{"id":75167,"date":"2025-11-06T12:34:12","date_gmt":"2025-11-06T11:34:12","guid":{"rendered":"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/"},"modified":"2025-11-06T12:34:12","modified_gmt":"2025-11-06T11:34:12","slug":"why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems","status":"publish","type":"news","link":"https:\/\/fhi.nl\/en\/news\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/","title":{"rendered":"Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems"},"content":{"rendered":"<header id=\"header\" class=\"header header--low\">\n\n\t\n\t\t\t<div class=\"header__background header__background--graphic\"><\/div>\n\t\n\t<div class=\"container\">\n\t\t<div class=\"header__content\">\n\t\t\t<div class=\"header__first header__first--alone\">\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t\n\t\t\t\t<h1 class=\"header__title\" >\n\t\t\t\t\tWhy Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems\t\t\t\t<\/h1>\n\n\t\t\t\t<div class=\"header__dots-line\">\n\t\t\t\t\t<svg width=\"431\" height=\"9\" viewbox=\"0 0 431 9\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><path d=\"M430.799 4.192a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.135 1.135 0 1 1-2.27 0 1.135 1.135 0 0 1 2.27 0Zm-27.27 0a1.136 1.136 0 1 1-2.272-.001 1.136 1.136 0 0 1 2.272 0Zm-27.272 0a1.39 1.39 0 1 1-2.78 0 1.39 1.39 0 0 1 2.78 0Zm-27.78 0a1.645 1.645 0 1 1-3.29 0 1.645 1.645 0 0 1 3.29 0Zm-28.29 0a1.9 1.9 0 1 1-3.799 0 1.9 1.9 0 0 1 3.799 0Zm-28.799 0a2.154 2.154 0 1 1-4.308 0 2.154 2.154 0 0 1 4.308 0Zm-29.308 0a2.41 2.41 0 1 1-4.819 0 2.41 2.41 0 0 1 4.819 0Zm-29.819 0a2.663 2.663 0 1 1-5.326.001 2.663 2.663 0 0 1 5.326-.001Zm-30.327 0a2.919 2.919 0 1 1-5.837 0 2.919 2.919 0 0 1 5.837 0Zm-30.837 0a3.173 3.173 0 1 1-6.345.001 3.173 3.173 0 0 1 6.345 0Zm-31.346 0a3.428 3.428 0 1 1-6.856 0 3.428 3.428 0 0 1 6.856 0Zm-31.856 0a3.683 3.683 0 1 1-7.365 0 3.683 3.683 0 0 1 7.365 0Zm-32.365 0a3.937 3.937 0 1 1-7.875 0 3.937 3.937 0 0 1 7.875 0Zm-32.874 0a4.192 4.192 0 1 1-8.384 0 4.192 4.192 0 0 1 8.384 0Z\" fill=\"#FFF960\"\/><\/svg>\t\t\t\t<\/div>\n\n\t\t\t\t\n\t\t\t\t\n\t\t\t<\/div>\n\n\t\t\t\n\t\t<\/div>\n\t<\/div>\n<\/header>\n\n\n\n<div class=\"text bg--white\">\n\t<div class=\"container\">\n\t\t\t\t\t\t\t\t\t\t\t<div class=\"text__content text__content--1-col\">\n\t\t\t<div id=\"pl-7359\"  class=\"panel-layout\" ><div id=\"pg-7359-0\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7359-0-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-7359-0-1\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-7359-0-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"0\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<p><span style=\"font-weight: 400;\">Security is not a one-time event, it&#039;s a continuous process. In today&#039;s connected world, embedded devices are everywhere, in cars, medical devices, industrial equipment, power grids, our homes and defense systems. But as connectivity grows, so does the attack surface. Once-dependable firmware can quickly become a liability if vulnerabilities remain undetected. Radio Equipment Directive (RED) and <strong><a href=\"https:\/\/logic.nl\/cra-compliance-scan\/\">The Cyber Resilience Act (CRA)<\/a><\/strong> are the European Union&#039;s response to this new reality. They require manufacturers to prove that their software and firmware can withstand cyber threats, throughout the entire product lifecycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So, how can development teams stay ahead? The answer lies in continuous observability of your embedded software.<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-7359-0-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><div id=\"pg-7359-1\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7359-1-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-7359-1-1\"  class=\"panel-grid-cell\" ><div id=\"panel-7359-1-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"1\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4><span style=\"color: #b8d0d8;\">1. Security Is Not Static<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Every software update, library integration, or compiler change introduces risk. Even if your system was secure at launch, new vulnerabilities can emerge daily. Recent research shows that about 80% of embedded systems reuse open-source components, which means that a single unpatched library can put thousands of devices at risk.<\/span><\/p>\n<p><b>Continuous monitoring<\/b><span style=\"font-weight: 400;\"> enables teams to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Detect new vulnerabilities as they arise.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Trace risks back to specific components.