本網站使用瀏覽器紀錄 (Cookies) 來提供您最好的使用體驗,我們使用的 Cookie 也包括了第三方 Cookie。相關資訊請訪問我們的隱私權與 Cookie 政策。如果您選擇繼續瀏覽或關閉這個提示,便表示您已接受我們的網站使用條款。 關閉
SINGAPORE, July 22, 2024 /PRNewswire/ -- As the digital landscape evolves, the centralization of key cybersecurity assets within major tech conglomerates like Microsoft poses significant risks. The recent acquisition of CrowdStrike by Microsoft underscores the increasing monopolization in the cybersecurity sector, which could exacerbate vulnerabilities and create single points of failure. For ministers and CEOs, this consolidation necessitates a strategic pivot towards decentralized, secure cloud solutions to enhance enterprise-wide risk management (EWRM). The Critical Need for Decentralization: Leveraging ICP Utopia to Mitigate Cybersecurity Risks The Centralization Conundrum Centralization in cybersecurity, while providing some operational efficiencies, introduces substantial risks. When a single entity controls vast amounts of data and security infrastructure, it becomes an attractive target for cyber adversaries. The CrowdStrike acquisition by Microsoft illustrates this centralization trend, raising concerns about the increased vulnerability of consolidated cybersecurity assets (TechRepublic). Furthermore, centralized systems are more susceptible to systemic risks, where a breach in one part can have cascading effects across the entire infrastructure. The Case for Decentralization Decentralization disperses these risks by distributing data and security controls across multiple nodes, making it significantly harder for attackers to compromise the system as a whole. This approach aligns with the principles advocated by leading cybersecurity experts and institutions, emphasizing resilience and redundancy (CrowdStrike Holdings, Inc.). Decentralization enhances security by eliminating single points of failure and providing multiple layers of defense. The Role of Secure Cloud Solutions Secure cloud solutions, particularly those leveraging decentralized architectures, offer a robust alternative to centralized systems. ICP Utopia exemplifies this approach, providing a decentralized, secure cloud platform designed to meet the complex needs of modern enterprises and government institutions. Here's why ICP Utopia stands out: Distributed Security Architecture: By utilizing blockchain technology, ICP Utopia ensures data integrity and security through a decentralized framework, significantly reducing the risk of systemic failures and targeted attacks. Real-Time Threat Intelligence: ICP Utopia integrates advanced AI and machine learning to deliver real-time threat detection and response, ensuring proactive management of cybersecurity risks. Scalability and Flexibility: The platform is designed to scale effortlessly, accommodating the growing needs of organizations while maintaining robust security protocols. Interoperability and Integration: ICP Utopia's open-source framework allows seamless integration with existing systems, providing a flexible and adaptable solution that enhances current cybersecurity measures without requiring extensive overhauls. Understanding Internet Computer Protocol (ICP) The Internet Computer Protocol (ICP) represents a groundbreaking development in blockchain technology, providing a decentralized network that runs at web speed with unbounded capacity. Developed by the DFINITY Foundation, ICP aims to extend the functionality of the public internet, enabling it to host backend software, transforming it into a global computing platform. Key performance capabilities of ICP include: High Throughput and Low Latency: ICP can process transactions in seconds, supporting large-scale applications and services. Scalability: The protocol is designed to scale seamlessly, accommodating increasing loads without compromising performance. Interoperability: ICP can integrate with existing web standards and technologies, ensuring compatibility and ease of adoption for developers and organizations . Utopia: The ICP Intranet for Governments and Corporations Utopia is a specialized implementation of ICP, tailored to meet the stringent security and operational requirements of governments and large corporations. While retaining the robust features and strengths of ICP, Utopia offers a secure, decentralized intranet solution. It provides: Enhanced Data Sovereignty: Organizations can maintain control over their data, ensuring compliance with local regulations and standards. Robust Security: Leveraging ICP's decentralized architecture, Utopia provides strong defenses against cyber threats, reducing the risk of breaches and data loss. Operational Resilience: The decentralized nature of Utopia ensures continuous availability, even in the face of targeted attacks or systemic failures . Strategic Benefits of ICP Utopia For government and institutional leaders, adopting ICP Utopia presents several strategic