Login will follow soon.

Product

From CVE to Risk Decision: Integrated Vulnerability Management in Your TARA

Right inside the CYMETRIS platform: vulnerability management interlocked with TARA analysis. With this far-reaching feature extension, structured vulnerability management can now be integrated directly into the CYMETRIS TARA process.

New vulnerabilities from external sources such as CVE databases, vendor advisories, or internal security analyses can be imported on a per-project basis with the new vulnerability management feature and automatically mapped to the affected components in your own development.

A product-specific risk assessment of the new vulnerability can then be performed — a major advantage when it comes to making well-founded statements about its actual relevance.

As soon as a vulnerability is assigned to a component, CYMETRIS checks whether and how it affects existing attack paths. Relevant vulnerabilities can be fed into the attack path analysis as additional data points — either as a new entry point that did not exist before, or as a new way to circumvent an existing protection mechanism.

With this continuous update of the risk landscape across the entire product lifecycle, keeping the TARA up to date becomes intelligent and, above all, efficient: when the threat landscape shifts due to a newly discovered vulnerability, the TARA reflects this immediately — required mitigation measures can be triggered right away and forwarded with all relevant information attached. The feature is currently available to selected customers in a prototyping phase and will be rolled out globally in the near future.

Accompanying AI assistance functions, which will noticeably simplify day-to-day work in vulnerability management, are also ready to launch.

 

Other Latest Updates on CYMETRIS You Might Like

Stay up to date with CYMETRIS and our software platform. We regularly share new features, updates, and practical expert insights on cyber risk assessment and TARA. Browse all our latest posts right here: NEWS

Knowledge

Vertical TARA Integration

How can TARA function across organizational boundaries? Through intelligent nesting. We recently published an expert blog on this topic, available in the Knowledge Hub of the CYEQT Knowledge Base, the leading training platform for automotive cybersecurity. LEARN MORE↗

Product

Public API (v1.0 released!)

We’ve been busy over the holidays! Our latest release includes a public API interface with secure API key support now implemented. For all integration inquiries, please contact us directly at partner@cymetris.com

Recruiting & Careers

Yes, we’re hiring! (Q1/2026)

We’re expanding our team at CYMETRIS headquarters in Munich! We’re currently seeking Frontend Developers, Backend Developers, and more. Please feel free to reach out with a brief message so we can provide detailed information about our open positions. LEARN MORE↗

TARA in Development: How to Assess Cyber Risks (Methodology Guide)

TARA in Development: How to Assess Cyber Risks (Methodology Guide)

TARA (Threat Analysis and Risk Assessment) provides a powerful methodology for systematically identifying and evaluating cyber risks — throughout product development and across the entire lifecycle.

Our overview page guides you step-by-step through the complete TARA process in line with ISO/SAE 21434: you’ll learn which phases matter, what artifacts play a role, and what truly counts.

What you’ll find here:

  • Clear guidance through all TARA steps
  • Key artifacts presented in modular overview
  • Practical insights on common pitfalls and limitations
  • Special considerations for collaboration between OEMs and suppliers in automotive development

Get started now and dive into the full guide.

Get the latest from CYMETRIS: Let's talk

Our platform continues to evolve with cutting-edge features for intelligent cyber risk modeling/TARA. Want the latest on new capabilities, integrations, and industry developments? Reach out to our team for insights tailored to your needs.

Explore
Drag