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Take corrective actions before release or update after deployment.<\/span><\/li>\n<\/ul>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-7359-1-2\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-7359-1-2-0\" class=\"so-panel widget widget_media_image panel-first-child panel-last-child\" data-index=\"2\" ><\/div><\/div><div id=\"pgc-7359-1-3\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><div id=\"pg-7359-2\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7359-2-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-7359-2-1\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-7359-2-1-0\" class=\"so-panel widget widget_sow-editor panel-first-child panel-last-child\" data-index=\"3\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-sow-editor so-widget-sow-editor-base\"\n\t\t\t\n\t\t>\n<div class=\"siteorigin-widget-tinymce textwidget\">\n\t<h4><span style=\"color: #b8d0d8;\">2. Firmware Security: Beyond the Surface<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Traditional static analysis tools often scan source code, but firmware vulnerabilities can hide in binaries, beyond what source-level tools can detect. <strong><a href=\"https:\/\/logic.nl\/cra-compliance-scan\/\">A binary-level analyzer<\/a><\/strong>, such as the one offered by Logic Technology, examines compiled code to reveal deeper issues like:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Password Hash Audit: detects weak or hardcoded passwords in the image<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Malware Analysis: malware within the file system<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Hardening Check: verifies compiler settings and secure coding practices<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Capabilities Review: looks for vulnerabilities in the components of the image (process manipulation, system log access, shell, hooking)<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Kernel Security Check: evaluates kernel security features<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cryptographic Material Scan: detects crypto keys (private + public) and certificates within the file system<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Buffer overflows or command injection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Security at kernel level<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Memory leaks<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Compiler settings conform to secure coding practices<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">By scanning the actual firmware image, developers gain an accurate picture of what&#039;s really being shipped, not just what was intended in the source. <i>With Exein, you can effortlessly scan your entire system for vulnerabilities, detect threats, and secure your devices, all from one powerful platform.<\/i><\/span><\/p>\n<h4><span style=\"color: #b8d0d8;\">3. Cyber Resilience: The New Quality Standard<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">The CRA introduces a paradigm shift: cybersecurity equals product quality. Manufacturers must now prove that their products are both functionally safe and digitally secure. That means continuous vulnerability monitoring isn&#039;t just a technical preference, it&#039;s a compliance requirement. <i>Key CRA obligations include:<\/i><\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Identifying and mitigating known vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Ensuring secure design and development processes.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Providing security updates throughout the product&#039;s lifecycle.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Report responses to vulnerabilities and attacks after deployment to \u2026\u2026<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Continuous code scanning supports key obligations 1 through 3, delivering the traceability, documentation, and risk visibility that auditors and certification bodies expect.<\/span><\/p>\n<ul>\n<li>a\u00a0<strong>ready-to-run demo package<\/strong>\u00a0with documented examples showing how Detect captures anomalies and provides instant diagnostics<\/li>\n<li>a\u00a0<strong>self service evaluation download<\/strong>\u00a0so you can test Detect in your own environment, on your own schedule<\/li>\n<\/ul>\n<p>With Detect 2025.2, you go beyond crash dumps \u2014 and start detecting anomalies before they become failures.<\/p>\n<h4><span style=\"color: #b8d0d8;\">4. Embedding Security Into the Development Lifecycle<\/span><\/h4>\n<p><span style=\"font-weight: 400;\">Security should not come as a final checklist before release. Instead, it must be embedded in every stage of development:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Design: anticipate potential threats and design for resilience.