advantages: Enhanced Security Posture: Decentralized architecture inherently provides higher security by distributing data and control, reducing the impact of potential breaches. Operational Resilience: The platform's design ensures continuous operation even in the face of attacks, maintaining critical functions and services. Cost Efficiency: By leveraging a decentralized cloud, organizations can reduce dependency on costly centralized infrastructures, optimizing their cybersecurity budgets. Conclusion In the face of increasing cyber threats and the growing centralization of cybersecurity assets, decentralization offers a viable path forward. ICP Utopia's decentralized, secure cloud platform provides a comprehensive solution to enhance enterprise-wide risk management. For ministers and CEOs, embracing such innovative technologies is crucial to safeguarding their organizations against sophisticated cyber adversaries and ensuring long-term operational resilience. By adopting ICP Utopia, organizations can mitigate risks, enhance security, and maintain trust in an increasingly interconnected digital world. For more information:UTOPIA: www.utopia.comICP: www.internetcomputer.orgDFINITY: x.com/dfinityICP Hub Singapore: x.com/icphub_sg
Affinidi Iota Framework disrupts how businesses gain insights about customers. The framework shifts the processing of queries to a personal data vault, providing transparency regarding what is disclosed through explicit consent. This grants individuals full control over how they are discovered and how they share information with others. Affinidi Iota framework democratises developers' access to data through modern and privacy-preserving open standards, including W3C Verifiable Credentials, DIF Decentralised Identifiers, OID4VP, OID4VCI, and Presentation Exchange format (PEX). BERLIN, SINGAPORE, BANGALORE, India, July 19, 2024 /PRNewswire/ -- Affinidi, a Singapore-based data and identity management company, launched the Affinidi Iota Framework built on open standards at the WeAreDevelopers World Congress. This innovative framework establishes a new way for individuals to share data by prioritising explicit consent, empowering individuals to selectively share specific data points with a clear understanding of their intended use. In the traditional digital landscape, individuals often share sensitive data with third parties without transparency or control, leaving their data vulnerable to misuse, unauthorised access, and data breaches. A Twilio report shows that 60% of Asia Pacific consumers demand consent and communication on data use, while a PwC study reveals a trust gap, with only 30% of consumers trusting businesses. Existing solutions exacerbate these issues by collecting vast amounts of individuals' data (essential/non-essential) and transferring it to back-end databases, burdening developers with managing large volumes of data and associated risks. Affinidi's Iota Framework disrupts this outdated model, pioneering a new era of data privacy and security. The Affinidi Iota Framework enables developers to request essential data points directly from individuals, with explicit consent, eliminating the need to collect and store non-essential information. This approach ensures individuals maintain control over their data, reducing storage burdens, and minimising risks associated with data collection and potential misuse. Affinidi equips developers with dev-friendly templates and robust tools, streamlining the setup of data-sharing processes. With our easy-to-use SDK, developers can navigate the complexities of identity, privacy, and security, building innovative solutions in just minutes. The Affinidi Iota Framework revolutionises data exchange between businesses and individuals by adhering to strict consent-first principles, providing businesses with richer, more accurate data that enhances personalisation, and fosters market innovation and competitiveness. Roopesh Shah, Co-Founder and CTO of Gro Club, India's first and largest bicycle subscription model that recently adopted Affinidi's solution for seamless integration, shared, "We began with Affinidi Login to simplify access to individual data through a one-click onboarding process. But with the introduction of the Affinidi Iota Framework, we are thrilled to advance beyond efficient customer onboarding, laying the groundwork for a future where every interaction is precisely tailored to individual preferences based on accurate and consented data." Built on Open Standards The Affinidi Iota Framework leverages cutting-edge technologies such as the DIF Presentation Exchange (PEX) protocol and the OpenID for Verifiable Presentations (OID4VP) specifications built on OAuth 2.0 to deliver a robust consent-first solution for a new way of data sharing. At the heart of the Affinidi Iota Framework is the DIF Presentation Exchange (PEX) specification. PEX, based on JSONPATH, serves as a standard query language for data exchange, enabling powerful filtering capabilities that accommodate simple and complex use cases. By defining data requests with a structured syntax, PEX simplifies data sharing, making specific data requests more seamless and efficient. Using standardised schemas ensures that queries are portable, allowing multiple developers and businesses to utilise them without reinventing the wheel. This streamlines the data exchange process and enhances interoperability across different systems. Building on the robust OAuth 2.0 authorisation framework, the OID4VP protocol provides a secure transport mechanism for Verifiable Presentations. Simply put, Verifiable Presentations extract specific information from Verifiable Credentials, like signed digital containers holding personal data (such as an ID or diploma). These presentations, shared as VP Tokens, ensure data authenticity and provenance. This groundbreaking feature enhances data safety, reducing risks of data breaches and fraud by sharing only necessary, verified information. It establishes transitive trust efficiently, maintaining high security and privacy standards within the Affinidi Iota Framework. The Affinidi Trust Development Kit (TDK), our SDK, is an open-source toolkit that enables developers to build privacy-preserving applications efficiently, aligning with complex and evolving standards. This streamlined solution integrates multiple elements to provide privacy functionalities without requiring workflow overhauls. By bridging Web 2 and Web 3 technologies, the framework leverages decentralised data stored in the Affinidi Vault for just-in-time data acquisition. It offers a range of modules, including clients for identity management, verifiable credential handling, and login configurations, ensuring flexibility and choice for developers. Supporting various programming languages such as TypeScript and Python facilitates seamless integration of Affinidi's trust services into applications. How it Works The Affinidi Vault is a secure personal data store where individuals can securely store their information. Developers need to create an Affinidi Iota Framework configuration to set up the basics required to query the data from the Affinidi Vault. After creating a configuration, developers can integrate the Affinidi Iota Framework into their application with the Affinidi TDK. This setup ensures that data is shared only with the explicit consent of the vault owner, empowering individuals with choice and control over the information they share while enhancing data privacy and security. This also simplifies real-time data acquisition, reduces complexity, and enhances trust and transparency. Revolutionising Data Exchange and Ownership Affinidi is leading a global movement to return data ownership to individuals through its Holistic Identity concept, addressing the fragmentation of digital identities across platforms. The release of the Affinidi Iota Framework marks another significant step towards achieving this vision. "In a new world where individuals can control their identity and data, we must redefine how information is shared. The Affinidi Iota Framework represents a major step forward in safeguarding privacy and consent by shifting information processing to the individual's personal data vault. Gone are the days of trusting third parties with sensitive documents like pay slips and bank statements just to open a bank account," said Glenn Gore, Chief Executive Officer of Affinidi. The beta version of the Affinidi Iota framework can be accessed through the Affinidi Portal. Learn more about the Affinidi Iota Framework here. About Affinidi Affinidi is a data and identity management company founded by Temasek in 2020 that aims to revolutionise data ownership for good through its Holistic Identity concept. Globally anchored in Singapore and supported by strategic hubs in Berlin, Ukraine, and Bangalore, Affinidi seeks to empower individuals, and enrich developers and businesses through its consent-driven and privacy-preserving solutions, rooted in trust and security. The Holistic Identity concept encompasses the complete spectrum of discovering, collecting, sharing, storing, and even monetising one's data in the digital world. Affinidi adopts an unwavering user-first approach, providing innovative developer tools with a 'privacy-by-design' philosophy within every layer of their tech stack. It emphasises and executes an end-to-end network trust known as the Affinidi Trust Network, underpinning a data environment that is secure and inherently interoperable. This commitment to decentralised identity management transcends borders and industries. Affinidi is actively pioneering the #ReclaimYourData movement through advocacy, partnerships, and education. Find out more here: https://www.affinidi.com.
