本網站使用瀏覽器紀錄 (Cookies) 來提供您最好的使用體驗,我們使用的 Cookie 也包括了第三方 Cookie。相關資訊請訪問我們的隱私權與 Cookie 政策。如果您選擇繼續瀏覽或關閉這個提示,便表示您已接受我們的網站使用條款。 關閉
LOS ANGELES, Dec. 10, 2024 /PRNewswire/ -- This holiday season, Reolink, an innovative leader in intelligent visual technology for the home, is extending warm wishes for a joyful and safe celebration. With heartfelt celebrations and meaningful connections in mind, Reolink now offers exclusive holiday deals of up to 31% off. Let's celebrate the spirit of togetherness while safeguarding homes! Season's Greetings at Your Doorsteps Add a festive touch to every visit with Reolink's Holiday-themed quick replies! Whether it's being away from home, welcoming friends, receiving deliveries, or turning away unwanted visitors, Reolink doorbells offer fun and thoughtful quick replies for every situation, spreading warmth and joy while keeping the doorstep secure. One of the recommendations is Reolink Doorbell WiFi, a smart 2K dual-band Wi-Fi doorbell with a full head-to-toe view. This doorbell makes everyday life easier and safer, with crystal-clear video to capture every detail at the front door, two-way audio for convenient conversations, and smart alerts to protect the security of deliveries during this busy holiday season. Now grab this exceptional doorbell at a 29% discount, available for $127.99. Gifts that Keep Your Loved Ones Safe Reolink also highlights its top-tier security cameras as ideal Christmas gifts for safeguarding loved ones and homes. Argus 4 Pro is an advanced 4K battery-powered camera with 180° all-around view. With innovative ColorX technology, it ensures clear and detailed views both day and night. This camera helps monitor the entire yard, offering peace of mind by keeping an eye on the property, even when the home is unoccupied during the holidays. Now available at a 23% discount, stands at $254.99. E1 Zoom is an indoor 5MP PTZ camera with person/pet detection and auto tracking capability. Whether it's keeping an eye on kids playing in the living room, automatically tracking the movement of a pet as it roams the house, or ensuring everything is secure when family members are away, this camera provides peace of mind. This camera also adds two more features of cry detection and privacy mode, which will available gradually over the next few weeks. Now available at a 25% discount, stands at $97.99. Join #reocap Fun Reolink not only offers amazing security camera deals this holiday season but also invites everyone to join the Reocap Challenge on social media from now to 20th December, for a chance to win Reolink's latest innovative cameras. Capture the magic moments of the holidays with Reolink cameras and just simply share them on social media (Instagram, TikTok, Youtube, X, or Facebook), tag with #reocap. Celebrate the season, enjoy unbeatable deals at Reolink.com and Amazon, and share unforgettable stories with #reocap today! About Reolink Reolink offers smart security solutions for homes and businesses, aiming for a seamless security experience with its wide range of products. Serving millions globally, it provides video surveillance and protection, standing out for its commitment to security technology innovation.
