What businesses need to know about the EU cyber resilience act

The EU cyber resilience act is turning product cybersecurity into a legal requirement for companies that sell digital products into the European Union. A key compliance milestone arrives in September 2026, well before the full regulation takes effect in 2027.

The EU cyber resilience act is emerging as a major cybersecurity regulation for any business that creates, distributes, imports, or sells products with digital components in the European Union. Its scope covers software and hardware, connected devices, embedded systems connected to cloud services, and other digital products sold into the region. The regulation is meant to address weak built-in security, poor patch support, weak vulnerability management, and limited transparency around known flaws. For companies operating across borders, cybersecurity practices that were once treated as optional best practices are becoming market access requirements.

The impact is expected to extend far beyond Europe because any organization that sells software, connected devices, SaaS systems, industrial systems, or other digital goods to the European Union will be required to comply, regardless of location. This means organizations in the United States, India, the UK, APAC, and the Middle East may all fall within scope. The law is expected to reshape secure software development practices, product lifecycle management, vulnerability disclosure, supply chain security, third-party software governance, and executive accountability. It also broadens the focus of cybersecurity from enterprise controls to the security of the product itself.

The most immediate deadline is September 11, 2026: Reporting Obligations Begin. Starting September 11, 2026: manufacturers must report actively exploited vulnerabilities, severe security incidents must be disclosed, reporting must occur through ENISA’s reporting mechanisms, and some reports may need to be submitted within 24 hours of awareness. These requirements apply before the full regulation becomes enforceable in 2027. That timeline means organizations need to mature incident response programs, vulnerability disclosure processes, monitoring capabilities, product security governance, and internal escalation workflows well before 2027.

Core obligations center on a security-by-design and security-throughout-lifecycle model. Businesses are expected to build products with secure-by-default settings, maintain coordinated vulnerability disclosure and remediation processes, deliver security updates and patch support, improve software supply chain visibility, and retain technical compliance documentation. The regulation places particular weight on transparency around software components, including Software Bills of Materials. It also elevates open source governance, dependency visibility, end-of-life component management, and vendor risk oversight as regulatory concerns rather than purely engineering issues.

Sectors likely to feel the strongest effects include SaaS companies, IoT manufacturers, healthcare technology firms, industrial automation providers, cloud software vendors, enterprise software companies, automotive and OT ecosystems, and consumer electronics brands. Common readiness gaps include immature vulnerability management, limited visibility into dependencies, inconsistent patch management, weak SBOM capabilities, insufficient product security documentation, and difficulty operationalizing rapid reporting. Preparation in 2026 centers on readiness assessments covering product inventory, lifecycle security, third-party dependency governance, incident reporting readiness, and product support policies, with close coordination across cybersecurity, engineering, legal, compliance, and executive leadership.

52

Impact Score

Claude Mythos and cyber insurance’s next inflection point

Claude Mythos is being treated by governments and regulators as a potential systemic cyber risk with implications for financial stability and insurance markets. Its emergence is intensifying pressure on insurers to clarify whether Artificial Intelligence-enabled cyber losses are covered, excluded, or require new stand-alone products.

OpenAI expands ChatGPT ads with self-serve manager

OpenAI is widening its ChatGPT ads pilot with a beta self-serve Ads Manager, new bidding options and broader measurement tools. The push signals a deeper move into advertising as the company expands the program into several international markets.

OpenAI launches Artificial Intelligence deployment consulting unit

OpenAI has created a new consulting and deployment business aimed at helping enterprises build and roll out Artificial Intelligence systems. The move mirrors a similar push by Anthropic and signals a broader effort by model providers to capture more of the enterprise services market.

SK Group warns DRAM shortages could curb memory use

SK Group chairman Chey Tae-won warned that customers may reduce memory consumption through infrastructure and software optimization if DRAM suppliers fail to raise output. Demand from Artificial Intelligence data centers is keeping the market tight as memory makers weigh expansion against the long timelines for new fabs.

BitUnlocker bypasses TPM-only Windows 11 BitLocker

Intrinsec disclosed BitUnlocker, a downgrade attack that can bypass TPM-only Windows 11 BitLocker protections with physical access to a machine. The technique abuses a flaw in Windows recovery and deployment components and relies on older trusted boot code.

Contact Us

Got questions? Use the form to contact us.

Contact Form

Clicking next sends a verification code to your email. After verifying, you can enter your message.