About Cabling Installation & Maintenance

Our mission: Bringing practical business and technical intelligence to today's structured cabling professionals

For more than 30 years, Cabling Installation & Maintenance has provided useful, practical information to professionals responsible for the specification, design, installation and management of structured cabling systems serving enterprise, data center and other environments. These professionals are challenged to stay informed of constantly evolving standards, system-design and installation approaches, product and system capabilities, technologies, as well as applications that rely on high-performance structured cabling systems. Our editors synthesize these complex issues into multiple information products. This portfolio of information products provides concrete detail that improves the efficiency of day-to-day operations, and equips cabling professionals with the perspective that enables strategic planning for networks’ optimum long-term performance.

Throughout our annual magazine, weekly email newsletters and 24/7/365 website, Cabling Installation & Maintenance digs into the essential topics our audience focuses on.

  • Design, Installation and Testing: We explain the bottom-up design of cabling systems, from case histories of actual projects to solutions for specific problems or aspects of the design process. We also look at specific installations using a case-history approach to highlight challenging problems, solutions and unique features. Additionally, we examine evolving test-and-measurement technologies and techniques designed to address the standards-governed and practical-use performance requirements of cabling systems.
  • Technology: We evaluate product innovations and technology trends as they impact a particular product class through interviews with manufacturers, installers and users, as well as contributed articles from subject-matter experts.
  • Data Center: Cabling Installation & Maintenance takes an in-depth look at design and installation workmanship issues as well as the unique technology being deployed specifically for data centers.
  • Physical Security: Focusing on the areas in which security and IT—and the infrastructure for both—interlock and overlap, we pay specific attention to Internet Protocol’s influence over the development of security applications.
  • Standards: Tracking the activities of North American and international standards-making organizations, we provide updates on specifications that are in-progress, looking forward to how they will affect cabling-system design and installation. We also produce articles explaining the practical aspects of designing and installing cabling systems in accordance with the specifications of established standards.

Cabling Installation & Maintenance is published by Endeavor Business Media, a division of EndeavorB2B.

Contact Cabling Installation & Maintenance

Editorial

Patrick McLaughlin

Serena Aburahma

Advertising and Sponsorship Sales

Peter Fretty - Vice President, Market Leader

Tim Carli - Business Development Manager

Brayden Hudspeth - Sales Development Representative

Subscriptions and Memberships

Subscribe to our newsletters and manage your subscriptions

Feedback/Problems

Send a message to our general in-box

 

DefectDojo Simplifies EU Cyber Reliance Act Compliance with New KEV Enrichment

Platform perfectly positioned to meet CRA requirements ahead of full enforcement

DefectDojo, the leader in scalable security, unified vulnerability management and DevSecOps, today announced new automated Known Exploited Vulnerabilities (KEV) data enrichment features for DefectDojo Pro. Ahead of the European Union’s full enforcement of the Cyber Reliance Act (CRA) in 2027, organizations with any EU operations need to ensure their application security (AppSec) program meets the act’s stringent new compliance requirements or risk significant consequences. In addition to checking a major compliance box, the new data enrichment capabilities will help any organization, regardless of location, more efficiently surface truly critical findings and immediately begin addressing them.

As with the GDPR, the EU’s CRA includes strict penalties for failure to comply. Serious non-compliance violations, for example, can cost an organization €15 million or 2.5% of global annual turnover, whichever is greater. This does not include any further monetary damage caused by a breach, which now costs nearly $5 million USD on average. Authorities can also order product recalls and withdrawals from the EU market as well as prohibit further sales of a non-compliant product, resulting in further lost revenue.

“The EU’s new regulations are wide-reaching and thorough, and the penalties will increase the growing financial burden of a data breach to businesses. DefectDojo prioritized developing these new features ahead of full enforcement to ensure that organizations are ready for compliance from day one,” said Greg Anderson, CEO and founder, DefectDojo. “By preparing our customers for this change now, we’re helping them avoid the consequences later.”

In this transitory period, the EU has encouraged organizations to align their internal processes for full compliance, prepare for regular audits and documentation checks and adopt vulnerability management best practices. As a centralized command center for security, Dojo Pro serves as a force-multiplier for businesses to automatically triage and prioritize both AppSec and Security Operations Center (SOC) findings and necessary remediations.

On average, companies deal with over 500,000 findings in a three-month period, but just 2-5% require immediate action, necessitating some form of automation to deduplicate findings and provide accurate prioritization lists. KEV data enrichment provides additional context to a finding’s actual risk severity in conjunction with the platform’s Rules Engine, which enables teams to customize rules to automatically manipulate, edit, enhance, add custom remediation advice, escalate, or de-escalate specific findings, all without significant human effort. Dojo Pro’s newly-launched next generation prioritization evaluation further classifies findings to reduce the time spent on low-risk findings.

Dojo Pro’s KEV data enrichment features will be showcased at Black Hat USA 2025 on August 6-7 at the DefectDojo booth (#6617) in the Business Hall’s Startup City section. CTO Matt Tesauro will also demo DefectDojo’s open-source OWASP Edition as part of Black Hat Arsenal, with his session scheduled for Thursday, August 7 at 2:00 PM.

Built by and for cybersecurity professionals, Dojo Pro is designed to make scalable security a reality for organizations of any size and centralize vulnerability data into one easy-to-use platform. DefectDojo’s customer base includes Fortune 10 companies, international banks, government agencies and solo consultants alike, and the OWASP Edition of the platform has been downloaded over 43 million times. To learn more about DefectDojo and get started with either the OWASP Edition or Dojo Pro, contact hello@defectdojo.com.

About DefectDojo

DefectDojo is the engine that drives DevSecOps, providing an open, scalable platform that connects security strategy to execution. By aggregating data from any security tool, automating manual processes, and delivering AI-powered insights, DefectDojo empowers organizations to have a unified view of security posture, automate operations to increase productivity and improve decision-making. For more information, visit defectdojo.com or follow us on LinkedIn or GitHub.

DefectDojo prioritized developing these new features ahead of full enforcement to ensure that organizations are ready for compliance from day one.

Contacts

Stock Quote API & Stock News API supplied by www.cloudquote.io
Quotes delayed at least 20 minutes.
By accessing this page, you agree to the following
Privacy Policy and Terms Of Service.