Independent Audits Confirm TraceLink's Compliance with Leading Global Security Standards, Ensuring Customer Data Protection BOSTON, Dec. 9, 2024 /PRNewswire/ -- TraceLink, the largest end-to-end digital network platform for intelligent orchestration of the supply chain, has reinforced its leadership in cybersecurity preparedness by completing independent audits for compliance with the International Organization for Standardization's (ISO) / International Electrotechnical Commission (IEC) 27001:2022 and 27017:2015, as well as Service Organization Controls (SOC) 2 / International Standard on Assurance Engagements (ISAE) 3000 Type II for Security, Availability, and Confidentiality. Validated by independent compliance assessor A-LIGN, these achievements demonstrate TraceLink's world-class security practices and unwavering commitment to protecting customer data, confirming that its information security management system, certified since 2018, complies with the latest version of ISO/IEC 27001 and maintains compliance with cloud-centric controls. Adding to this achievement, TraceLink earned a top-tier "mature" rating of 946/1000 in the CyberVadis Risk Management Assessment, underscoring the company's proactive and advanced approach to cybersecurity. These industry-leading compliance benchmarks assure customers that their supply chain data is safeguarded by the highest international standards. By maintaining robust security measures across its OPUS (Orchestration Platform for Universal Solutions) and cloud environments, TraceLink enables customers and their supply chain trading partners to focus on driving business growth with the confidence that their information is secure, compliant, and protected from evolving cyber threats. "These certifications reaffirm our commitment to protecting customer data with the highest standards of privacy, governance, and risk management," said Shabbir Dahod, President and CEO of TraceLink. "Independent validation that our rigorous security program covers even our newest OPUS platform and offerings provides customers with the transparency needed for confidence and trust." ISO/IEC 27001:2022 Certification Inclusive of ISO/IEC 27017:2015ISO/IEC 27001 is the world's best-known standard for information security management systems (ISMS). Certification demonstrates compliance with the requirements, principles, and best practices associated with the standard across a broad set of control domains further defined in ISO/IEC 27002:2022. ISO/IEC 27017:2015 provides additional guidance for companies with respect to cloud computing, expanding on the guidance provided in ISO/IEC 27002 and defining additional controls that specifically relate to cloud services. These certifications assure customers that their information is securely managed and controlled across all TraceLink services. SOC 2 / ISAE 3000 Type II AttestationEstablished by the American Institute of Certified Public Accountants (AICPA), the SOC 2 examination ensures organizations protect customer assets by reviewing their infrastructure, software, policies, and operations. Recognized globally, SOC 2 affirms adherence to rigorous security standards. Additional controls were included to ensure coverage with the ISAE 3000 framework for our international customers. This attestation demonstrates TraceLink's ongoing commitment to security, availability, and confidentiality, ensuring customers' data is protected within a secure, reliable, and compliant platform. CyberVadis Certificate of Security AssessmentCyberVadis is a trusted platform for third-party cybersecurity risk assessments, helping global companies mitigate supply chain cyber risks. Its scalable solution evaluates vendor cybersecurity maturity using a methodology based on international standards and frameworks. This certification underscores TraceLink's proactive approach to cybersecurity, assuring customers of resilient and secure supply chain operations. "The successful completion of these industry-leading audits demonstrates TraceLink's ongoing commitment to ensuring the security of our customers' data and their critical business processes," said Dan Nelson, CISO of TraceLink. "These audits serve as an essential external benchmark, validating the maturity of our security program and adherence to widely recognized frameworks." Earning such certifications and attestations positions TraceLink as a trusted partner in the supply chain industry, ensuring that organizations can rely on TraceLink for secure and compliant solutions to manage and orchestrate their supply chain networks effectively. Learn more about TraceLink's security certifications and attestations. About TraceLink: TraceLink Inc. is the largest end-to-end intelligent supply chain platform for life sciences and healthcare, enabling end-to-end orchestration by connecting more than 291,000 healthcare and life sciences entities through its B2N Integrate-Once™ network. Leading businesses trust TraceLink to deliver complete global connectivity, visibility, and traceability of healthcare products, ensuring that every patient gets the medicines they need when needed, safely and securely.
