Blog

Why did the European Commission delay the application of the essential requirements for RED-DA?
IoT Security

Why did the European Commission delay the application of the essential requirements for RED-DA?

As you may know the Radio Equipment Directive 2014/53/EU1 has established a regulatory framework for placing radio equipment on the single market. It mainly concerns mandatory market access conditions for radio equipment. The Delegated Regulation entered into force on the 1st of February 2022 and was supposed to become applicable from August 2024.

2023.07.27
How to comply with the mandatory cybersecurity regulation RED-DA in light of ETSI EN 303 645 standard becoming a global trend?
IoT Security

How to comply with the mandatory cybersecurity regulation RED-DA in light of ETSI EN 303 645 standard becoming a global trend?

According to the upcoming EU Radio Equipment Directive: the Delegated Act for cyber security, RED-DA Article 3.3 d/e/f, which will be enforced in 2025, strict requirements are set for market entry of wireless devices, including consumer IoT products.

2023.06.19
Cyber terrorists rock multi-billion-dollar industry, and the baby’s crib
IoT Security

Cyber terrorists rock multi-billion-dollar industry, and the baby’s crib

The plethora of security risks that sit at the nexus of artificial intelligence (AI) and the connected technologies that keep a watchful eye on our little darlings raise grave concerns for cybersecurity leaders and parents alike – rightfully so given our increasing reliance on them.

2021.12.07
Are CISOs fuzzing with IoT? We hope so.
IoT Security

Are CISOs fuzzing with IoT? We hope so.

Were we privy to the nefarious actor’s playbook, we would see that intruders and insider threats alike share a motif deeper than the enterprise’s bottom line — to compromise its unknown vulnerabilities — and they’re targeting the plethora of security risks in the Internet of Things (IoT) technology to get there.

2021.10.07
Security leaders scale cyber strategies to rival 5G threatscape
IoT Security

Security leaders scale cyber strategies to rival 5G threatscape

Fifth-generation mobile networks (aka 5G) have morphed into an evolving international battleground for foreign adversaries and cybersecurity leaders, but Daniel Liu, CTO at Onward Security, forecasts a promising security posture as organizations around the world ramp up their cyber strategies.

2021.07.12
Rapid development of 5G applications prompts urgent need for devices to obtain IoT cybersecurity certification
IoT Security

Rapid development of 5G applications prompts urgent need for devices to obtain IoT cybersecurity certification

Connected devices for a diversity of applications are burgeoning thanks to widespread availability of 4G communication. As these connected devices are everywhere in our daily lives, any product security vulnerability could result in data breach and comprise user privacy. With governments and leading enterprises around the globe stepping up cybersecurity efforts, manufacturers have begun to engage third-party cybersecurity test labs to help validate their security implementations.

2020.12.30
Critical vulnerabilities expected to ripple through the IoT landscape
IoT Security

Critical vulnerabilities expected to ripple through the IoT landscape

CISOs will tell you that weaving security controls into product development is a daunting challenge and failing to do so has detrimental consequences.

2020.12.11
Cybersecurity implementation and certification becoming the essentialities for IoT equipment
IoT Security

Cybersecurity implementation and certification becoming the essentialities for IoT equipment

With the increasing attacks on IoT devices, more and more IoT equipment are applied to different industries, the IoT security issue has attracted attention. Therefore, the cybersecurity standard implementation for IoT equipment has become crucial in recent years.

2020.10.29
Introduce the latest IoT device certification processes to deal with the frequent information security attacks
IoT Security

Introduce the latest IoT device certification processes to deal with the frequent information security attacks

Whenever emerging technologies and applications appear in the market, problems sometimes arise that were not thought of when they were originally planned. This is just like the launch of Internet of Things (IoT) products. They are accompanied by some security attacks such as the Mirai Botnet in 2016 [1]. When we discuss the security attacks on the IoT products, we often find that the attacks are because users have not changed the default password of the IoT product login page. Moreover, users do not fully understand and are unfamiliar with the functions provided by IoT products, so that these products with remote login functions are exposed on the Internet.

2020.07.14
Onward Security provides Asia's first Amazon, CTIA, ETSI EN 303 645 security assessment services
IoT Security

Onward Security provides Asia's first Amazon, CTIA, ETSI EN 303 645 security assessment services

With the world going digital, the popularity of Internet of Things (IoT) devices is rapidly rising. This is not only reshaping people's lives but also spurring a wave of new market opportunities. However, growingly widespread use of connected devices also leads to increased cybersecurity threats. To control cybersecurity risks, governments around the world are enacting cybersecurity laws while leading manufacturers are also implementing cybersecurity requirements for their products.

2020.07.09
Onward Security Connected Devices Secured
IoT Security

Onward Security Connected Devices Secured

In the IoT era, device manufacturers are strongly promoting network-enabled products while trying their best to shorten their time-to-market. In their effort to speed up product development, few blind spots in data protection indomitably arrive.

2020.06.24
How the diversified IoT devices comply with cybersecurity regulations
IoT Security

How the diversified IoT devices comply with cybersecurity regulations

Coming to 2020, the development of Artificial intelligence (AI) and 5G is still in full swing. At the same time that 5G is entering the commercial phase, the development of Internet of Things (IoT) with the strength of the hardware industry has also become more vigorous. With the popularity of IoT, the cybersecurity threats of edge devices have increased.

2020.03.30
Onward Security enables enterprises to win IoT business opportunities
IoT Security

Onward Security enables enterprises to win IoT business opportunities

Driven by the advancement of semiconductor manufacturing process and the increasingly robust cloud service, the adoption of Internet of Things (IoT) devices is growing steadily. What follows is that many security incidents that caused significant losses occurred due to insufficient product security, such as the Mirai Botnet that occurred in 2016.

2020.03.17

Inquiry

Contact Us
Thank you for visiting us. Please leave your contact information, and we will reply you as soon as we can.
  • Onward Security is committed to your privacy. Your information won't be shared with third parties and is used to contact you about relevant content. You may unsubscribe at any time. For more info, please read our Privacy Policy. By clicking below submit button, you consent to allow Onward Security to store and process the personal information submitted above to provide you the content requested.

Why Onward Security

In-depth Cybersecurity Techniques+

  • Uncovered 40+ zero-day vulnerabilities (CVE)
  • Discovered 3000+ IoT product vulnerabilities

Dedicated to IoT Product Security+

  • 150+ cybersecurity projects in IoT industry
  • Tested 700+ IoT product security

Global Compliance and Certification Capability+

  • 300+ customers / 10+ countries certification obtained
  • Compliance experience in IIoT, medical, automotive, BFSI, and consumer IoT industry
Subscribe to Newsletter:

Verification

Click the numbers in sequence.

WeChat
This site uses cookies to improve your experience and to provide content customized specifically to your interests. By continuing to browse our site without changing your cookie settings (click the Privacy Policy button for more info), or by clicking the Continue button, you hereby acknowledge and agree to our privacy policy and use of cookies.