Tag Archives: HTS

Quantinuum Brings Quantum-Computing-Hardened Encryption Keys to the Device Level for the First Time – Introducing Quantum Origin Onboard

Critical software-based protection for a range of connected devices

LONDON and BROOMFIELD, Colo, June 14, 2023 /PRNewswire/ — Quantinuum, the world’s largest integrated quantum computing company, today announced the launch of Quantum Origin Onboard, an innovation in cryptographic key generation that provides quantum computing hardened cyber protection for a wide range of connected devices by maximizing the strength of keys generated within the devices themselves. 

The risk of cyberattacks compromising organizations continues to grow. As cybercriminals uncover new techniques to exploit connected systems and their data, even the cryptographic foundations of cybersecurity measures remain vulnerable to advanced threats. Cryptographic keys created using current typical methods deployed by organizations around the world are not provably unpredictable, leaving encrypted data and systems potentially at risk of devastating attacks. Quantinuum’s quantum-computing-hardened cryptographic key enhancement solution provably minimizes the risk that businesses generate and use vulnerable encryption keys to protect encrypted data.

“While quantum computing has the potential to render current encryption algorithms obsolete, posing a significant challenge to businesses and individuals alike, already today sophisticated attackers can take advantage of vulnerable encryption keys,” said Dr. Rajeeb Hazra, CEO of Quantinuum. “With our Quantum Origin Onboard and the overall Quantum Origin platform, organizations can fortify defenses across multiple endpoints and embrace the possibilities of a quantum-secure future. The next era of data security is here, and we are proud to be at the forefront as we collaborate with organizations worldwide.”

Strengthening encryption at the device level

Quantum Origin Onboard is the first and only commercially available enterprise software solution capable of delivering quantum-computing-hardened key enhancement. It can be installed directly onto devices and used to help deliver unparalleled foundational-level protection. Quantum Origin Onboard brings cutting-edge, enterprise-level security that integrates directly into connected devices without the need for additional hardware upgrades. This unique approach ensures that devices in any environment, online or offline, can generate quantum-computing-hardened keys to continually maximize the strength of encryption measures protecting devices.

Quantum Origin Onboard embeds a quantum seed, created by Quantinuum’s H-Series quantum computer, into devices. The seed is a string of provably unpredictable numbers, which enhance a device’s capability to generate strong and secure keys.

“Enterprises are recognizing they can build unprecedented resilience by adopting quantum-computing-hardened cryptographic keys,” said Duncan Jones, Head of Cybersecurity at Quantinuum. “This is a paradigm shift, and enterprises in critical industries are embracing the opportunity to minimize a risk to one of their attack surfaces, specifically device-level encryption on internet connected products that might be in the field for a decade.”

The growing security threat to embedded devices

The growing use of connected devices continues to underpin innovation across industries, from critical infrastructure to healthcare to transportation to energy. As adoption has risen, cybercriminals have increasingly targeted vulnerable interconnected devices, causing mass disruption. One of the most infamous examples of the power of IoT-based attacks is the Mirai malware that infected IP cameras and basic home routers, creating a botnet that compromised a leading Domain Name Systems provider, leaving many high-profile websites inaccessible.

Quantum Origin Onboard embeds an industry-leading security capability into connected devices, to strengthen device security against advanced cyber-attacks, by minimizing an exploitable cyber vulnerability. As the only software solution of its kind, it simplifies deployment and provides uninterrupted key generation for connected devices and the data they manage.

For more information, visit http://www.quantinuum.com/cybersecurity/quantumoriginonboard.

About Quantinuum 

Quantinuum is the world’s largest quantum computing company, formed by the combination of Honeywell Quantum Solutions’ world leading hardware and Cambridge Quantum’s class leading middleware and applications. Science led and enterprise driven, Quantinuum accelerates quantum computing and the development of applications across chemistry, cybersecurity, finance, and optimization. Its focus is to create scalable and commercial quantum solutions to solve the world’s most pressing problems, in fields such as energy, logistics, climate change, and health. The company employs over 480 people including 350 scientists, at nine sites in the US, Europe, and Japan. 

Sangfor Technologies Awarded by Frost & Sullivan for Providing World-class Cybersecurity, Cloud, and Infrastructure Solutions in Asia-Pacific

Sangfor Technologies delivers optimal cybersecurity tools, robust cloud computing, and superior infrastructure options to guarantee maximum growth for its customers, from small businesses to large corporations.

