Resources

Research, guidance, and product-security operating insight

This page collects ARIANNA content for teams responsible for vulnerability management, SBOM governance, remediation workflows, and regulatory readiness.

Use it to find published articles now, and to follow the editorial tracks we are building for engineering, security, quality, and compliance stakeholders.

Knowledge hub

Focused material for people managing real product-security work in connected and regulated environments.

Blog Posts

Why SBOM Alone Is Not Enough for IoT Security

SBOM is essential, but effective vulnerability management also requires hardware context, lifecycle tracking, and exploitability awareness.

Read the blog

CI/CD Vulnerability Checks Without Slowing Releases

How to integrate ARIANNA SCA scripts and APIs into CI/CD pipelines to keep security continuous and release friction low.

Read the blog

Top 5 Triage Mistakes in Device Security Programs

Common pitfalls teams make when handling vulnerability triage and how to avoid delays, false positives, and poor prioritization.

Read the blog

News

Security Pattern Spins Out ARIANNA as New Cybersecurity Company

Security Pattern announces ARIANNA as an independent company and appoints Jan Jager as CEO and Massimo Ratti as CTO ahead of the March 24, 2026 launch in Brussels.

Read the news

CRA Regulatory Watch: Implementation Milestones to Track in 2026

A concise update on CRA 2026 milestones, reporting deadlines, and practical preparation steps for product security teams.

Read the news

New Trial Functionality: Dummy Project or Your Own Device Model

Start quickly with a sample project or create your own device model and SBOM, then continue from trial without starting over.

Read the news

ARIANNA to Visit the EU Cyber Resilience Act Conference in Brussels

At our booth, we will demonstrate ARIANNA with a focus on how vulnerability management workflows support CRA implementation and ongoing compliance operations.

Read the news

ARIANNA at Embedded World Conference 2026

Conference highlights from Nuremberg, including key trends in SBOM operations, vulnerability prioritization, and compliance execution for embedded teams.

Read the news

Newsletters

Monthly Security Briefing

A recurring summary of product-security developments relevant to connected, embedded, and safety-critical products.

Read the newsletter

Regulatory Watch

Coverage of standards activity, certification changes, and milestone dates across major product-security regulations and frameworks.

Read the newsletter

Product and Partner Updates

Selected ARIANNA announcements, roadmap developments, and partner updates that matter to customers evaluating operational fit.

Read the newsletter

Articles

From Device Model to Continuous Security

How ARIANNA combines HBOM and SBOM with Processing Units and groups to make vulnerability monitoring operational over time.

Read the article

Risk and Exploitability Prioritization in ARIANNA

A practical approach to prioritizing vulnerabilities with CVSS, KEV, EPSS, exploit maturity, and attack vector relevance.

Read the article

From Inventory to Action: An SBOM Governance Playbook

A practical framework for turning SBOM generation into ownership, prioritization, and audit-ready execution.

Read the article

Bridging the Gap: Vulnerability Management for Developers vs. Quality Control

How development, QC, and security teams can align scanning, triage, and penetration testing into one accountable workflow.

Read the article

Operating Guides

Guidance for building repeatable triage, remediation, ownership, and reporting models around complex products and supply chains.

Read the article

ARIANNA User Manual

Full platform manual with a left-side index, structured sections, and reference links for workflows, roles, and reporting.

Read the manual

Support

Access ARIANNA support resources, troubleshooting guidance, and contact channels for technical assistance.

Open support page

FAQ

What is a Vulnerability Management Project in ARIANNA?

It is the workspace where teams manage one product or system over time, including Device Models, vulnerability triage, remediation tracking, and reporting.

Does ARIANNA support both HBOM and SBOM?

Yes. ARIANNA combines hardware and software inventories in one model so vulnerabilities can be evaluated with full device context.

How often are vulnerabilities monitored?

ARIANNA performs daily monitoring and report generation by correlating components with continuously updated vulnerability intelligence.

Do we need to install agents on devices?

No. ARIANNA SCA tools run in development/build environments and upload component data to the platform without intrusive on-device agents.

Can ARIANNA integrate with CI/CD pipelines?

Yes. APIs support automated Device Model updates, report generation, and filtering of high-priority vulnerabilities in pipeline workflows.

Which report formats are supported?

ARIANNA exports machine-readable formats such as CycloneDX, SPDX, and VEX, plus human-readable PDF reports for audit and stakeholder review.

Book a free Demo Start a free Trial