Login will follow soon.

Knowledge

New Reading Tip: Beyond Excel TARAs: Building Traceable Cybersecurity

Many automotive TARAs remain isolated in Excel, disconnected from development workflows. This CYEQT Knowledge Base article reveals the gaps between risk analysis and implementation, explains TARA integration, and provides actionable steps to achieve genuine traceability across your toolchain. LEARN MORE↗

In the ongoing discussion around Threat Analysis and Risk Assessment (TARA), one aspect is increasingly coming to the forefront: traceability across the entire analysis and development process.

In a recent expert article from the CYEQT Knowledge Base, Jan-Peter von Hunnius explains why traditional, isolated TARA documents – such as Excel spreadsheets – fail to meet the real requirements of modern product development. Traceability means that every risk assumption, decision, and derived measure is directly traceable to the underlying artifacts: from item definition through system and security architecture to specific attack paths and controls.

Without this connection, gaps emerge that jeopardize transparency, consistency, and audit readiness – both in audits and in daily development work. An integrated, tool-based TARA traceability creates exactly this end-to-end traceability and transforms risk analysis from an isolated compliance task into an integration asset.

For CYMETRIS, traceability isn’t a buzzword – it’s a core principle: Our software platform links data, models, and decisions through standards and automated references, minimizes redundancies and unclear handoffs between teams or organizational levels, and supports the efficient implementation of cybersecurity requirements in an engineering context. This level of integration is critical for not just identifying risks, but effectively managing them – especially in environments with high regulatory and security-critical requirements like automotive or embedded development.

LEARN MORE↗

Other Latest Updates on CYMETRIS You Might Like

Stay up to date with CYMETRIS and our software platform. We regularly share new features, updates, and practical expert insights on cyber risk assessment and TARA. Browse all our latest posts right here: NEWS

About Us

Official BSFZ-Funding for CYMETRIS

CYMETRIS has been recognized as an R&D company by Germany’s Research Allowance Authority (BSFZ). This confirms our AI platform for automotive cybersecurity breaks new ground with dynamic attack analysis and collaborative risk assessment. LEARN MORE↗

Recruiting & Careers

Yes, we’re hiring! (Q1/2026)

We’re expanding our team at CYMETRIS headquarters in Munich! We’re currently seeking Frontend Developers, Backend Developers, and more. Please feel free to reach out with a brief message so we can provide detailed information about our open positions. LEARN MORE↗

Product

We heard you: Undo/Redo

Usability first: Our new release (which includes backend stability and scalability improvements along with several interesting features—see the complete overview in the tool) brings undo and redo functionality. If you encounter any bugs, please report them!

TARA in Development: How to Assess Cyber Risks (Methodology Guide)

TARA in Development: How to Assess Cyber Risks (Methodology Guide)

TARA (Threat Analysis and Risk Assessment) provides a powerful methodology for systematically identifying and evaluating cyber risks — throughout product development and across the entire lifecycle.

Our overview page guides you step-by-step through the complete TARA process in line with ISO/SAE 21434: you’ll learn which phases matter, what artifacts play a role, and what truly counts.

What you’ll find here:

  • Clear guidance through all TARA steps
  • Key artifacts presented in modular overview
  • Practical insights on common pitfalls and limitations
  • Special considerations for collaboration between OEMs and suppliers in automotive development

Get started now and dive into the full guide.

Get the latest from CYMETRIS: Let's talk

Our platform continues to evolve with cutting-edge features for intelligent cyber risk modeling/TARA. Want the latest on new capabilities, integrations, and industry developments? Reach out to our team for insights tailored to your needs.

Explore
Drag