SINGAPORE, June 12, 2023 /PRNewswire/ — Frost & Sullivan recently researched the next-generation firewall (NGFW) industry and, based on its findings, recognizes Sangfor Technologies (Sangfor) with the 2023 Asia-Pacific (APAC) Company of the Year Award. Sangfor developed a comprehensive and highly differentiated portfolio of cybersecurity, cloud computing, and infrastructure solutions that protect global enterprises from today’s most critical cybersecurity threats.

Sangfor_Technologies_award
Sangfor_Technologies_award

The company stands out in an increasingly competitive environment due to its rapid responsiveness to new cybersecurity threats in the market and its large R&D investment. The company’s impressive growth is fueled by its customer-centric approach, which has successfully met the ongoing security demands of its customer base with a comprehensive cybersecurity portfolio that covers NGFW, network detection and response (NDR), secure web gateway (SWG), endpoint security, and secure access service edge (SASE) innovation solutions.

The foundation of Sangfor’s success lies in the ability to address emerging challenges of its clients effectively with its global customer service teams, offering 24/7 support with high-quality customer service, personalized on-site service support, live events, webinars, and other customer-centric initiatives. It has built a truly integrated customer support network of over 400 remote technical service centers, 6,500 certified engineers throughout 50 cities in the region, and a growing customer base of over 100,000 customers worldwide.

“With personnel covering strategic locations, Sangfor fosters close relationships with its clients and stays apprised of common customer challenges to incorporate their responses into its research and development process, resulting in a positive feedback loop,” said Martin Naydenov, senior industry analyst at Frost & Sullivan.

As a result, Sangfor has become one of the leading NGFW vendors in APAC. Sangfor NGAF (Next Generation Application Firewall) leverages state-of-the-art artificial intelligence (AI), real-time threat intelligence, and a rich database of malware signatures and malicious URLs to deliver enhanced detection accuracy. For example, Neural-X (one of Sangfor’s flagship innovations and a cloud-based threat intelligence and analytics platform) helps businesses capitalize on the insights and findings from an automatically updated global network of over 120,000 connected NGFWs and a database of 200 million malicious URLs. This ongoing innovation makes Sangfor’s platform a safe choice for existing and potential customers, and one of the strongest security-as-a-service offerings in the market.

“Sangfor’s combination of a centralized ecosystem, sophisticated AI, and tactical deception tools empowers organizations to significantly reduce their mean time to resolve (MTTR) and shift to a proactive security strategy,” noted Naydenov.

Each year, Frost & Sullivan presents a Company of the Year award to the organization that demonstrates excellence in terms of growth strategy and implementation in its field. The award recognizes a high degree of innovation with products and technologies, and the resulting leadership in terms of customer value and market penetration.

Frost & Sullivan Best Practices awards recognize companies in various regional and global markets for demonstrating outstanding achievement and superior performance in leadership, technological innovation, customer service, and strategic product development. Industry analysts compare market participants and measure performance through in-depth interviews, analyses, and extensive secondary research to identify best practices in the industry.

About Frost & Sullivan

For six decades, Frost & Sullivan has been world-renowned for its role in helping investors, corporate leaders, and governments navigate economic changes and identify disruptive technologies, Mega Trends, new business models, and companies to action, resulting in a continuous flow of growth opportunities to drive future success. Contact us: Start the discussion.

Contact:
Tammy Chan
E: tammy.chan@frost.com 

About Sangfor Technologies

Sangfor Technologies is a leading global vendor specializing in Cyber Security, Cloud Computing, and IT Infrastructure. Founded in 2000 and publicly listed since 2018 (STOCK CODE: 300454.SZ), Sangfor employs over 9,500 employees, operates 60 offices, and serves more than 100,000 customers worldwide, many of them Fortune Global 500 companies, governmental institutions, universities, and healthcare organizations. Visit www.sangfor.com to learn more about Sangfor’s solutions and let Sangfor make Your Digital Transformation Simpler and Secure.

Contact:
Sunny Sun
E: marketing@sangfor.com

Lacework Unifies Entitlements Management and Threat Detection for Simplified Cloud Security


New Cloud Infrastructure Entitlement Management (CIEM) capabilities are the company’s latest investment in cloud security on the Lacework platform

MOUNTAIN VIEW, Calif., June 6, 2023 /PRNewswire/ — Lacework, the data-driven security platform, today announced new CIEM functionality  that empowers teams to gain observability of all cloud identities, know precisely who can perform what actions, and easily identify which identities pose the greatest risk. Furthermore, Lacework’s actionable approach to CIEM provides customers with recommendations on how to reduce their identity risk. By combining these new capabilities with cloud security posture management, attack path analysis, and threat detection into a single platform, Lacework gives customers a clear understanding of their cloud identity landscape, visibility into cloud identity and access management (IAM) misconfigurations and exposed secrets, and continuous discovery of identity threats.

