{"id":7261,"date":"2026-05-04T14:16:41","date_gmt":"2026-05-04T12:16:41","guid":{"rendered":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/"},"modified":"2026-05-04T14:44:44","modified_gmt":"2026-05-04T12:44:44","slug":"schluss-mit-blindem-softwarevertrauen","status":"publish","type":"post","link":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/","title":{"rendered":"No more blind faith in software"},"content":{"rendered":"\n<h2 class=\"wp-block-heading has-text-align-left\"><strong>3S aims to make software security comprehensible, measurable and comparable for end users<\/strong><\/h2>\n  <figure  class=\"wp-block-image  wp-block-image--alignment-center wp-block-image--margin-bottom-default align align wp-block-cyberagentur-image\">\n    <div class=\"wp-block-image__image-wrapper \">\n      <img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"677\" src=\"\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-1024x677.png\" class=\"attachment-large size-large\" alt=\"With 3S, the Cyberagentur wants to make software security comprehensible, measurable and comparable for end users - beyond mere seals and certificates.\" srcset=\"\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-1024x677.png 1024w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-330x218.png 330w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-768x508.png 768w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-1536x1016.png 1536w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn-512x339.png 512w, \/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn.png 1920w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\n    <\/div>\n    <figcaption class=\"wp-element-caption\"><span class='description'>With 3S, the Cyberagentur wants to make software security comprehensible, measurable and comparable for end users &#8211; beyond mere seals and certificates.  <\/span> \n      \n      \n    <\/figcaption>\n  <\/figure>\n<p><strong>The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) published the call for proposals for the &#8220;Software Security Score (3S)&#8221; research program on 30 April 2026. The aim of the program is to make software security traceable, measurable and comparable. A virtual partnering event had already generated a great deal of interest in the run-up to the event and showed that there is a high demand in science and industry for viable solutions for the systematic assessment of software security.  <\/strong><\/p>\n\n<p>With the published call, the Cyberagentur is taking the &#8220;Software Security Score (3S)&#8221; research program to the next phase. Interested stakeholders from science, industry and the start-up ecosystem can apply to participate until June 11, 2026. <\/p>\n\n<p>3S aims to take software security out of the realm of abstract seals of approval and individual criteria that are difficult to compare and transfer it into a comprehensible, reproducible and widely applicable evaluation logic. The focus is on the development of a new type of metric with which security-relevant properties of software can be systematically recorded and combined into a comprehensible score. The aim is no longer to describe software security only selectively or symbolically, but to make it differentiated and effectively assessable.  <\/p>\n\n<p>The background to the research program is the growing penetration of software in everyday life. Whether in banking applications, mobile services or networked devices in the home, it is often unclear to users how secure an application actually is. This lack of transparency makes decisions difficult, as does the enforcement of the legitimate interests of end users. 3S addresses precisely this weak point and aims to make security more tangible as a verifiable property in digital products and to put it in relation to the desired use case.   <\/p>\n\n<p>The underlying concept of security is deliberately broader than in many existing certification and labeling approaches. In the research program, security is not understood as a static state, but as a dynamic process that results from the context of use, the system environment, the interaction with other software and hardware and the entire life cycle of a product. The planned software security score must combine these factors in a form that is both technically robust and suitable for different application contexts. In addition, it is intended that parts of the assessment should be comprehensible or verifiable for users themselves.   <\/p>\n\n<p>The disruptive potential of the program lies in overcoming binary security logic. While conventional seals and certificates often only allow limited statements, 3S is intended to enable a graduated, transparent and reliable classification of software security. This not only provides users with guidance, but also provides a strategic impetus for manufacturers to integrate security into development processes earlier, more systematically and more comprehensibly.  <\/p>\n\n<p>The Cyberagentur had already held a virtual partnering event on February 5, 2026 in the run-up to the tender. The event was very well received. Researchers, companies, start-ups and other stakeholders from science and industry took the opportunity to discuss the program&#8217;s objectives, focus areas and framework conditions at an early stage. The event also served as a structured networking opportunity for potential participants and the initiation of possible bidding consortia. The high level of interest underlined that there is a considerable need for new, scientifically viable methods for evaluating software security and that there is a broad-based willingness to implement corresponding approaches in practice.    <\/p>\n\n<p>&#8220;With 3S, we addressed a central structural problem of the digital society: software security has so far been barely transparent for many users, often not sufficiently comparable for manufacturers, and only limited in its effectiveness for the market. The verifiability of the score is based on a seamless chain of custody that documents all underlying data, analysis processes and evaluation steps in a comprehensible and verifiable manner. The high level of interest in the run-up to the tender clearly showed that there is an enormous need for a reliable, quantitatively connectable assessment &#8211; and that there is also a great willingness to translate such approaches into concrete technical solutions,&#8221; said Lars-Martin Knabe, Research Officer for Secure Society at the Cyberagentur.<\/p>\n\n<p>With this call for proposals, the Cyberagentur provided further impetus for research at the interface of technological excellence, digital sovereignty and practical applicability. The 3S research program should not only contribute to a better understanding of software security, but also make it more effective, transparent and comparable in everyday digital life. <\/p>\n\n<p>The invitation to tender was published on e-Vergabe with the contract notice number <strong>CAEU-WD\/2026-015<\/strong><a href=\"https:\/\/www.evergabe-online.de\/tenderdetails.html?0&amp;id=855455\">(https:\/\/www.evergabe-online.de\/tenderdetails.html?0&amp;id=855455)<\/a>. The deadline for participation is <strong>15.06.2026 11:00 am<\/strong>. Interested research institutions and companies as well as start-ups can register their participation with immediate effect.   Participation is possible both alone and in a consortium.<\/p>\n\n<p><strong>Further information and registration:<\/strong><\/p>\n\n<p><a href=\"https:\/\/www.cyberagentur.de\/en\/programs\/3s\/\">https:\/\/www.cyberagentur.de\/programme\/3s<\/a><\/p>\n\n<p><a href=\"https:\/\/www.cyberagentur.de\/en\/press\/sicherheitsluecken-wachsen-schneller-als-der-code\/\">https:\/\/www.cyberagentur.de\/presse\/sicherheitsluecken-wachsen-schneller-als-der-code\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>3S aims to make software security comprehensible, measurable and comparable for end users The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) published the call for proposals for the &#8220;Software Security Score (3S)&#8221; research program on 30 April 2026. The aim of the program is to make software security traceable, measurable and comparable. A virtual [&hellip;]<\/p>\n","protected":false},"author":11,"featured_media":7262,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[126],"tags":[100,158],"class_list":["post-7261","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trustworthy-technical-value-chains","tag-security-gaps","tag-software-security-2"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>No more blind faith in software - Cyberagentur<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"No more blind faith in software - Cyberagentur\" \/>\n<meta property=\"og:description\" content=\"3S aims to make software security comprehensible, measurable and comparable for end users The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) published the call for proposals for the &#8220;Software Security Score (3S)&#8221; research program on 30 April 2026. The aim of the program is to make software security traceable, measurable and comparable. A virtual [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/\" \/>\n<meta property=\"og:site_name\" content=\"Cyberagentur\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-04T12:16:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-05-04T12:44:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1270\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"ML\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"ML\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/\"},\"author\":{\"name\":\"ML\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"headline\":\"No more blind faith in software\",\"datePublished\":\"2026-05-04T12:16:41+00:00\",\"dateModified\":\"2026-05-04T12:44:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/\"},\"wordCount\":811,\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/20260429-SM-3S-LinkedIn.png\",\"keywords\":[\"Security gaps\",\"Software security\"],\"articleSection\":[\"Trustworthy technical value chains\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/\",\"name\":\"No more blind faith in software - Cyberagentur\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/20260429-SM-3S-LinkedIn.png\",\"datePublished\":\"2026-05-04T12:16:41+00:00\",\"dateModified\":\"2026-05-04T12:44:44+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/#primaryimage\",\"url\":\"\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/20260429-SM-3S-LinkedIn.png\",\"contentUrl\":\"\\\/wp-content\\\/uploads\\\/2026\\\/05\\\/20260429-SM-3S-LinkedIn.png\",\"width\":1920,\"height\":1270,\"caption\":\"With 3S, the Cyberagentur wants to make software security comprehensible, measurable and comparable for end users - beyond mere seals and certificates.