The newest product is the first to provide seamless discovery, classification, and enforcement of security controls for all privileged accounts, overcoming barriers that traditional Privilege Access Management (PAM) solutions do not offer GRAPEVINE, Texas, Dec. 9, 2024 /PRNewswire/ -- Gartner Identity & Access Management Summit -- Silverfort, the leading unified identity security company, today announced the launch of Privileged Access Security (PAS), a new way to secure privileged accounts faster and easier than ever before. Silverfort's PAS product discovers, classifies, and protects privileged accounts end-to-end by operating from within the Identity and Access Management (IAM) infrastructure itself. This results in rapid time-to-value and far broader protection that will not leave any privileged account behind. PAS can operate as a layer on top of any existing PAM solution, or as an alternative in places where PAM is too complex or expensive to implement. Unlike traditional PAM deployments that take months or even years, Silverfort's PAS can be implemented and activated within days, allowing companies to effectively address security and compliance gaps while saving significant time and costs. The identity security problem is rapidly escalating out of control: 8 out of 10 breaches leverage compromised identities and credentials, taking advantage of the countless silos and blind spots that the typical enterprise identity infrastructure suffers from. Privileged accounts—which have broad access permissions to sensitive information and can cause massive damage—are naturally the ones most targeted by attackers, yet many of them go unaccounted for and are not adequately secured. The rise of adversarial AI will only accelerate the rate of attacks, and their sophistication increases the threat to privileged accounts. Existing PAM solutions offer valuable security controls yet struggle to defend against today's threats effectively because they require lengthy and complex deployments, rely on manual discovery and onboarding, and allow admins and attackers to bypass them easily. Only 10.2% of organizations are able to bring their PAM onboarding project to the finish line. As a result, organizations are searching for new solutions that will provide broader and stronger security while requiring less time and effort to implement and use. "Securing privileged access has been one of the biggest challenges of the cybersecurity industry for decades, and solving it effectively in today's hybrid and complex enterprise environments pushed us to innovate and break free from the old limitations," said Hed Kovetz, CEO and Co-Founder of Silverfort. "We heard from many organizations about the same gaps that make their current PAM solutions too slow to implement and too narrow to stop today's threats and eventually found an innovative way to overcome these barriers. Our new PAS offering can operate on top of any existing PAM solution or as an alternative in places where PAM isn't implemented. In both cases, it provides broader coverage, adds new security controls designed to stop modern threats, and dramatically reduces time-to-value from years to days." "Managing privileged accounts is table stakes. The problem, however, is that the current set of solutions tends to be extremely manual, take forever to implement, and can't really help you find your unknowns," said Rob Larsen, the former Chief Security Architect at GM & Silverfort Advisor. "With Silverfort's unique technology, they've found an elegant, lightweight way for customers to discover unknown privileged accounts, tier them, and then secure them." Key capabilities of Silverfort's Privileged Access Security offering: Automate privileged account discovery and classification: Automatically and continuously discover all privileged accounts based on their attributes and activity — including ones they didn't know existed and no other solution could uncover. In addition, the new technology identifies privilege tiers and any misuse of privileged accounts outside of their permitted purpose, to help eliminate potential exposures. Enforce Least Privilege to prevent lateral movement and ransomware propagation: Take a Zero-Trust approach and prevent any misuse of privileged accounts, by automatically mapping where each account is being used and blocking access attempts that deviate from the account's intended purpose. Implement frictionless Just-In-Time (JIT) access at scale: Apply Just-In-Time Access to any account with a single click, without requiring onboarding efforts and without changing how admins work. PAS introduces a better, easier, and faster way to achieve Zero Standing Privileges at scale. Deploy and implement rapidly in days, not years. Silverfort's unique architecture enables incredibly fast time to value by enforcing security controls on top of the customer's existing identity infrastructure. Rapidly address security gaps, compliance needs, and cyber insurance requirements, while saving implementation costs and often reducing insurance premiums. One Platform to Protect All Identities, Including Privileged AccountsSilverfort's technology offers a unique and significant advantage over all other identity security providers, with its ability to seamlessly enforce security controls on top of the customer's existing identity infrastructure, including Active Directory, Entra ID, Okta, Ping, and many other IAM solutions. This enables