The benefits of public cloud come with complex challenges in managing identity risk. With over 35,000 granular permissions across hyperscale cloud providers, organizations struggle to limit unnecessary access. Most cloud users and instances are granted far more permissions than they actually need, leaving organizations highly exposed to cloud breach, account takeover, and data exfiltration. And the fact that machine identities in the cloud typically outnumber humans by an order of magnitude intensifies the issue.  

“Enforcing least privilege and having visibility of identities and entitlements is a top cloud security challenge for IDC clients. With this innovation from Lacework, security teams can automatically see which identities are overly-permissive, and zero in on the ones that pose the greatest risk,” said Philip Bues, Research Manager for Cloud Security, at IDC. “Beyond prioritizing risks, this will also allow teams to confidently suggest policy changes and reduce their overall attack surface risk.”

Preventing Cloud Identity Risk with New Entitlement Management Technology

Lacework dynamically discovers cloud user, resource, group and role identities and their net-effective permissions and then automatically correlates granted versus used permissions to determine identities with excessive privileges. The platform calculates a risk score for each identity, determines the riskiest identities based on attack path analysis, and auto-generates high-confidence recommendations for right-sizing permissions based on historical observations. This means Lacework not only informs customers of risky identities and entitlements, but also shows those identities that are hardly used or even need entitlements to begin with.

“CIEM is a vital facet of a comprehensive cloud security strategy,” said Paolo del Mundo, Director of Application Security, The Motley Fool. “It’s encouraging to see Lacework incorporating this into their well-rounded CNAPP solution, potentially providing a robust response to the challenge of managing cloud access permissions effectively.”

Combined with Lacework’s ability to prioritize risks from an attack path context, as well as detect user and entity behavior anomalies, customers are able to:

  • Continuously comply with IAM security and regulatory compliance requirements.
  • Identify cloud user, application and service identities, know exactly what actions each can take, and prioritize the identities that pose the greatest risk.
  • Limit the blast radius of compromised cloud accounts, achieve least privilege, and establish trust with engineering teams.
  • Continuously discover risky behavior, including lateral movement and privilege escalation, without needing to write rules or stitching together disparate alerts.
  • Rapidly detect insider threats associated with malicious or accidental abuse of permissions.

“Our customers need to know what entities are actually doing in their cloud and whether it’s malicious or inappropriate, and it can’t get in the way of their ability to move fast,” said Adam Leftik, Vice President, Product, Lacework. “Now Lacework customers can address both sides of the identity security issue with a single platform that prevents identity risk exposure and detects identity threats at scale, with the context to quickly investigate, prioritize, and respond to identity alerts. It’s the latest step in our mission to give enterprises the confidence to rapidly innovate in the cloud and drive their business forward.”

To learn more visit lacework.com.

About Lacework

Lacework offers the data-driven security platform for the cloud and is the leading cloud-native application protection platform (CNAPP) solution. Only Lacework can collect, analyze, and accurately correlate data — without requiring manually written rules — across an organization’s AWS, Azure, Google Cloud, and Kubernetes environments, and narrow it down to the handful of security events that matter. Security and DevOps teams around the world trust Lacework to secure cloud-native applications across the full lifecycle from code to cloud. Get started at www.lacework.com.

NTT SECURITY HOLDINGS 2023 GLOBAL THREAT INTELLIGENCE REPORT REVEALS ALARMING BLURRED LINE BETWEEN CYBERTHREATS AND REAL-WORLD IMPACT


Report contains global attack data collected and analyzed from January 1, 2022, to December 31, 2022.

TOKYO, May 31, 2023 /PRNewswire/ — From the disruption of fuel distribution to the interruption of emergency healthcare services, cyberattacks are no longer confined to cyberspace.

NTT Security Holdings 2023 Global Threat Intelligence Report Promotion
NTT Security Holdings 2023 Global Threat Intelligence Report Promotion

The recently released 2023 Global Threat Intelligence Report by NTT Security Holdings highlights the growing convergence of cyberthreats and their physical implications. This timely report sheds light on the most prevalent attacks of the past year and provides crucial recommendations to safeguard businesses from evolving threats. “In 2022, NTT Security Holdings observed continued attacks against organizations in the critical infrastructure and supply chain sectors. Impact on day to day life from nation-state and organized cybercriminals behind these threats increased significantly,” said Gregory Garten CTO, NTT Security Holdings. “The continued success of phishing and exploitation of older vulnerabilities highlight the skills shortage in cybersecurity and lack of proper attack surface management, underscoring the need for a mature and cohesive cyber defense solution.”

