本網站使用瀏覽器紀錄 (Cookies) 來提供您最好的使用體驗,我們使用的 Cookie 也包括了第三方 Cookie。相關資訊請訪問我們的隱私權與 Cookie 政策。如果您選擇繼續瀏覽或關閉這個提示,便表示您已接受我們的網站使用條款。 關閉
Cybersecurity Experts Bolster Digital Transformation, Strengthen Corporate DefensesTAIPEI, TAIWAN - Media OutReach Newswire - 31 July 2024 - In response to global supply chain changes, Thailand, located at the center of ASEAN, has become a top choice for international manufacturers, promoting digital transformation across various industries. Digitalization inevitably increases cybersecurity risks, making supply chain security a top priority. As a high-tech stronghold, Taiwan has extensive supply chain cybersecurity experience and has nurtured numerous solution providers that are highly regarded internationally. 'Taiwan Cybersecurity Day' EDM To encourage the collaboration between Thailand and Taiwan in cybersecurity, Taiwanese corporations and associations have organized a delegation of renowned cybersecurity firms to Bangkok in early August. The delegation will lead several well-known Taiwanese cybersecurity companies to visit public associations in Bangkok and hold a 'Taiwan Cybersecurity Day,' sharing and exchanging Taiwan's expertise in supply chain cybersecurity and cybersecurity verification. The delegation will also discuss strategies for joint defense against cyberattacks and ways to enhance international cooperation. 'Taiwan Cybersecurity Day' will be held on August 7 (Wednesday) afternoon at The Berkeley Hotel Pratunam in Bangkok. The event will feature presentations from internationally acclaimed Taiwanese cybersecurity firms like CHT Security, Billows Technology, KeyXentic, Cycraft Technology, Array Networks Taiwan, PacketX Technology, SYSTEX Corporation, uniXecure Technology Corporation. They'll share insights on zero trust solutions, OT cybersecurity technology, professional cybersecurity management and detection services, etc. Invitations have been extended to exchange ideas with government officials, corporate executives, technical experts, and academic representatives. The event invites all interested in cybersecurity issues to join us in exploring how to maintain competitiveness and information security in the digital age. For more event details, please refer to the event page: https://reurl.cc/XG7KGD. Hashtag: #CISAThe issuer is solely responsible for the content of this announcement.
Cybersecurity Experts Bolster Digital Transformation, Strengthen Corporate DefensesTAIPEI, TAIWAN - Media OutReach Newswire - 30 July 2024 - In response to global supply chain changes, Malaysia has become a top choice for international manufacturers, promoting digital transformation across various industries. However, with the advancement of digitalization, cybersecurity risks have also increased, leading many international corporations to demand more robust supply chain cybersecurity. As a high-tech stronghold, Taiwan has extensive supply chain cybersecurity experience and has nurtured numerous solution providers that are highly regarded internationally. 'Taiwan Cybersecurity Day' EDM To encourage Malaysia-Taiwan collaboration in cybersecurity, Taiwanese corporations and associations have organized a delegation of renowned cybersecurity firms to Kuala Lumpur in early August. The delegation will visit public associations and host 'Taiwan Cybersecurity Day', sharing and exchanging Taiwan's expertise in supply chain cybersecurity and cybersecurity verification. The delegation will also discuss strategies for joint defense against cyberattacks and ways to enhance international cooperation. 'Taiwan Cybersecurity Day' is set for the afternoon of Monday, August 5, at the Pavilion Hotel in Kuala Lumpur. The event will feature presentations from internationally acclaimed Taiwanese cybersecurity firms like CHT Security, Billows Technology, KeyXentic, Cycraft Technology, Array Networks Taiwan, PacketX Technology, SYSTEX Corporation, uniXecure Technology Corporation. They'll share insights on zero trust solutions, OT cybersecurity technology, and professional cybersecurity management and detection services. Invitations have been extended to exchange ideas with government officials, corporate executives, technical experts, and academic representatives. The event invites all interested in cybersecurity issues to join us in exploring how to maintain competitiveness and information security in the digital age. For more event details, please refer to the event page: https://reurl.cc/MOqKk3 . Hashtag: #CISAThe issuer is solely responsible for the content of this announcement.