Silverfort to secure all enterprise assets, including ones that no other vendor can protect, such as legacy systems, command-line interfaces, and IT/OT infrastructure. Silverfort's customers enjoy the benefits of having a single platform protecting their identities from compromise across all on-prem and cloud environments. The launch of PAS comes on the heels of Silverfort's acquisition of Rezonate, an innovator in Identity Security for cloud environments, and its $116M Series D funding in January 2024. The company continues to scale the business with over 100% year-over-year (YoY) growth, adding more than 100 new customers each quarter, including several Fortune 50 companies that trust Silverfort to protect their corporate identities. Book a meeting with us at the Gartner IAM Summit in Grapevine, TX, December 9-11, or visit booth #441. About SilverfortSilverfort, the Unified Identity Security company, pioneered the first and only platform that enables modern identity security everywhere. We connect to all the silos of the enterprise identity infrastructure to create a single, unified identity security layer across all on-prem and cloud environments. Our unique architecture and vendor-agnostic approach take away the complexity of securing identities and extend protection to resources that cannot be protected by any other solution, such as legacy systems, command-line interfaces, service accounts (non-human identities), IT/OT infrastructure, and more. Silverfort is a top-tier Microsoft partner and was selected as Microsoft's Zero Trust Partner of the Year. Hundreds of the world's leading enterprises trust Silverfort to be their identity security provider, including multiple Fortune 50 companies. Learn more by visiting www.silverfort.com or on LinkedIn. About Gartner Identity & Access Management SummitGartner analysts will provide additional analysis on identity and access technologies and strategies at the Gartner Identity & Access Management Summit taking place December 9-11 in Grapevine. Follow news and updates from the conferences on X using #GartnerIAM.
HAMBURG, Germany and LAGOS, Nigeria, Dec. 4, 2024 /PRNewswire/ -- Over 64 million Nigerians now conduct their banking transactions through accounts safeguarded by advanced biometric technology. This cutting-edge solution was developed by DERMALOG, Germany's leading manufacturer of biometric identification systems. In 2015, DERMALOG implemented a biometric system for 23 Nigerian banks and the country's central bank, enabling customers to register their accounts using fingerprint and facial recognition. By verifying identity through biometric features, subsequent transactions, such as deposits and withdrawals, can be completed quickly and securely. The identity verification system developed by DERMALOG is deployed nationwide in Nigeria. It plays a crucial role in combating fraud in the financial services sector and protecting account holders from unauthorized access to their savings. Additionally, the solution simplifies access to financial services for Nigerian citizens, marking a substantial stride towards greater financial inclusion. "Over the past decade, our innovative technology has made a vital contribution to enhancing security in Africa's largest economy. Our collaboration with the Nigerian banking sector is a prime example of how biometrics can streamline access to essential everyday services while significantly improving security," said Günther Mull, CEO of DERMALOG. DERMALOG is Germany's pioneer in biometrics and the country's largest manufacturer of biometric systems. Founded in 1995, the company develops fingerprint, facial, and iris recognition identification solutions. DERMALOG's technology is now used worldwide in more than 100 countries by 260 governmental authorities and companies for applications such as border control, ID issuance and banking services. Picture is available at AP. Caption: In 2015, DERMALOG implemented a biometric system for 23 Nigerian banks and the country's central bank, enabling customers to register their accounts using fingerprint and facial recognition. Press contact:Sven Böckler Media RelationsDERMALOG Identification Systems GmbH+49 (0) 40 13 227 0info@dermalog.comwww.dermalog.com
SINGAPORE, Dec. 4, 2024 /PRNewswire/ -- Vectra AI, Inc., the leader in AI-driven XDR (extended detection and response), has released its 2025 security predictions for Asia Pacific and Japan (APJ), highlighting the significant role Artificial Intelligence (AI) will play in cybersecurity and the growing focus on achieving measurable results. While Gartner projects IT spending to reach US$5.74 trillion in 2025, and IDC forecasts AI-related technology spending to hit US$337 billion, the initial excitement around AI is shifting towards a more pragmatic approach. As organisations integrate AI capabilities into their core operations, they are increasingly focused on accessing the business value of these investments. These predictions aim to assist CISOs in effectively allocating resources and anticipating potential attack vectors in 2025. However, Vectra AI warns of a growing fatigue with AI co-pilots as organisations in the APJ region grapple with high costs and a lack of demonstrated value. Sharat Nautiyal, Director of Security Engineering for APJ at Vectra AI states, "Organisations are adopting AI tools without understanding their intended purpose, leading to confusion about how these solutions