• Français
  • English

Webinar Channel

Discover all our webinars, videos and demo in replay

QShield

IoT Security Essentials: Navigating Key Challenges, CRA, & Best Practices

Webinar

As IoT devices surge towards 29 billion by 2027, securing them is more crucial than ever.

From smart home appliances to network appliances, the risks are significant. This 30min webinar will cover:

  • Key security risks to address,
  • New regulations with a special focus on the EU’s Cyber Resilience Act (CRA),
  • Strategies to protect your IoT devices.

Watch the replay to gain practical insights to safeguard your IoT infrastructure.

Software Security
for data, firmware,
and applications

Webinar

Security in microcontrollers involves safeguarding code and data confidentiality and integrity.

Developers need plug-and-play solutions to protect assets like certificates, configuration files, cryptographic keys, billable data, AI learning and inference data, machine learning algorithms, and sensitive software code throughout the device lifecycle.

Security is essential; regulations like CRA, RED, IEC, and ETSI mandate proper protection against tampering. 

Intellectual Property Protection : an overview for Entrepreneurs

Webinar

Intellectual property attests that an entity has created innovation.

It allows the company that created the innovation to take ownership of it and to prove who it belongs to.

Thus, intellectual property provides an opportunity for companies to gain a competitive advantage and leverage their innovation as a source of revenue.

It is a valuable asset for a company that need to be protected.

Intellectual Property Protection : an overview for Entrepreneurs

Webinar

Intellectual property attests that an entity has created innovation. It allows the company that created the innovation to take ownership of it and to prove who it belongs to. Thus, intellectual property provides an opportunity for companies to gain a competitive advantage and leverage their innovation as a source of revenue. It is a valuable asset for a company that need to be protected.

 

Resecuring an IoT
fleet after its
market release

Demo

IoT Security is at the heart of cybersecurity discussions in 2022, particularly the debate between security by design and re-securing already deployed devices. While we advocate for integrating security from the design phase, there is also the challenge of securing devices that are already in use. How can we address vulnerabilities and ensure continued protection for devices that were not originally designed with security as a primary concern ?

How to archive
PCI CPoC
Compliance

Webinar

Released in 2019, PCI CPoC provided payment solution vendors a framework to develop secure Soft POS applications for contactless payments on mobile platforms.

Watch our 30-minute webinar to learn about:

  • the PCI CPoC standard and how to achieve PCI CPoC compliance efficiently.
  • key insights to ensure your Soft POS applications meet industry security requirements.

 

A story of how to comply with PCT PCoC quickly

Webinar

In the last decade, payments made from mobile devices have increased tenfold. However, solutions for merchants to accept these payments have not kept pace.

Why? Because mobile payments present a significant technical challenge, particularly in terms of security. Smartphones are not universally designed with security as a priority. Their versatility introduces higher risks: more features and functionalities can lead to more vulnerabilities that can be exploited.

Securing Mobile Payment Appliction

Webinar

Payment systems have drastically evolved over the years, incorporating new technologies to provide better user experience and facilitate transactions. The arrival of these technologies has introduced new risks and threats, particularly with the development of payments from mobile platforms.

Watch our 30 minutes webinar to learn more about :

  • Regulations and industry standards,
  • Technologies used to secure mobile payment applications.

QLab

Titan(ic) M: An analysis of Google's secure chip

Technical conference

In modern smartphones, vendors tend to rely on dedicated chips to improve the security of their devices. In 2018, Google introduced the Titan M chip in their Pixels, claiming it would make them their most secure smartphones ever.

This talk demonstrates how we studied this component starting from the limited information available and how we discover its role in the Android security model as well as its internals. We will share the story of how we ended up executing code on the chip and how this architecture indeed protected the device from a full compromise.

QFlow

Malware Protection
Made Easy

Webinar

Want your security team to focus on critical threats? 

Discover how you can leverage QFlow, our easy-to-use malware detection and analysis platform. 

With practical demos, learn how your SOC can:

– Detect malware quickly,
– Maintain security and privacy for sensitive data,
– Sanitize infected documents,
– Analyze threats safely,
– Manage multiple accounts and users.

Counter malware attacks
from files ?

Webinar

QFlow is an automated file analysis platform that identifies suspicious files to detect malware. Built using modern container orchestration and automation technologies, the platform includes multiple analysis engines with the ability to build on further and deploy custom detection methods and workflows. It is the ideal toolbox for security teams and MSSPs to automate workloads, improve threat detection and speed up file analysis for quicker resolutions to threats. Watch the demo to learn more about how QFlow can enhance your security posture!

Elevating Malware Detection-Key Use Cases

Webinar​

Looking to deploy effective malware detection and analysis for your security team?

Watch our webinar to discover real scenarios and leverage peer experiences to learn how to:

– Reprioritize alerts and threats,
– Optimize defense against various threats,
– Maximize the use of your current security tools,
– Enhance incident response and recovery efforts,
– Improve overall threat detection and analysis.

Ready to protect your most sensitive assets?

Get in touch with our team for a platform demo.