ONEKEY in the news
Stay up to date with our latest press releases and see how ONEKEY is driving the conversation on product security and compliance
Latest Press releases
All Press releases

Automate Daily Vulnerability Chaos with ONEKEY
With more than 100 new software vulnerabilities (Common Vulnerabilities and Exposures) emerging every day, vulnerability management is becoming increasingly complex and time-consuming. Rule-based automation, validation, and clear documentation can significantly reduce both effort and cost. ONEKEY helps organizations address these challenges efficiently, saving substantial time, resources, and frustration in managing vulnerabilities.

Cybersecurity: Clear Lines of Responsibility Needed
ONEKEY IoT & OT Cybersecurity Report 2025: The Cyber Resilience Act (CRA) poses new challenges for organizations, particularly when it comes to defining responsibilities across departments and functions.

ONEKEY: Software Bills of Materials Are the New Security Passport
ONEKEY is expanding its security platform from detection to the holistic management of software vulnerabilities in smart products. Extended Software Bills of Materials become “security passports,” with integrated risk assessment and complete regulatory compliance documentation.

ONEKEY Significantly Simplifies Vulnerability Management
Over 40,000 software vulnerabilities per year: Manufacturers of connected devices can now automatically check if their products are affected by a new security vulnerability.

ONEKEY Report: Industry Needs to Catch Up On Cybersecurity Standards
ONEKEY IoT & OT Cybersecurity Report 2025: More than half of companies have begun to align with the EU Cyber Resilience Act, but there is still work to be done to put it into practice. Read the full press release!

Cybersecurity Report: Software Bills of Materials Are Key to Digital Resilience

Study: Final Push for the Cyber Resilience Act — Nearly Two-Thirds of Companies Still Unaware

New Automated Cybersecurity Testing for Embedded Software Available in Compliance with RED EN18031 Standard
With the new simplified, automated testing process, embedded software can be checked within minutes for potential vulnerabilities and non-compliance with the RED II, EN 18031-1 directive.

Top 1 Cyber Threat: Software Supply Chain Attacks Targeting Industry
The European Union Agency for Cybersecurity (ENISA) has identified software supply chain attacks as the top cyber threat – highlighting the urgent need to secure industrial IT and OT systems. The number of such incidents within the EU has more than doubled since 2020
Check out our other resources
Dive deeper into our knowledge center. Access expert insights, case studies, whitepapers, and more to stay ahead in product cybersecurity and compliance.

Ready to automate your Product Cybersecurity & Compliance?
Make cybersecurity and compliance efficient and effective with ONEKEY.




.avif)


