Ready to protect your most sensitive assets?
Get in touch with our team for a platform demo.
Discover all our webinars, videos and demo in replay
Webinar
As IoT devices surge towards 29 billion by 2027, securing them is more crucial than ever.
From smart home appliances to network appliances, the risks are significant. This 30min webinar will cover:
Watch the replay to gain practical insights to safeguard your IoT infrastructure.
Webinar
Security in microcontrollers involves safeguarding code and data confidentiality and integrity.
Developers need plug-and-play solutions to protect assets like certificates, configuration files, cryptographic keys, billable data, AI learning and inference data, machine learning algorithms, and sensitive software code throughout the device lifecycle.
Security is essential; regulations like CRA, RED, IEC, and ETSI mandate proper protection against tampering.
Webinar
Intellectual property attests that an entity has created innovation.
It allows the company that created the innovation to take ownership of it and to prove who it belongs to.
Thus, intellectual property provides an opportunity for companies to gain a competitive advantage and leverage their innovation as a source of revenue.
It is a valuable asset for a company that need to be protected.
Webinar
Intellectual property attests that an entity has created innovation. It allows the company that created the innovation to take ownership of it and to prove who it belongs to. Thus, intellectual property provides an opportunity for companies to gain a competitive advantage and leverage their innovation as a source of revenue. It is a valuable asset for a company that need to be protected.
Demo
IoT Security is at the heart of cybersecurity discussions in 2022, particularly the debate between security by design and re-securing already deployed devices. While we advocate for integrating security from the design phase, there is also the challenge of securing devices that are already in use. How can we address vulnerabilities and ensure continued protection for devices that were not originally designed with security as a primary concern ?
Webinar
Released in 2019, PCI CPoC provided payment solution vendors a framework to develop secure Soft POS applications for contactless payments on mobile platforms.
Watch our 30-minute webinar to learn about:
Webinar
In the last decade, payments made from mobile devices have increased tenfold. However, solutions for merchants to accept these payments have not kept pace.
Why? Because mobile payments present a significant technical challenge, particularly in terms of security. Smartphones are not universally designed with security as a priority. Their versatility introduces higher risks: more features and functionalities can lead to more vulnerabilities that can be exploited.
Webinar
Payment systems have drastically evolved over the years, incorporating new technologies to provide better user experience and facilitate transactions. The arrival of these technologies has introduced new risks and threats, particularly with the development of payments from mobile platforms.
Watch our 30 minutes webinar to learn more about :
Technical conference
In modern smartphones, vendors tend to rely on dedicated chips to improve the security of their devices. In 2018, Google introduced the Titan M chip in their Pixels, claiming it would make them their most secure smartphones ever.
This talk demonstrates how we studied this component starting from the limited information available and how we discover its role in the Android security model as well as its internals. We will share the story of how we ended up executing code on the chip and how this architecture indeed protected the device from a full compromise.
Webinar
Want your security team to focus on critical threats?
Discover how you can leverage QFlow, our easy-to-use malware detection and analysis platform.
With practical demos, learn how your SOC can:
– Detect malware quickly,
– Maintain security and privacy for sensitive data,
– Sanitize infected documents,
– Analyze threats safely,
– Manage multiple accounts and users.
Webinar
QFlow is an automated file analysis platform that identifies suspicious files to detect malware. Built using modern container orchestration and automation technologies, the platform includes multiple analysis engines with the ability to build on further and deploy custom detection methods and workflows. It is the ideal toolbox for security teams and MSSPs to automate workloads, improve threat detection and speed up file analysis for quicker resolutions to threats. Watch the demo to learn more about how QFlow can enhance your security posture!
Webinar
Looking to deploy effective malware detection and analysis for your security team?
Watch our webinar to discover real scenarios and leverage peer experiences to learn how to:
– Reprioritize alerts and threats,
– Optimize defense against various threats,
– Maximize the use of your current security tools,
– Enhance incident response and recovery efforts,
– Improve overall threat detection and analysis.
Get in touch with our team for a platform demo.