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/press\\\/schluss-mit-blindem-softwarevertrauen\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"No more blind faith in software\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/\",\"name\":\"Cyberagentur\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.cyberagentur.de\\\/en\\\/#\\\/schema\\\/person\\\/97611132a009a9d7721aafd03e5b1942\",\"name\":\"ML\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"No more blind faith in software - Cyberagentur","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/","og_locale":"en_GB","og_type":"article","og_title":"No more blind faith in software - Cyberagentur","og_description":"3S aims to make software security comprehensible, measurable and comparable for end users The Agentur f\u00fcr Innovation in der Cybersicherheit GmbH (Cyberagentur) published the call for proposals for the &#8220;Software Security Score (3S)&#8221; research program on 30 April 2026. The aim of the program is to make software security traceable, measurable and comparable. A virtual [&hellip;]","og_url":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/","og_site_name":"Cyberagentur","article_published_time":"2026-05-04T12:16:41+00:00","article_modified_time":"2026-05-04T12:44:44+00:00","og_image":[{"width":1920,"height":1270,"url":"https:\/\/www.cyberagentur.de\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn.png","type":"image\/png"}],"author":"ML","twitter_card":"summary_large_image","twitter_misc":{"Written by":"ML","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/#article","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/"},"author":{"name":"ML","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"headline":"No more blind faith in software","datePublished":"2026-05-04T12:16:41+00:00","dateModified":"2026-05-04T12:44:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/"},"wordCount":811,"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn.png","keywords":["Security gaps","Software security"],"articleSection":["Trustworthy technical value chains"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/","url":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/","name":"No more blind faith in software - Cyberagentur","isPartOf":{"@id":"https:\/\/www.cyberagentur.de\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/#primaryimage"},"image":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/#primaryimage"},"thumbnailUrl":"\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn.png","datePublished":"2026-05-04T12:16:41+00:00","dateModified":"2026-05-04T12:44:44+00:00","author":{"@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942"},"breadcrumb":{"@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/#primaryimage","url":"\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn.png","contentUrl":"\/wp-content\/uploads\/2026\/05\/20260429-SM-3S-LinkedIn.png","width":1920,"height":1270,"caption":"With 3S, the Cyberagentur wants to make software security comprehensible, measurable and comparable for end users - beyond mere seals and certificates."},{"@type":"BreadcrumbList","@id":"https:\/\/www.cyberagentur.de\/en\/press\/schluss-mit-blindem-softwarevertrauen\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.cyberagentur.de\/en\/"},{"@type":"ListItem","position":2,"name":"No more blind faith in software"}]},{"@type":"WebSite","@id":"https:\/\/www.cyberagentur.de\/en\/#website","url":"https:\/\/www.cyberagentur.de\/en\/","name":"Cyberagentur","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.cyberagentur.de\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.cyberagentur.de\/en\/#\/schema\/person\/97611132a009a9d7721aafd03e5b1942","name":"ML"}]}},"_links":{"self":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/7261","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/users\/11"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/comments?post=7261"}],"version-history":[{"count":2,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/7261\/revisions"}],"predecessor-version":[{"id":7265,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/posts\/7261\/revisions\/7265"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media\/7262"}],"wp:attachment":[{"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/media?parent=7261"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/categories?post=7261"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cyberagentur.de\/en\/wp-json\/wp\/v2\/tags?post=7261"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}