Industrial IoT cybersecurity is becoming increasingly critical as systems are becoming more connected – and with that, increasingly exposed. For us at dissecto, supporting Revolution Pi marks an important milestone: expanding our expertise beyond automotive into industrial environments.
Our collaboration with KUNBUS reflects a shared understanding: cybersecurity is not a one-time effort, but a continuous, measurable process embedded in the product lifecycle – from development to deployment and beyond.
Driven by Regulation, Enabled by Expertise
Having built our roots in automotive security where standards, safety, and compliance are deeply embedded, we are now systematically expanding into industrial IoT, with clear next steps towards sectors like medical and defense. What is accelerating this shift is not only the threat landscape, but also regulation.
With the Cyber Resilience Act (CRA) on the horizon, manufacturers of connected products across industries face a clear, non-negotiable requirement: security must be demonstrable, continuously maintained, and documented across the entire product lifecycle, by defined deadlines. For many organizations, this marks a fundamental change. Security is no longer a differentiator – it becomes a prerequisite for market access.
In this context, Industrial IoT cybersecurity is no longer limited to protecting individual components or networks. Instead, it requires a holistic view across interconnected systems, where hardware, software, and communication interfaces continuously interact. Attack surfaces are no longer static – they evolve with every update, integration, and deployment scenario.
This makes it essential to move beyond periodic assessments towards approaches that provide continuous visibility into the system’s security posture, enabling organizations to detect changes, validate assumptions, and respond to emerging risks in real time.
Projects like Revolution Pi show how this transition can be implemented in practice.

Continuous Security Validation with HydraVision for Industrial IoT Cybersecurity
Together with KUNBUS, we apply continuous, external security validation to Revolution Pi. Using our platform HydraVision, we simulate realistic attack scenarios across hardware and software layers, mirroring how real attackers would approach such systems.
This includes everything from low-level interfaces and communication protocols to system-level defenses and known vulnerability landscapes. Rather than focusing on isolated findings, the goal is to continuously assess, document, and improve the system’s security posture over time – creating transparency instead of one-off assurances.
“With HydraVision, we continuously assess Revolution Pi’s security status systematically. This helps us to ensure high, traceable security standards across the entire product lifecycle.”
Günter Knorr,
Chief Technology Officer @ KUNBUS
Security as Part of the Release Process
A key aspect of this collaboration is integration: Security testing is embedded directly into the Revolution Pi release cycle. Each new image is validated prior to release, ensuring that security evolves alongside functionality. Regression testing ensures that security improvements do not introduce unintended side effects, while continuous reassessment allows new threat intelligence to be incorporated over time.
This approach not only reflects modern security best practices, it directly supports manufacturers in meeting regulatory requirements such as CRA and RED DA, where continuous validation and traceability are becoming essential.
What This Means Going Forward
For dissecto, this collaboration is a concrete step in executing our strategic expansion: We are extending our proven methodologies from automotive into industrial IoT and further into domains like medical and defense, where regulatory pressure and connected complexity are converging.
Revolution Pi has been deployed across industrial IoT environments since 2016 – from energy management systems and smart infrastructure solutions to factory automation, and intralogistics. These systems are becoming increasingly critical and will also need to meet upcoming cybersecurity requirements.
But our focus remains unchanged: helping organizations move from static security claims to continuously validated, audit-ready security.

Do you have questions or need support?
We’re here to help! Contact us with any questions about our HydraVision Security Test Environment or our penetration testing services for ECUs, vehicle networks, and embedded systems.
Skillpoints to spend? Check out our Cybersecurity Workshops and ScapyCon, our annual conference for cybersecurity aficionados!