address specific issues." Nautiyal adds, "Although AI has great potential, it is simply a toolset not a cure-all for cybersecurity problems. Organisations must evaluate strategies to effectively leverage AI for real challenges." He also notes that AI will increasingly be used by threat actors in the coming year. "All attacks will likely involve Generative AI (GenAI), facilitating infiltration and identity-based attacks. Methods like deepfakes and remote code exploits will evolve. As AI matures, these tactics will continue to advance." Nautiyal emphasizes that while compliance is essential, it does not equate to security. "Compliance offers basic guardrails, but compliance alone doesn't determine how a threat actor will behave. Good security posture is what matters." Lastly, Nautiyal comments that the marketing hype surrounding AI in cybersecurity has reached a peak – with many companies claiming to leverage AI capabilities without delivering on their promise. "Educating customers on genuine AI application is crucial as is rigorous testing to separate hype from reality. While AI drives innovation in threat detection and response, not all advancements are equally effective. Organizations must prioritize outcomes and stay focused, to avoid the pitfalls of marketing noise." Read on for more insights to Vectra AI's 2025 predictions: Prediction 1: Fatigue and confusion around the overuse of the term "AI" will push vendors to focus on demonstrating value The initial excitement about AI in cybersecurity will fade, leading to disillusionment among security leaders. While 87% plan to adopt more AI tools, there's cautious optimism due to concerns about increased workload. Organisations within Asia Pacific must move beyond vague promises of "AI-driven security" to deliver tangible results like faster threat detection and improved accuracy. AI is a toolset, not a one-size-fits-all solution. Understanding specific challenges is crucial; cybersecurity is about minimising risks and preparing for threats. Good hygiene and proactive threat response are essential – organisations need to practise identifying and responding to threats, ensuring they have the right protocols in place to catch attackers quickly and effectively. Prediction 2: Attackers are using AI to exploit vulnerabilities in security tools As attackers increasingly leverage AI, a divide will emerge between those who use it skilfully for adaptive attacks and those who employ it more simplistically. By 2025, threat actors are expected to exploit AI for initial access through tactics like deepfakes and sophisticated phishing. While AI will evolve, core attacker behaviors, such as establishing foothold and establishing a command-and-control tunnel, abusing identity, moving laterally etc will persist. This highlights the need for robust tools like Network Detection and Response (NDR) solutions, to effectively counter these evolving threats and enhance organisational security. Prediction 3: Focus on regulatory compliance overwhelms the defenders and provides advantages to the attackers The growing emphasis on regulatory compliance is overwhelming cybersecurity defenders, giving attackers an advantage. Security teams are stretched thin, prioritizing compliance over dynamic threat detection, which undermines proactive security. By 2025, attackers are likely to exploit this imbalance further. While compliance is essential for meeting regulations, it does not equate to security and often diverts focus from effective threat mitigation. Analyzing usage logs is important, but the key is how these logs are used to identify and respond to threats. Compliance and security must collaborate to strengthen defenses; compliance alone cannot replace robust security measures. Prediction 4: Identity will remain a critical attack vector Identity-based attacks will be a major concern in 2025, with attackers leveraging the dark web and GenAI to enhance phishing and business email compromise (BEC). Organisations must prioritise continuous testing for identity compromises, using dedicated red teams or third-party services, rather than relying solely on annual assessments. Open-source tools can simulate identity compromises, helping organisations prepare for real threats. As generative AI becomes more prevalent, robust identity management and security practices are essential to prepare for these evolving attacks. Prediction 5: Enterprise breaches will be traced back to AI agent abuse Agentic AI will increasingly analyse attack surfaces and existing threats, providing context and detecting natural-language based threats like phishing, which traditional models struggle with. As reliance on these sophisticated tools grows, organisations must prioritise the security and responsible use of their AI systems. Implementing robust safeguards and ethical guidelines will be essential to prevent misuse. Ultimately, integrating of agentic AI will enhance threat detection but foster a proactive security culture, enabling organisations to stay ahead of evolving cyber threats and better protect their critical assets. As AI continues to evolve, organizations must stay ahead of emerging threats by adopting strategic, outcomes-focused approaches to cybersecurity. Proactive measures, such as real-time threat detection and actionable insights, are essential for optimizing resources and effectively mitigating risks in an increasingly complex digital landscape.
