Skip to main content

Your submission was sent successfully! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates from Canonical and upcoming events where you can meet our team.Close

Thank you for contacting us. A member of our team will be in touch shortly. Close

Blog posts tagged
"cybersecurity"


Stephanie Domas
30 September 2024

What the Cyber Resilience Act (CRA) means for IoT manufacturers

Compliance Article

The EU Cyber Resilience Act has considerable repercussions for the IoT device manufacturers. In this blog, we explore these new regulatory requirements and give our blueprint for compliant, market-ready devices. ...


Stephanie Domas
13 August 2024

The Cyber Resilience Act: What it means for open source

Compliance Article

Canonical CISO Stephanie Domas outlines the community response to the EU Cyber Resilience Act and explores how it will affect enterprises using open source software. ...


Nathan Hart
5 January 2023

Security in the smart home: considerations for device makers

IoT Article

When people think of home security they usually think of an alarm system with a keypad next to the door. These days, however, home security should have two meanings. I’m here to talk about the second: cybersecurity. In other words, security in the smart home. A recent investigation found that a shocking number of leading ...


Canonical
21 September 2021

Ubuntu 14.04 and 16.04 lifecycle extended to ten years

Canonical announcements Article

LONDON, UK – Canonical announces the lifecycle extension of Ubuntu 14.04 LTS ‘Trusty Tahr’ and 16.04 LTS ‘Xenial Xerus’ to a total of ten years. This lifecycle extension enables organizations to balance their infrastructure upgrade costs, by giving them additional time to implement their upgrade plan. The prolonged Extended Security Maint ...


Nikos Mavrogiannopoulos
1 September 2021

Cybersecurity with Ubuntu

Cloud and server White paper

The cybersecurity state of affairs can be described as too complex today. There is an enormous number of threats endangering sensitive data for the average IT team to cope with. Threats ranging from exposure of physical assets stored in an office, to “social engineering” attacks resulting in unauthorized access, or even threats that explo ...