White Papers

Onward Security analyzes the SBOM management countermeasures to resolve the cybersecurity breaches in the software supply chain step by step
Open Source Security

Onward Security analyzes the SBOM management countermeasures to resolve the cybersecurity breaches in the software supply chain step by step

As the epidemic accelerates digital transformation, cybersecurity threats continue to intensify. As a result, many countries or industries have introduced more stringent cybersecurity regulations, requiring manufacturers of networking equipment to establish a Software Bill of Materials (SBOM) as a basis to strengthen the security of the software supply chain.
Tso Jen Liu, Chief Technology Officer of Onward Security, said that it is impossible to rely on a single operation (such as testing) to ensure product security. Instead, it is necessary to inject a culture of cybersecurity into the organization, and achieve the goal through continuous operation and improvement.
It is worth mentioning that the United States, Canada, Europe, and even the Asia-Pacific region (such as Japan, South Korea, Singapore and Taiwan) have now issued regulations on software supply chain security. For example, Taiwan Ministry of Health and Welfare issued the "Guidance for Industry on Management of Cybersecurity in Medical Devices" in May 2021, which clearly requires manufacturers to provide SBOM as pre-market review information.

IoT Security Trend: Easily Addressing Open Source Software Security Blind Spots with Firmware Scanning.
Open Source Security

IoT Security Trend: Easily Addressing Open Source Software Security Blind Spots with Firmware Scanning.

After more than a decade of development, the application of open-source software has reached a mature stage. Starting from 2008, Gartner has released multiple research reports indicating that the proportion of open-source software in "business applications," "cloud computing services," and "information infrastructure" will continue to increase.

How to solve unknown cybersecurity vulnerabilities and threats? Understanding the fuzz testing
IoT Cybersecurity

How to solve unknown cybersecurity vulnerabilities and threats? Understanding the fuzz testing

In the past, hackers used to attack known vulnerabilities to achieve the purpose of intrusion, but now more and more attackers are gradually starting to use unknown vulnerabilities to launch zero-day attacks and their methods are gradually becoming mature. Attacking the defenseless IoT devices with malicious programs targeting unknown vulnerabilities has become the favorite of attackers.

Inquiry

Contact Us
Thank you for visiting us. Please leave your contact information, and we will reply you as soon as we can.
  • Onward Security is committed to your privacy. Your information won't be shared with third parties and is used to contact you about relevant content. You may unsubscribe at any time. For more info, please read our Privacy Policy. By clicking below submit button, you consent to allow Onward Security to store and process the personal information submitted above to provide you the content requested.

Why Onward Security

In-depth Cybersecurity Techniques+

  • Uncovered 40+ zero-day vulnerabilities (CVE)
  • Discovered 3000+ IoT product vulnerabilities

Dedicated to IoT Product Security+

  • 150+ cybersecurity projects in IoT industry
  • Tested 700+ IoT product security

Global Compliance and Certification Capability+

  • 300+ customers / 10+ countries certification obtained
  • Compliance experience in IIoT, medical, automotive, BFSI, and consumer IoT industry
Subscribe to Newsletter:

Verification

Click the numbers in sequence.

WeChat
This site uses cookies to improve your experience and to provide content customized specifically to your interests. By continuing to browse our site without changing your cookie settings (click the Privacy Policy button for more info), or by clicking the Continue button, you hereby acknowledge and agree to our privacy policy and use of cookies.