INNSBRUCK, Austria, Dec. 3, 2024 /PRNewswire/ -- AV-Comparatives, a leading independent organisation for IT security testing, has published the results of its comprehensive 2024 phishing protection tests. Over the year, 1,000 phishing URLs were tested in four quarterly evaluations to measure the effectiveness of antivirus programs and web browsers in defending against phishing attacks. Avast and McAfee emerged as top performers, each achieving an impressive 95% detection rate, though McAfee had a higher number of false alarms. Link to test report: https://www.av-comparatives.org/wp-content/uploads/2024/12/gen_phishing_11-2024.pdf The tests were conducted using the latest versions of antivirus software on a standard computer to evaluate their ability to detect phishing websites while avoiding false positives on legitimate ones. Products tested included Avast Free Antivirus, Bitdefender Total Security, ESET HOME Security Essential, F-Secure Internet Security, G Data Total Security, Kaspersky Standard, Malwarebytes Premium, McAfee Total Protection, Microsoft Defender, and Trend Micro Internet Security. Web browsers such as Avast Secure Browser, Google Chrome, Microsoft Edge, Mozilla Firefox, and Opera were also evaluated. In the final quarterly test of 2024, which used 250 phishing URLs, Avast achieved the highest detection rate at 95%. Bitdefender, Kaspersky, McAfee, and Trend Micro also delivered strong results, demonstrating robust anti-phishing capabilities. Over the course of the year, Avast and McAfee maintained exceptional consistency, each achieving a 95% detection rate overall. G Data and Kaspersky also performed admirably, with scores exceeding 90%. McAfee's performance, however, was slightly impacted by a higher rate of false positives compared to other top performers. Phishing remains one of the most widespread cyber threats, using deceptive websites to steal sensitive information such as passwords, financial details, and personal data. These attacks can result in significant financial losses, identity theft, and malware infections. The insights from AV-Comparatives' phishing protection tests help consumers and businesses choose reliable solutions to reduce these risks effectively. Link to test report: https://www.av-comparatives.org/wp-content/uploads/2024/12/gen_phishing_11-2024.pdf About AV-Comparatives AV-Comparatives is an independent testing lab that evaluates antivirus software, internet security suites, and other cybersecurity products for performance, protection, and usability. ISO-certified, the organization is recognized as a trusted source of information for end-users, businesses, and the cybersecurity industry. For more information, visit https://www.av-comparatives.org. Disclaimer: Gen Digital Inc. (Gen) supported the test. The selection of products was done independently by AV-Comparatives, and all vendors were treated equally. Neither Gen nor any other tested vendor was pre-informed about the test date or given any further insights, in order to eliminate any potential advantage, influence or bias. AV-Comparatives is ISO-certified for the scope of "Independent Tests of Anti-Virus Software." Media contact: Peter Stelzhammer media@av-comparatives.org +43512287788
High Tech Security
請先登入後才能發佈新聞。
還不是會員嗎?立即 加入台灣產經新聞網會員 ,使用免費新聞發佈服務。 (服務項目) (投稿規範)