Key Insights from the 2023 Report

  • The integration of technology into infrastructure and supply chains made sectors like Technology, Manufacturing, and Transport/Distribution particularly vulnerable.
  • Attacks targeting cloud and Software-as-a-Service (SaaS) platforms continued to increase. In fact, web-based and desktop application threats accounted for a staggering 70% of attacks.
  • WordPress emerged as the most attacked Content Management System (CMS) software in the Americas, APAC (Asia Pacific), and EMEA (Europe, the Middle East, and Africa).
  • Banking Trojans experienced a slight decline from the previous year.
  • Attackers focused on high-impact vulnerabilities, with nearly 75% of them having critical- or high-severity CVSSv3 scores.

Despite significant efforts to disrupt and dismantle attacks, cyberthreats continue to evolve at a rapid pace. “Organizations around the globe must ensure that their cybersecurity measures keep pace to protect their infrastructure,” added Garten. “Our hope is that business and technical leaders leverage this report’s insights to plan and execute their security strategies.”

How to Access the Full Report

For a comprehensive understanding of the latest cyberthreat landscape, you can download the complete 2023 Global Threat Intelligence Report at https://www.security.ntt/global-threat-intelligence-report-2023

About NTT Security Holdings

NTT Security Holdings, a Group company, provides proactive cyber defense and services that make use of gathered human resources and intelligence to protect our customers and society. For more than 20 years, our company has helped clients protect their digital businesses by predicting, detecting, and responding to cyberthreats, while supporting business innovation and managing risk. Our SOC, R&D centers and security experts deliver unsurpassed threat intelligence and handle hundreds of thousands of security incidents annually. Together, we secure the connected future.

ABPCyber Unveils Cutting-Edge Cyber Fusion Centre, Ushering in a New Era of Cybersecurity Excellence and Global Expansion

SINGAPORE, May 30, 2023 /PRNewswire/ — ABPCyber, the premier cybersecurity service provider in Southeast Asia and subsidiary of ABPGroup, announced the inauguration of its state-of-the-art Cyber Fusion Centre. This momentous event not only represents a significant milestone in the company’s unwavering commitment to innovation and growth, but also sets the stage for global expansion in delivering exceptional cybersecurity services.

The management team of ABPGroup officiated the opening of the Cyber Fusion Centre
The management team of ABPGroup officiated the opening of the Cyber Fusion Centre

The Cyber Fusion Centre stands as an emblem of technological advancement, harnessing the latest tools, techniques, and expertise to deliver comprehensive cybersecurity services across diverse market segments, including sectors such as finance, utilities, healthcare, education, transportation, telecommunications, government, and large enterprises.

Distinguished by its multi-dimensional approach, the Cyber Fusion Centre surpasses conventional security operation centres by seamlessly integrating 24/7 security operations, advanced threat detection, in-depth investigation and response capabilities, robust vulnerability management, security controls validation, proactive threat hunting, and security automation. This fusion of capabilities equips organisations with an unparalleled defense against sophisticated cyber threats, ensuring uninterrupted operations and safeguarding valuable digital assets.

Daphne Ho, COO of ABPCyber, highlighted the company’s dedication to continued innovation in driving forward-thinking cybersecurity solutions. “The Cyber Fusion Centre represents the culmination of our relentless efforts to deliver exceptional cybersecurity services while propelling market growth. We are immensely proud of this achievement, as it not only solidifies our presence in Singapore and Asia but also paves the way for our global expansion under the umbrella of ABPGroup.”

The inauguration ceremony, graced by distinguished members of ABPGroup’s esteemed management team, served as a testament to this momentous occasion and provided a platform to showcase the Fusion Centre’s sophisticated infrastructure, underscoring its pivotal role in shaping the future of cybersecurity on a global scale.

About ABPCyber

ABPCyber is a premier cybersecurity service provider in Southeast Asia, founded in 2013 with a strong focus on safeguarding critical infrastructures. With tailored solutions catering to diverse sectors including finance, utilities, healthcare, education, transportation, telecommunications, and government, ABPCyber delivers comprehensive end-to-end services encompassing pre-sales consultation, implementation, proactive security monitoring, rapid incident response, and advisory support. Combining cutting-edge technologies and industry expertise, ABPCyber offers innovative cybersecurity solutions that empower organisations to combat evolving threats and achieve business resilience.

ABPCyber’s remarkable achievements have garnered industry recognition, including the prestigious Enterprise 50 Award, co-organised by The Business Times and KPMG, honouring outstanding contributions to business excellence and growth.

For more information, please visit www.abpcyber.com.