SHENYANG, China, July 18, 2024 /PRNewswire/ -- In a recent report by IDC titled China Healthcare Security Administrating System Market Shares, 2023: Deepening Application, Neusoft Corporation (Neusoft, SSE: 600718) once again ranks first in China's healthcare security information system market share, reflecting its ongoing leadership in this field. Healthcare security informatization was the starting point of Neusoft's Big Health business strategic layout. Having been deeply engaged in the field for three decades, Neusoft witnessed the development process of China's healthcare security system, and has been empowering the establishment of the multi-tier and wide-coverage system with its innovative technologies, products, solutions and services. With rich experience and successful practice in healthcare security informatization, Neusoft has won widespread recognition and good reputation in the market. Meanwhile, Neusoft is actively developing systems for deepening application in the areas of data governance and public services, and integrating AI technology into healthcare security informatization, to lead the industry towards continuous innovation and advancement. Currently, Neusoft provides robust support in building China's unified national healthcare security information platform, as well as the healthcare security platforms in over 200 cities across 25 provinces. Neusoft is enhancing its R&D investment in AI technology, continuously exploring the innovative application scenarios and practices of healthcare security big data. Besides, Neusoft has recently introduced an integrated solution tailored for China's compact county-level medical community, facilitating total payment for healthcare security, to empower the development of county-level medical communities. Looking ahead, Neusoft will strengthen its digital and intelligent business layout and continue to engage deeply in building intelligent healthcare security information system, enhancing the accessibility and convenience of healthcare security services, to promote the digital and intelligent development of the industry. For more information about Neusoft, please visit www.neusoft.com
— As Council's Newest Associate Participating Organization, SequenceShift to Contribute to The Development of PCI Security Standards— SYDNEY, July 17, 2024 /PRNewswire/ -- SequenceShift, a global leader in Payment Card Industry (PCI) Compliance solutions for Amazon Connect Contact Centers, announced today that it has joined the PCI Security Standards Council (PCI SSC) as a new Associate Participating Organization. SequenceShift will work with the PCI SSC to help secure payment data worldwide through the ongoing development and adoption of the PCI Security Standards. The PCI SSC leads a global, cross-industry effort to increase payment security by providing flexible, industry-driven, and effective data security standards and programs. Global industry collaboration is critical to this mission. The Council's Participating Organizations program brings together industry leaders to strategize about how to protect payment data from the latest threats and to anticipate the needs of an ever-changing payment ecosystem. As an Associate Participating Organization, SequenceShift adds its voice to the standards development process and will collaborate with a growing community to improve payment security worldwide. SequenceShift will also have the opportunity to recommend new initiatives for consideration to the PCI Security Standards Council and share cross-sector experiences and best practices at the annual PCI Community Meetings. "In an era of increasingly sophisticated attacks on systems, PCI Security Standards and resources help organizations secure payment data and prevent, detect and mitigate attacks that can lead to costly data breaches," said Gina Gobeyn, Executive Director of the PCI Security Standards Council. "By joining as an Associate Participating Organization, SequenceShift has the opportunity to play an active part in improving payment security globally by helping drive awareness and adoption of PCI Security Standards." "Becoming an Associate Participating Organization with the PCI Security Standards Council is a significant milestone for SequenceShift. We are committed to advancing payment security standards and protecting sensitive data globally. By collaborating with the PCI SSC and industry leaders, we aim to leverage our expertise in PCI compliance for Amazon Connect contact centers. This partnership enables us to contribute to developing robust security standards and share best practices, ultimately enhancing the security of the entire payment ecosystem." — Dmitri Muntean, CEO, SequenceShift About the PCI Security Standards Council The PCI Security Standards Council (PCI SSC) leads a global, cross-industry effort to increase payment security by providing industry-driven, flexible and effective data security standards and programs that help businesses detect, mitigate and prevent cyberattacks and breaches. Connect with the PCI SSC on LinkedIn. Join the conversation on X (formerly Twitter) @PCISSC. Subscribe to the PCI Perspectives Blog. Listen to the Coffee with the Council podcast. About SequenceShift: SequenceShift is a global leader in PCI compliance solutions, recognized for its innovative and customer-focused services, streamlining the secure handling of payments in Amazon Connect contact centers globally. With its swift and effortless integration, AWS alignment, and commitment to transparency with pay-as-you-go pricing, SequenceShift continues redefining payment security standards in the digital age. Connect with SequenceShift on LinkedIn. Media contacts SequenceShift PCI Security Standards Council Website Alicia Malone +61 2 9163 3917 781-876-8917 communications@sequenceshift.com press@pcisecuritystandards.org