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Build: continuously test compiled binaries for weaknesses.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Deploy: monitor released firmware for newly discovered vulnerabilities.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">By automating this cycle, teams can ensure ongoing compliance without slowing innovation.<\/span><\/li>\n<\/ul>\n<h4><strong><span style=\"color: #b8d0d8;\">5. Take the First Step ,Scan Your Code<\/span><\/strong><\/h4>\n<p><span style=\"font-weight: 400;\">Continuous observability starts with a single scan. <\/span><span style=\"font-weight: 400;\">Logic Technology&#039;s <\/span><a href=\"https:\/\/logic.nl\/cra-compliance-scan\/\"><b>free CRA compliance scan of your binary code <\/b><\/a><span style=\"font-weight: 400;\">provides a fast, non-intrusive way to assess your embedded software for vulnerabilities and CRA compliance risks. Within minutes, you&#039;ll see:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Where your software is most vulnerable<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Which libraries or modules need attention<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">How your code aligns with CRA requirements<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">\ud83d\udd0d Start your journey to cyber resilience.\u00a0<\/span><\/p>\n<\/div>\n<\/div><\/div><\/div><div id=\"pgc-7359-2-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><div id=\"pg-7359-3\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7359-3-0\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><div id=\"pgc-7359-3-1\"  class=\"panel-grid-cell panel-grid-cell-mobile-last\" ><div id=\"panel-7359-3-1-0\" class=\"so-panel widget widget_rtw-button-widget panel-first-child panel-last-child\" data-index=\"4\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-rtw-button-widget so-widget-rtw-button-widget-base\"\n\t\t\t\n\t\t><a href=\"https:\/\/logic.nl\/cra-compliance-scan\/\" class=\"a-button button\">Scan your code today<\/a>\t\n<\/div><\/div><\/div><div id=\"pgc-7359-3-2\"  class=\"panel-grid-cell panel-grid-cell-empty\" ><\/div><\/div><div id=\"pg-7359-4\"  class=\"panel-grid panel-no-style\" ><div id=\"pgc-7359-4-0\"  class=\"panel-grid-cell\" ><div id=\"panel-7359-4-0-0\" class=\"so-panel widget widget_rtw-expert-widget panel-first-child panel-last-child\" data-index=\"5\" ><div\n\t\t\t\n\t\t\tclass=\"so-widget-rtw-expert-widget so-widget-rtw-expert-widget-base\"\n\t\t\t\n\t\t><section class=\"o-expert\">\n\t<div class=\"container\">\n\t\t<div class=\"o-expert__wrapper\">\n\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__wrapper-left\">\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t<div class=\"o-expert__wrapper-right\">\n\t\t\t\t<div class=\"top\">\n\t\t\t\t\t<div class=\"expert\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t\tGevorg Melikdjanjan\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\t\tSecurity | Reliability | DataSolutions\t\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"bottom\">\n\t\t\t\t\t\t\t\t\t\t\t<h2>\n\t\t\t\t\t\t\tIs your software compliant with the Cyber Resilience Act (CRA)?\t\t\t\t\t\t<\/h2>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<p>\n\t\t\t\t\t\t\tI help you identify where you stand and ensure your software meets CRA requirements. Logic Technology performs GDPR-compliant binary scans, your data is handled securely and permanently deleted after analysis.\t\t\t\t\t\t<\/p>\n\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__actions\">\n\t\t\t\t\t\t<div class=\"o-expert__contact-links\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<div class=\"o-expert__contact-links-separator\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"mailto:g.melikdjanjan@logic.nl\" target=\"_blank\" title=\"E-mail\">\n\t\t\t\t\t\t\t\t\t\t<svg class=\"svg--interface--icon-email-dims\"><use xlink:href=\"https:\/\/logic.nl\/wp-content\/themes\/logic-technology\/images\/svg\/svg-sprite.svg#interface--icon-email\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"tel:+31778200955\" target=\"_blank\" title=\"Phone\">\n\t\t\t\t\t\t\t\t\t\t<svg class=\"svg--interface--icon-phone-dims\"><use xlink:href=\"https:\/\/logic.nl\/wp-content\/themes\/logic-technology\/images\/svg\/svg-sprite.svg#interface--icon-phone\"><\/use><\/svg>\t\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"a-button button calendly\" href=\"https:\/\/calendly.com\/logic_gevorgmelikdjanjan\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tSchedule a meeting\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"a-button button chat\" href=\"https:\/\/voice-logic.my3cx.nl:5001\/gevorgmelikdjanjan\" target=\"_blank\">\n\t\t\t\t\t\t\t\t\tChat now\t\t\t\t\t\t\t\t<\/a>\n\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/section><\/div><\/div><\/div><\/div><\/div><p>The post <a href=\"https:\/\/logic.nl\/knowledge-center\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/\">Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems<\/a> appeared first on <a href=\"https:\/\/logic.nl\">Logic Technology<\/a>.