Tested cybersecurity solutions have undergone rigorous testing to ensure they meet the standards expected in today's challenging cyber threat landscape. "Certification from AV-Comparatives stands as a critical benchmark in the realm of cybersecurity, providing an indispensable measure of assurance for enterprise protection." — Peter Stelzhammer, co-founder AV-Comparatives INNSBRUCK, Austria, July 23, 2024 /PRNewswire/ -- AV-Comparatives, the leading independent testing institute dedicated to enterprise cybersecurity solutions, is pleased to show the results of the latest comprehensive evaluations. For over two decades, the lab has stood as a bastion of reliability and expertise in the cybersecurity domain, earning the trust of industry professionals and CISOs alike. AV-Comparatives' commitment to delivering unbiased, detailed analyses of security solutions is underscored by its ISO certification and the confidence vested in us by industry partners. AV-Comparatives Approves Cybersecurity Solutions In the most recent evaluation round, AV-C meticulously tested and certified the following 17 enterprise cybersecurity products. Read the detailed report here: https://www.av-comparatives.org/tests/business-security-test-2024-march-june/ Avast Ultimate Business SecurityBitdefender GravityZone Business Security PremiumCisco Secure Endpoint EssentialsCrowdStrike Falcon ProElastic SecurityESET PROTECT Entry with ESET PROTECT CloudG DATA Endpoint Protection BusinessK7 On-Premises Enterprise Security AdvancedKaspersky Endpoint Security for Business – Select, with KSCMicrosoft Defender Antivirus with Microsoft Endpoint ManagerNetSecurity ThreatResponderRapid7 InsightIDRSenseOn Platform with EPPSophos Intercept X AdvancedTrellix Endpoint Security (ENS)VIPRE Endpoint Detection & ResponseVMware Carbon Black Cloud Endpoint Standard Find here a list of certified cybersecurity vendors: https://www.av-comparatives.org/security-products-overview/ These solutions have undergone rigorous testing to ensure they meet the high standards expected by organisations in today's challenging cyber threat landscape. Each product was evaluated for its effectiveness in detection, management capabilities, resource usage, and overall impact on system performance. For journalists and media members seeking in-depth insights into these results, AV-Comparatives invites you to access the detailed findings on the website. The comprehensive report includes a thorough examination of each product's performance and capabilities, providing you with the necessary information to accurately inform the cybersecurity audience. Should you require further clarification or wish to delve deeper into our testing methodologies, we encourage you to email us at media@av-comparatives.org. Our team is readily available for discussions or to arrange a call, ensuring you have everything you need for your reporting. About AV-Comparatives: For over 20 years, AV-Comparatives has served as the premier independent testing institute for enterprise cybersecurity solutions. Our detailed, reliable evaluations and reports are the cornerstone for IT managers and CISOs worldwide in making informed decisions about endpoint security solutions. Certified by ISO and trusted by industry partners, our expertise is unparalleled in the field. Our mission is to deliver clear, concise, and comprehensive analyses without excessive jargon, empowering professionals with the information they need to secure their digital environments effectively. We look forward to continuing to serve as your trusted source for cybersecurity testing and analysis. https://www.av-comparatives.org/tests/business-security-test-2024-march-june/ With the rapidly evolving threat landscape, antivirus vendors face new and emerging challenges. The test report showcases how security products have adapted and enhanced their protection capabilities over the years. Peter Stelzhammer, co-founder AV-Comparatives:"Certification from AV-Comparatives stands as a critical benchmark in cybersecurity, providing an indispensable measure of assurance for enterprise protection. IT managers and CISOs must navigate an increasingly complex threat environment. By choosing solutions that have achieved our certification, they can be confident that these products have been scrutinised for performance and reliability, ensuring robust defence against a multitude of cyber threats. AV-Comparatives' meticulous evaluation process is designed to endorse products not only for their ability to detect threats but also for maintaining system efficiency and minimising false positives—criteria that underpin operational integrity and business continuity." What is included in the test report: Real-World Protection Test:This long-term test, which lasts four months, measures the ability of endpoint protection software to defend against Internet-based threats. Malware Protection Test:This test evaluates the ability of the tested products to detect and handle malicious programs that may be encountered on company systems, such as on the local area network or external drives. Performance Test:The performance test ensures that the tested products do not compromise system speed in favour of providing protection. False Positives Test:A False Positives Test is conducted for each protection test to verify that the endpoint protection software does not generate a significant number of false alarms, which can be disruptive in business networks. Product descriptions:The report also includes product descriptions with the key features of each tested solution. Like all AV-Comparatives' public test reports, the Enterprise & Business Endpoint Security Report is available universally and for free on https://www.av-comparatives.org Contact: Peter Stelzhammer e-mail: media@av-comparatives.org phone: +43 720115542 AV-Comparatives Approves Cybersecurity Solutions
