Discover all our articles, whitepaper and guide
A comprehensive suite of security solution to safeguard intellectual property, data, devices and software
Webinar Replay
As IoT devices surge towards 29 billion by 2027, securing them is more crucial than ever.
From smart home appliances to network appliances, the risks are significant. This 30min webinar will cover:
Watch the replay to gain practical insights to safeguard your IoT infrastructure.
A practical guide
On September 15th, 2022, the European Commission presented the Cyber Resilience Act (CRA) “to safeguard consumers and businesses buying or using products or software with a digital component”.
On October 10, 2024, the European Union Council officially adopted this Act, marking a crucial advancement in the security of digital products, including IoT devices.
If you’re involved in the digital products sector, download our comprehensive guide to better understand how to comply with this new regulation.
Whitepaper
On 29th October 2021, the European Commission adopted a Delegated Act of the Radio Equipment Directive (RED), activating Article 3(3) to strengthen the cybersecurity of wireless devices and products and create a uniform regulatory framework for radio equipment in the European market.
From 1st August 2025, all wireless devices placed on the EU market must comply with these cybersecurity requirements.
Download this report to get more information.
Whitepaper
Synonymous with innovative services, the rapid expansion of IoT and IIoT is also generating its share of cyber-risks and vulnerabilities that jeopardize not only data security and information confidentiality but also the image, activity, and very existence of the companies that market them and those of the organizations that use them.
Read the whitepaper to learn more about the associated risks through concrete, real-life examples of attacks, and get an overview of the best practices and solutions for protecting against these risks and implementing effective cyber-resilience strategies.
Case Study
The streaming video market is currently being boosted by mobile devices. Viaccess-Orca, one of the world’s leading providers of OTT and TV platform solutions, content protection and advanced data analysis solutions was looking for a way to protect video content. Read the case study to understand how Quarkslab has been supporting Viaccess-Orca in its quest.
Whitepaper
Mobile payments growth shows no signs of stopping: it is forecasted to grow 23% annually until 2025. The development of mobile payment solutions offered to consumers has fueled this growth over the years, alongside the development and adoption of Near Field Communication (NFC) technology. Since the launch of Apple Pay in 2014, several solutions have been developed and are now available to consumers for making payments using their smartphones’ NFC modules, from Google Pay and Samsung Pay on Android devices globally to other regional initiatives.
Whitepaper
Payment systems are at the heart of the global economy. Over the last few decades, electronic payments have developed at an extremely rapid pace, displacing traditional payment systems such as cheques and cash. To learn more about the new risks and threats that have emerged since the advent of mobile payments, download our white paper.
Article
Application Shielding and MovieLabs Enhanced Content Protection : The global entertainment and media market reached a sheer size of 2.1 trillion dollars in 2018 according to the Global Entertainment & Media Outlook report by PwC. Content production grew as well over the years: Netflix has put out more than 1500 hours of series, films and other types of content on its platform in 2018.
How to guide
Did you know the number of vulnerabilities found in software has recently doubled ? This is due to the increasing use of automatic vulnerability researching process called fuzzing. Implementing fuzzing tests early in a product development lifecycle is an efficient and cheap technique to identify bugs or security issues. Read the how-to guide to learn how to include automatic security testing in your development cycle.
A scalable threat detection solution to act quickly, minimize impact and ensure seamless performance and business continuity.
Whitepaper
As technologies and business models evolved over the years, so did the threat landscape with ransomware, exfiltration and large-scale targeted attacks being added to the existing pool of threats that analysts have to monitor. Read the white paper to get an insight into the current state of affairs in cybersecurity and the different challenges security teams and organisations face today.
How to guide
Over the past decades the information security landscape has changed significantly but one thing has remained constant: a continuous increase in the number of different threats that a security team has to deal with per unit of time. Download the guide to learn more about how and why automate security analysis workloads and what to expect from software tools built for that purpose ?