<\/p>\n<p>Source: <a href=\"https:\/\/logic.nl\/knowledge-center\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/\">https:\/\/logic.nl\/knowledge-center\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/<\/a><\/p>\t\t<\/div>\n\t<\/div>\n<\/div>\r\n\t<div class=\"articles bg--offwhite automatic\">\r\n\t\t<div class=\"container\">\r\n\t\t\t<div class=\"articles__header\">\r\n\t\t\t\t\t\t\t\t\t<div class='heading-wrapper'><svg width=\"13\" height=\"13\" viewbox=\"0 0 13 13\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\"><circle cx=\"6.394\" cy=\"6.5\" r=\"6.394\" fill=\"#000\"\/><\/svg><h2>Related articles<\/h2><\/div>\t\t\t\t\t\t\t\t\t\t\t\t\t<a href=\"\/en\/profiel\/logic-technology-b-v\/\" class=\"button button--outline\">view profile<\/a>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t\t<div class=\"post-grid post-grid--no-padding\">\r\n\t\t\t\t\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/servo-aandrijvingen-voor-in-ruige-condities-omgevingen\/\" data-id=\"40064\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>Servo drives for rough conditions\/environments<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial automation<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial automation<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Members content<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tEltrex Motion\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tJanuary 27, 2021\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\n<a class=\"single-item single-item__articles\" href=\"https:\/\/fhi.nl\/en\/news\/idec-ft2j-combineert-plc-met-7-pcap-display\/\" data-id=\"46919\">\n\t<div class=\"single-item__articles-icon\">\n\t\t<svg width=\"35\" height=\"35\" viewbox=\"0 0 35 35\" fill=\"none\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\">\n<mask id=\"mask0_1182_5532\" style=\"mask-type:luminance\" maskunits=\"userSpaceOnUse\" x=\"0\" y=\"0\" width=\"35\" height=\"35\">\n<path d=\"M0 0H35V35H0V0Z\" fill=\"white\"\/>\n<\/mask>\n<g mask=\"url(#mask0_1182_5532)\">\n<path d=\"M5.12695 9.22852H1.02539V31.9238H10.4299C12.2868 31.9238 14.0678 32.6615 15.3809 33.9746H19.6191C20.9322 32.6615 22.7132 31.9238 24.5701 31.9238H33.9746V11.2793H29.873\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M17.5 9.22852H18.1426C20.0088 7.89544 22.2237 7.17773 24.5615 7.17773H29.873V27.8223H24.5615C22.2237 27.8223 20.0088 28.54 18.1426 29.873H16.8574C14.9912 28.54 12.7763 27.8223 10.4385 27.8223H5.12695V5.12695H9.22852\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<path d=\"M9.22852 1.02539V21.6699C13.759 21.6699 17.5 25.3425 17.5 29.873V9.22852C17.5 4.698 13.759 1.02539 9.22852 1.02539Z\" stroke=\"#2A5CEE\" stroke-width=\"2\" stroke-miterlimit=\"10\"\/>\n<\/g>\n<\/svg>\n\t<\/div>\n\t<div class=\"single-item__articles-title\"><div class='heading-wrapper'><h3>IDEC FT2J combines PLC with 7&#039; PCAP display<\/h3><\/div><\/div>\n\t<div class=\"single-item__articles-terms\">\n\t\t\n\t\t\n\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Industrial automation<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Hardware for automation<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Software for automation<\/span>\n\t\t\t\t\t\t\t\t<span class=\"button button--outline single-item__articles-term--branche single-item__articles-term\">Members content<\/span>\n\t\t\t\t\t<\/div>\n\t<div class=\"single-item__articles-author-date-wrapper\">\n\t\t\t\t\t<div class=\"single-item__articles-author\">\n\t\t\t\tAPEM-IDEC BENELUX\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"single-item__articles-date\">\n\t\t\t\tJuly 29, 2024\t\t\t<\/div>\n\t\t\t<\/div>\n<\/a>\n\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t<\/div>","protected":false},"excerpt":{"rendered":"","protected":false},"featured_media":0,"template":"","branches":[],"events":[],"secretariat":[],"categories":[],"themes_tax":[],"content_types":[],"class_list":["post-75167","news","type-news","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems - FHI, federatie van technologiebranches<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/fhi.nl\/en\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems - FHI, federatie van