SINGAPORE, July 22, 2024 /PRNewswire/ -- As the digital landscape evolves, the centralization of key cybersecurity assets within major tech conglomerates like Microsoft poses significant risks. The recent acquisition of CrowdStrike by Microsoft underscores the increasing monopolization in the cybersecurity sector, which could exacerbate vulnerabilities and create single points of failure. For ministers and CEOs, this consolidation necessitates a strategic pivot towards decentralized, secure cloud solutions to enhance enterprise-wide risk management (EWRM). The Critical Need for Decentralization: Leveraging ICP Utopia to Mitigate Cybersecurity Risks The Centralization Conundrum Centralization in cybersecurity, while providing some operational efficiencies, introduces substantial risks. When a single entity controls vast amounts of data and security infrastructure, it becomes an attractive target for cyber adversaries. The CrowdStrike acquisition by Microsoft illustrates this centralization trend, raising concerns about the increased vulnerability of consolidated cybersecurity assets (TechRepublic). Furthermore, centralized systems are more susceptible to systemic risks, where a breach in one part can have cascading effects across the entire infrastructure. The Case for Decentralization Decentralization disperses these risks by distributing data and security controls across multiple nodes, making it significantly harder for attackers to compromise the system as a whole. This approach aligns with the principles advocated by leading cybersecurity experts and institutions, emphasizing resilience and redundancy (CrowdStrike Holdings, Inc.). Decentralization enhances security by eliminating single points of failure and providing multiple layers of defense. The Role of Secure Cloud Solutions Secure cloud solutions, particularly those leveraging decentralized architectures, offer a robust alternative to centralized systems. ICP Utopia exemplifies this approach, providing a decentralized, secure cloud platform designed to meet the complex needs of modern enterprises and government institutions. Here's why ICP Utopia stands out: Distributed Security Architecture: By utilizing blockchain technology, ICP Utopia ensures data integrity and security through a decentralized framework, significantly reducing the risk of systemic failures and targeted attacks. Real-Time Threat Intelligence: ICP Utopia integrates advanced AI and machine learning to deliver real-time threat detection and response, ensuring proactive management of cybersecurity risks. Scalability and Flexibility: The platform is designed to scale effortlessly, accommodating the growing needs of organizations while maintaining robust security protocols. Interoperability and Integration: ICP Utopia's open-source framework allows seamless integration with existing systems, providing a flexible and adaptable solution that enhances current cybersecurity measures without requiring extensive overhauls. Understanding Internet Computer Protocol (ICP) The Internet Computer Protocol (ICP) represents a groundbreaking development in blockchain technology, providing a decentralized network that runs at web speed with unbounded capacity. Developed by the DFINITY Foundation, ICP aims to extend the functionality of the public internet, enabling it to host backend software, transforming it into a global computing platform. Key performance capabilities of ICP include: High Throughput and Low Latency: ICP can process transactions in seconds, supporting large-scale applications and services. Scalability: The protocol is designed to scale seamlessly, accommodating increasing loads without compromising performance. Interoperability: ICP can integrate with existing web standards and technologies, ensuring compatibility and ease of adoption for developers and organizations . Utopia: The ICP Intranet for Governments and Corporations Utopia is a specialized implementation of ICP, tailored to meet the stringent security and operational requirements of governments and large corporations. While retaining the robust features and strengths of ICP, Utopia offers a secure, decentralized intranet solution. It provides: Enhanced Data Sovereignty: Organizations can maintain control over their data, ensuring compliance with local regulations and standards. Robust Security: Leveraging ICP's decentralized architecture, Utopia provides strong defenses against cyber threats, reducing the risk of breaches and data loss. Operational Resilience: The decentralized nature of Utopia ensures continuous availability, even in the face of targeted attacks or systemic failures . Strategic Benefits of ICP Utopia For government and institutional leaders, adopting ICP Utopia presents several strategic advantages: Enhanced Security Posture: Decentralized architecture inherently provides higher security by distributing data and control, reducing the impact of potential breaches. Operational Resilience: The platform's design ensures continuous operation even in the face of attacks, maintaining critical functions and services. Cost Efficiency: By leveraging a decentralized cloud, organizations can reduce dependency on costly centralized infrastructures, optimizing their cybersecurity budgets. Conclusion In the face of increasing cyber threats and the growing centralization of cybersecurity assets, decentralization offers a viable path forward. ICP Utopia's decentralized, secure cloud platform provides a comprehensive solution to enhance enterprise-wide risk management. For ministers and CEOs, embracing such innovative technologies is crucial to safeguarding their organizations against sophisticated cyber adversaries and ensuring long-term operational resilience. By adopting ICP Utopia, organizations can mitigate risks, enhance security, and maintain trust in an increasingly interconnected digital world. For more information:UTOPIA: www.utopia.comICP: www.internetcomputer.orgDFINITY: x.com/dfinityICP Hub Singapore: x.com/icphub_sg
