fines?

  • Dag Flachet
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity, OWASP SAMM

  Official framework, regulation and standard pages mentioned in this article CRA GDPR OWASP SAMM[…]

Read Article
CRA roadmap

05

Sep

What is the Cyber Resilience Act (CRA) and how to comply with it

  • Dag Flachet
  • Application Security, Compliance, CRA, Cyber Resilience Act, Cybersecurity, Privacy by Design, Security

It this article we explore the essentials of the EU Cyber Resilience Act (CRA), and[…]

Read Article

Powered by Codific

  • Visit Codific's LinkedIn channel (opens in a new tab)
  • Visit Codific's YouTube channel (opens in a new tab)
  • Spotify

Main Focus

Application Security AppSec Compliance CRA Cyber Resilience Act Cybersecurity Digital Operational Resilience Act DORA NIS2 OWASP SAMM Privacy by Design Security

Recent Post

  • Cyber Resilience Act (CRA) vs Cybersecurity Act (CSA) illustration

    March 27, 2026

    Cyber Resilience Act (CRA) vs Cybersecurity Act (CSA)

    March 27, 2026

  • CRA vs DORA illustration

    March 27, 2026

    Cyber Resilience Act (CRA) vs. Digital Operational Resilience Act (DORA)

    March 27, 2026

  • Cyber Resilience Act vs NIS2 illustration

    March 26, 2026

    Cyber Resilience Act (CRA) vs NIS2: Similarities and Differences

    March 26, 2026

Codific ® 2026. All rights reserved.

Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}
Manage Consent
To provide the best experiences, we use technologies like cookies to store and/or access device information. Consenting to these technologies will allow us to process data such as browsing behavior or unique IDs on this site. Not consenting or withdrawing consent, may adversely affect certain features and functions.
Functional Always active
The technical storage or access is strictly necessary for the legitimate purpose of enabling the use of a specific service explicitly requested by the subscriber or user, or for the sole purpose of carrying out the transmission of a communication over an electronic communications network.
Preferences
The technical storage or access is necessary for the legitimate purpose of storing preferences that are not requested by the subscriber or user.
Statistics
The technical storage or access that is used exclusively for statistical purposes. The technical storage or access that is used exclusively for anonymous statistical purposes. Without a subpoena, voluntary compliance on the part of your Internet Service Provider, or additional records from a third party, information stored or retrieved for this purpose alone cannot usually be used to identify you.
Marketing
The technical storage or access is required to create user profiles to send advertising, or to track the user on a website or across several websites for similar marketing purposes.
  • Manage options
  • Manage services
  • Manage {vendor_count} vendors
  • Read more about these purposes
View preferences
  • {title}
  • {title}
  • {title}