technologiebranches\" \/>\n<meta property=\"og:url\" content=\"https:\/\/fhi.nl\/en\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"FHI, federatie van technologiebranches\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/\",\"url\":\"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/\",\"name\":\"Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems - FHI, federatie van technologiebranches\",\"isPartOf\":{\"@id\":\"https:\/\/fhi.nl\/#website\"},\"datePublished\":\"2025-11-06T11:34:12+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/fhi.nl\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Nieuws\",\"item\":\"https:\/\/fhi.nl\/nieuws\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/fhi.nl\/#website\",\"url\":\"https:\/\/fhi.nl\/\",\"name\":\"FHI, federatie van technologiebranches\",\"description\":\"Nederlandse branchevereniging voor technologiebranches\",\"publisher\":{\"@id\":\"https:\/\/fhi.nl\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/fhi.nl\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/fhi.nl\/#organization\",\"name\":\"FHI, federatie van technologiebranches\",\"url\":\"https:\/\/fhi.nl\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"contentUrl\":\"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png\",\"width\":732,\"height\":136,\"caption\":\"FHI, federatie van technologiebranches\"},\"image\":{\"@id\":\"https:\/\/fhi.nl\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches\",\"https:\/\/www.instagram.com\/fhi_nl\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems - FHI, federation of technology industries","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/fhi.nl\/en\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/","og_locale":"en_GB","og_type":"article","og_title":"Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems - FHI, federatie van technologiebranches","og_url":"https:\/\/fhi.nl\/en\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/","og_site_name":"FHI, federatie van technologiebranches","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/","url":"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/","name":"Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems - FHI, federation of technology industries","isPartOf":{"@id":"https:\/\/fhi.nl\/#website"},"datePublished":"2025-11-06T11:34:12+00:00","breadcrumb":{"@id":"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/fhi.nl\/nieuws\/why-continuous-monitoring-for-vulnerabilities-is-essential-in-embedded-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/fhi.nl\/"},{"@type":"ListItem","position":2,"name":"Nieuws","item":"https:\/\/fhi.nl\/nieuws\/"},{"@type":"ListItem","position":3,"name":"Why Continuous Monitoring for Vulnerabilities Is Essential in Embedded Systems"}]},{"@type":"WebSite","@id":"https:\/\/fhi.nl\/#website","url":"https:\/\/fhi.nl\/","name":"FHI, federation of technology industries","description":"Dutch trade association for technology industries","publisher":{"@id":"https:\/\/fhi.nl\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/fhi.nl\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/fhi.nl\/#organization","name":"FHI, federation of technology industries","url":"https:\/\/fhi.nl\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/","url":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","contentUrl":"https:\/\/fhi.nl\/app\/uploads\/2024\/06\/3-e1722349014385.png","width":732,"height":136,"caption":"FHI, federatie van technologiebranches"},"image":{"@id":"https:\/\/fhi.nl\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/fhi-federation-of-technology-branches","https:\/\/www.instagram.com\/fhi_nl\/"]}]}},"_links":{"self":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/75167","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news"}],"about":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/types\/news"}],"version-history":[{"count":0,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/news\/75167\/revisions"}],"wp:attachment":[{"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/media?parent=75167"}],"wp:term":[{"taxonomy":"branches","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/branches?post=75167"},{"taxonomy":"events","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/events?post=75167"},{"taxonomy":"secretariat","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/secretariat?post=75167"},{"taxonomy":"categories","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/categories?post=75167"},{"taxonomy":"themes","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/themes_tax?post=75167"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/fhi.nl\/en\/wp-json\/wp\/v2\/content_types?post=75167"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}