- S2W was invited as a key speaker on cybercrime prevention technology at a private conference organized by the UN Office on Drugs and Crime (ODC).- Held at the UN headquarters in New York on the 28th, the event saw presentations on cutting-edge AI technology capable of combating cybercrimes before investigative officers from 193 UN member countries.- S2W showcased pioneering technologies such as DarkBERT, the world's first AI language model tailored for the dark web, and AI chatbot DarkCHAT, solidifying its position as a global leader in AI and cybersecurity. IRVINE, Calif., July 2, 2024 /PRNewswire/ -- S2W Inc. has solidified its role as a pioneer in AI and cybersecurity with its recent engagement at the United Nations, where it presented on "AI Technology for Tracking Cybercrimes and Its Applications." The esteemed invitation came as S2W, a specialized data intelligence company led by CEO Sangduk Suh, took the stage as a keynote speaker at the UN Office on Drugs and Crime (ODC) conference. This gathering, held at the UN headquarters in New York on the 28th, convened investigative officers from 193 UN member countries to exchange insights and strategies crucial for tackling international crimes. S2W seized the opportunity to showcase cutting-edge methods and AI technologies, including 'DarkBERT,' the world's first AI language model designed specifically for the dark web. The UN ODC, established in 1997 to combat drug-related crimes and terrorism, annually hosts private conferences to discuss advancements in security technologies. This year's focus on "Use of Cybercrime Services by Terrorists and Extremists for Dark Web and Cyber Attacks" underscored the critical need for robust cybersecurity measures in a digital era fraught with sophisticated threats. S2W's participation marked a milestone, as it became the first Korean company directly invited by the UN to present its AI-driven crime-tracking solutions exclusively to UN investigative officers. This recognition highlights S2W's pivotal role in shaping global cybersecurity standards. Hyunmin Suh, Director of the S2W Business Center, delivered a keynote address emphasizing the escalating role of AI in dark web and Telegram crimes. He elaborated on how DarkBERT enhances cybercrime investigations, a groundbreaking technology jointly developed by S2W and KAIST and first unveiled at the prestigious ACL (Association for Computational Linguistics) conference. Furthermore, S2W captivated global attention with the introduction of 'DarkCHAT,' a ChatGPT-style chatbot integrated with DarkBERT within S2W's advanced deep dark web search solution, XARVIS. DarkCHAT's prototype demo at the Interpol Global Conference 'IGCC' garnered widespread acclaim, with its showcase video on S2W's official YouTube channel approaching 1.8 million views. Sangduk Suh, CEO of S2W, expressed pride in presenting their latest AI-driven cybersecurity advancements to a global audience of UN representatives united in combatting cybercrime. He affirmed S2W's commitment to continuous investment in research and development (R&D), reinforcing its position as a global leader and standard-setter in cybersecurity. Recently, S2W unveiled 'CyBERTuned,' a specialized AI language model for cybersecurity documents, at the prestigious NAACL conference. This release follows the success of DarkBERT, marking S2W's continued innovation in addressing the intricate nuances of cybersecurity challenges globally. About S2W Inc. S2W Inc. is a data intelligence company that was named one of the 'Top 100 Technology Pioneers' by the World Economic Forum (WEF) in 2023. As an 'AI and security specialized data intelligence company,' S2W is an official partner of INTERPOL, leveraging expertise that combines artificial intelligence, robust security technologies, and big data processing. The company has expanded into the U.S. (with a subsidiary), Singapore, Indonesia, and Taiwan markets, and has been featured at the world's top AI academic conferences for three consecutive years. The solutions offered by S2W include XARVIS and QUAXAR. XARVIS is an AI-based Cybercrime Intelligence Platform that leverages big data from covert channels such as the Dark Web and Telegram, which are prevalent with cybercrime, to provide essential intelligence crucial for safeguarding national security and ensuring public safety. QUAXAR is a Comprehensive Cyber Threat Intelligence(CTI) Platform that integrates Digital Risk Protection(DRP), Threat Intelligence(TI), and Attack Surface Management(ASM) solutions into a single, unified system. This robust platform empowers businesses to safeguard their critical internal assets and proactively address potential threats with immediately actionable intelligence.
