• Français
  • English

Library

Discover all our articles, whitepaper and guide

QShield

IoT Security Essentials: Navigating Challenges, CRA Regulation, & Best Practices

Webinar Replay

As IoT devices surge towards 29 billion by 2027, securing them is more crucial than ever.

From smart home appliances to network appliances, the risks are significant. This 30min webinar will cover:

  • Key security risks to address,
  • New regulations with a special focus on the EU’s Cyber Resilience Act (CRA),
  • Strategies to protect your IoT devices.

 

Watch the replay to gain practical insights to safeguard your IoT infrastructure.

EU Cyber
Resilience Act
(CRA)

A practical guide

On September 15th, 2022, the European Commission presented the Cyber Resilience Act (CRA) “to safeguard consumers and businesses buying or using products or software with a digital component”.

On October 10, 2024, the European Union Council officially adopted this Act, marking a crucial advancement in the security of digital products, including IoT devices.

If you’re involved in the digital products sector, download our comprehensive guide to better understand how to comply with this new regulation.

Radio Equipment
Directive
(RED)

Whitepaper

On 29th October 2021, the European Commission adopted a Delegated Act of the Radio Equipment Directive (RED), activating Article 3(3) to strengthen the cybersecurity of wireless devices and products and create a uniform regulatory framework for radio equipment in the European market.

From 1st August 2025, all wireless devices placed on the EU market must comply with these cybersecurity requirements.

Download this report to get more information.

Securing IoT and IIoT Protect your ability to innovate and grow

Whitepaper

Synonymous with innovative services, the rapid expansion of IoT and IIoT is also generating its share of cyber-risks and vulnerabilities that jeopardize not only data security and information confidentiality but also the image, activity, and very existence of the companies that market them and those of the organizations that use them.

Read the whitepaper to learn more about the associated risks through concrete, real-life examples of attacks, and get an overview of the best practices and solutions for protecting against these risks and implementing effective cyber-resilience strategies.

Protecting Viaccess-Orca video content

Case Study

The streaming video market is currently being boosted by mobile devices. Viaccess-Orca, one of the world’s leading providers of OTT and TV platform solutions, content protection and advanced data analysis solutions was looking for a way to protect video content. Read the case study to understand how Quarkslab has been  supporting Viaccess-Orca in its quest.

Protect your Applications with the PCI CPoC Certification

Whitepaper

Mobile payments growth shows no signs of stopping: it is forecasted to grow 23% annually until 2025. The development of mobile payment solutions offered to consumers has fueled this growth over the years, alongside the development and adoption of Near Field Communication (NFC) technology. Since the launch of Apple Pay in 2014, several solutions have been developed and are now available to consumers for making payments using their smartphones’ NFC modules, from Google Pay and Samsung Pay on Android devices globally to other regional initiatives.

Securing Mobile Payment Applications

Whitepaper

Payment systems are at the heart of the global economy. Over the last few decades, electronic payments have developed at an extremely rapid pace, displacing traditional payment systems such as cheques and cash. To learn more about the new risks and threats that have emerged since the advent of mobile payments, download our white paper.

Application Shielding and MovieLabs Enhanced Content Protection

Article

Application Shielding and MovieLabs Enhanced Content Protection : The global entertainment and media market reached a sheer size of 2.1 trillion dollars in 2018 according to the Global Entertainment & Media Outlook report by PwC. Content production grew as well over the years: Netflix has put out more than 1500 hours of series, films and other types of content on its platform in 2018.

How-to Guide :
Fuzzing

How to guide

Did you know the number of vulnerabilities found in software has recently doubled ? This is due to the increasing use of automatic vulnerability researching process called fuzzing. Implementing fuzzing tests early in a product development lifecycle is an efficient and cheap technique to identify bugs or security issues. Read the how-to guide to learn how to include automatic security testing in your development cycle.

QFlow

Fighting emerging challenges in malware analysis & threat hunting

Whitepaper

As technologies and business models evolved over the years, so did the threat landscape with ransomware, exfiltration and large-scale targeted attacks being added to the existing pool of threats that analysts have to monitor. Read the white paper to get an insight into the current state of affairs in cybersecurity and the different challenges security teams and organisations face today.

Automation of Security Analysis Workloads : Why and How ?

How to guide

Over the past decades the information security landscape has changed significantly but one thing has remained constant: a continuous increase in the number of different threats that a security team has to deal with per unit of time. Download the guide to learn more about how and why automate security analysis workloads and what to expect from software tools built for that purpose ?

Talk to our experts

Get in touch with our team for a platform demo.