Recent news and latest updates about DEKRA DIGITAL and our projects.

Delegated Act of the Radio Equipment Directive (RED)

Last week DEKRA members attended the RED Delegated Act meeting celebrated in Oslo. As the world becomes increasingly connected, Cyber Security is becoming more and more important. In order to ensure a safe and secure online environment, the European Commission has established a number of new regulations for Cyber Security as the NIS2 Directive, the […]

How to become … Head of Automotive Cyber Security

We are launching our new blog series “How to become…” to show you how our experts became who they became, what influenced their careers, and how they look into the future.Today, we want to start with a man who is a recognized expert in the automotive sector, Thomas Thurner, Head of Automotive Cyber Security at […]

MASA – Mobile Application Security Assessment

In a hyperconnected world, there are more than 5 billion mobile phone users interacting with each other using mobile applications. For this reason, it is crucial to ensure that the applications available in the Google Play Store follow the security best practices. To reach this goal the App Defense Alliance (ADA), through authorized labs, verifies […]

Mobile Application Security – Why independent 3rd party testing is important

Read more Last week we introduced the Mobile Application Security Verification Standard (MASVS) which intends to increase the security of mobile applications by providing a guide and metric for app development. But mobile application security doesn’t end with that. Read more In order to function properly, mobile application development requires software teams to configure a […]

Explaining OWASP and MASVS

Over 3.9 Billion people are using smartphones and there are more than 2.66 million applications available in the Google Play Store1 – the popularity of mobile devices and apps is constantly increasing. Besides the advantages of this trend, it also leads to a huge potential for security weaknesses. Consequently, the further development of security standards […]