CyberCore - Security Essentials (SEC-100) aims to help aspiring cybersecurity professionals prepare and compete for the most in-demand jobs NEW YORK, June 25, 2024 /PRNewswire/ -- OffSec, the leader in continuous cybersecurity workforce development, resilience, and learning, today announced the availability of CyberCore - Security Essentials (SEC-100), the company's first entry-level online cybersecurity training course and certification, OffSec CyberCore Certified (OSCC). OffSec CyberCore - Security Essentials (SEC-100) Certification Badge With the global cybersecurity workforce facing a critical shortage of skilled professionals, certifications for entry-level roles and aspiring cybersecurity professionals can play a pivotal role in mitigating this gap. OffSec, renowned for advanced cybersecurity certifications like the OffSec Certified Professional (OSCP) and OffSec Web Assessor (OSWA), is thrilled to introduce a new course and certification designed to provide hands-on training for entry-level cybersecurity professionals. CyberCore - Security Essentials is designed for recent graduates, IT professionals transitioning into cybersecurity, and those looking to start their careers in this dynamic and rapidly growing field. Additionally, for enterprises and other organizations faced with a cybersecurity talent shortage, CyberCore - Security Essentials can help upskill their teams and fill internal cybersecurity roles with well-trained professionals. OffSec elevates foundational training beyond typical industry courses by integrating hands-on labs into almost every module, ensuring that practical experience is a core component of the curriculum. Focusing on the core curriculum necessary for cybersecurity professionals, CyberCore - Security Essentials makes it easy for anyone to understand the impact of security across an organization and reinforces that understanding with hands-on training. "SEC-100: CyberCore - Security Essentials will help organizations fill the cybersecurity workforce gap, currently estimated by ISC2 at four million, by providing new entrants into cybersecurity the core knowledge and hands-on training they need to get started on the path to become successful cybersecurity professionals," stated Ning Wang, OffSec CEO. The course offers 12 months of online access to a wealth of course materials including 40 modules and hands-on labs, culminating in a 6-hour proctored exam. Upon passing the exam, learners will earn the OffSec CyberCore Certified (OSCC) SEC-100 designation, demonstrating their role-ready skills across multiple cybersecurity domains, including: Offensive techniques Defensive tactics Networking basics Scripting Application and operating system security Secure software and web development Cloud security Cyber risk management NIST Cybersecurity Framework AI in cybersecurity Job interview preparation SEC-100: CyberCore - Security Essentials, available for purchase at offsec.com/cybercore, is priced at $899. It includes 12 months of online access to course materials and hands-on labs, and two attempts at the proctored exam to earn the OSCC SEC-100 certification. For more information, also visit the company's CyberCore - Security Essentials blog post. About OffSecOffSec is the leading provider of continuous professional and workforce development, training, and education for cybersecurity practitioners. OffSec's distinct pedagogy and practical, hands-on learning help organizations fill the infosec talent gap by training their teams on today's most critical skills. With the OffSec Learning Library featuring 7,000 hours of content, including over 1,800 videos, and 4,200+ labs. OffSec demonstrates its commitment to empowering individuals and organizations to fight cyber threats with indispensable cybersecurity skills and resources. OffSec also funds and maintains Kali Linux, the leading operating system for penetration testing, ethical hacking, and network security assessments. For more information, visit offsec.com and follow us on X and LinkedIn. Contact: Scott Ablin s.ablin@offsec.com
A12 藝術空間
CyberSecurity
請先登入後才能發佈新聞。
還不是會員嗎?立即 加入台灣產經新聞網會員 ,使用免費新聞發佈服務。 (服務項目) (投稿規範)