ADDISON, Texas, July 17, 2024 /PRNewswire/ -- Authentix, the authority in authentication and information services, announced that it has completed an Asset Purchase Agreement with Nanotech Security Corp. (NSC), a wholly owned subsidiary of Meta Materials Inc., acquiring certain assets of its authentication business unit with solutions for banknote authentication and brand protection markets for central banks, governments, and commercial brand owners. "This acquisition expands Authentix' portfolio and offerings in the Banknote, Currency, and Brand Protection business sectors and further compliments and leverages other business lines such as high security printing to support Authentix's ongoing growth in our authentication group covering central banks, governments, and commercial brand owners," stated Kevin McKenna, President and CEO of Authentix, adding that "Nano optic security is the next generation advancement in anticounterfeiting and authentication technology and puts Authentix in a unique position to continue as the industry leader in innovation." Authentix will continue to operate two key Canadian facilities of NSC in Burnaby, British Colombia and Thurso, Quebec as Authentix technology and manufacturing sites. Additionally, certain previous employees of NSC will become employees of Authentix and continue in key roles advancing the technology suite and expanding market share. About Authentix As the authority in authentication solutions, Authentix brings traceability to today's complex global supply chains. For over 25 years, Authentix has provided clients with physical and software-enabled solutions to detect, mitigate, and prevent counterfeiting and other illicit trading activity for currency, excise taxable goods, and branded consumer products. Through a proven partnership model and deep sector expertise, clients experience custom solution design and complete program management to ensure product safety, revenue protection, and consumer trust. Headquartered in Addison, Texas USA, Authentix, Inc. has offices in North America, Europe, Middle East, Asia, and Africa serving clients worldwide. For more information, visit https://www.authentix.com. Authentix® is a registered trademark of Authentix, Inc.
ROSH HAAYIN, Israel, July 17, 2024 /PRNewswire/ -- Waterfall Security is delighted to announce the launch of HERA™ - Hardware Enforced Remote Access, a new technology designed to enable safe and secure remote access into cyber-physical systems and OT networks. HERA allows organizations to reap the operational and economical value of remotely accessing and controlling OT devices and workstations, without introducing the risks that come with external connectivity. Remote access is one of the weakest links when it comes to OT cybersecurity. For cyber-physical systems and OT environments, "opening up" the OT network to external internet connectivity to enable remote access, is below the bar required to keep operations safe and secure. With Waterfall's new HERA solution, enterprise-grade remote access capabilities are enabled and secured with engineering-grade security. Leveraging Waterfall's battle-tested hardware platform, HERA physically maintains network segmentation, keeping OT environments safe and secured. "HERA represents a giant leap in how the industry approaches remote access into OT environments." explains Lior Frenkel, CEO and Co-founder of Waterfall Security. "By applying physical cybersecurity over cyber-physical systems, Waterfall Security's solutions enable zero compromise between industrial cybersecurity and functionality. Together with our market-leading Unidirectional Gateway technology, Waterfall Security provides a holistic solution for customers with OT environments and cyber-physical assets." HERA's patented technology has been designed from the ground up with OT cybersecurity in mind. It harnesses decades of know-how, expertise, and field-tested technology to deliver the safest solution to remotely access OT networks. About Waterfall Security Waterfall Security provides cyber-physical OT security that keeps our world running. For more than 15 years, critical industries and infrastructure have trusted Waterfall to guarantee safe, secure, and reliable operations. Waterfall's global install-base includes customers in national infrastructures, power plants, nuclear reactors, onshore and offshore oil & gas facilities, refineries, manufacturing plants, utilities, and more. Waterfall's patented technologies combine the benefits of both hardware and software to provide deterministic security that enable industrial operations and systems in today's, and tomorrow's, OT threat environment. Visit our website: waterfall-security.com
High Tech Security
請先登入後才能發佈新聞。
還不是會員嗎?立即 加入台灣產經新聞網會員 ,使用免費新聞發佈服務。 (服務項目) (投稿規範)