PKWARE Releases New Masking Solution Designed for Enforcing Complex Data Access Policies


Dynamic masking solution limits the exposure of sensitive data while maintaining the integrity of original source data

MILWAUKEE, May 16, 2023 /PRNewswire/ — PKWARE, a global leader in automated data security, today announced that it has released its newest data protection capability, PK Dynamic Masking. This solution is purpose built to mask sensitive data in real time as it is accessed based on user roles and policies, leaving the original information on the database untouched.

In the fast-paced business world, organizations need safe, real-time access to critical information. But protecting crucial sensitive data can create a complex problem in managing access rights that maintain compliance by masking access to some while delivering unaltered data to others.

PK Dynamic Masking—unlike static masking—does not change source data. Instead, it only masks requested data according to pre-determined data access policies based on the user’s role. Organizations can easily enforce complex data access policies that limit the exposure of sensitive data while ensuring that applications require access to actual production data operate as designed.

“PKWARE knows that when organizations look to invest in data protection, they don’t just want to minimize risk; they also need to reduce the burden of compliance. That’s where PK Dynamic Masking comes in,” said Jason Dobbs, Chief Technology Officer for PKWARE. “This new solution gives administrators more granular control of data masking across multiple databases with a single installation.”

This new release is available to PKWARE customers as of May 11, 2023.

About PKWARE
PKWARE offers the only data discovery and protection solution that locates and secures sensitive data to minimize organizational risks and costs, regardless of device or environment. Our ultra-efficient, scalable software is simple to use on a broad range of data types and repositories, enabling precise, automated visibility and control of personal data, even in the fastest-moving, most complex IT environments. With more than 1,200 customers, including many of the world’s largest financial institutions, retailers, healthcare organizations, and government agencies, PKWARE continues to innovate as an award-winning global leader in data discovery, security, and compliance. To learn more, visit PKWARE.com. 

Media Contact
PR@pkware.com

Computer Vision software developer VisualCortex joins Axis Technology Partner Program

VisualCortex joins Axis Technology Integration Partner Program to deliver computer vision software and video analytics solutions to Axis Communications’ global network of customers and partners across 50 countries

SYDNEY and LUND, Sweden, May 11, 2023 /PRNewswire/ — VisualCortex – the Video Intelligence Platform connecting computer vision’s potential to real-world business outcomes – has signed an agreement with Axis Communications, a leader in network video solutions, joining the Axis Technology Integration Partner Program.


Under the terms of the agreement, VisualCortex will make its video analytics technology – particularly its People Counting Solution and Vehicle Counting Solution – readily accessible to Axis Communications clients, partners and system integrators across the globe.

“As an Axis Technology Integration Partner, VisualCortex will provide dedicated integrations and support to enable Axis Communications’ global ecosystem to take full advantage of our platform approach to computer vision,” said VisualCortex CEO and Co-Founder, Patrick Elliott. “Axis Communications is a recognized leader in video surveillance and innovative network solutions. With a presence in over 50 countries, building the VisualCortex – Axis relationship is a vital part of our global growth plans and partner-based go-to-market strategy.”

“Axis’ channel-centric business model recognizes that the specialist knowledge and capabilities of partners like VisualCortex play a critical role in driving the shift from analog to digital video surveillance – something we’ve been doing for over 30 years,” said Regional Director for Oceania at Axis Communications, Wai King Wong. “Supporting vendors like VisualCortex to develop deep integrations to Axis devices has been a core part of Axis’ customer enablement strategy.”

“The Axis Technology Integration Partner Program is a powerful collaboration platform that provides our partners with the tools and resources needed to develop advanced video surveillance solutions that truly empower our customers,” said Wai King Wong. “The Axis Technology Integration Partner Program gives VisualCortex access to the tools, technical support and symbiotic marketing opportunities needed to deliver world-class video analytics solutions to our customers in quick-time. This strategic partnership marks a pivotal step in our global growth plans and partner-based go-to-market strategy, and we are excited to be working with VisualCortex to deliver cutting-edge solutions to our valued customers worldwide.”

About VisualCortex

VisualCortex is making video data actionable in the enterprise. Its Video Intelligence Platform provides the stability and flexibility to productionize computer vision technology at scale. Able to be used for any video analytics use case in any industry, VisualCortex’s production-ready cloud-based environment transforms video assets into analyzable streams of data.

The VisualCortex platform delivers the artificial intelligence smarts, governance and usability, enabling organizations to connect any number of video streams, repositories and use existing commodity hardware. An intuitive user interface, out-of-the-box reporting, range of configurations and integrations empower non-technical people to produce, analyze and act on insights derived from computer vision throughout the enterprise. Organizations can easily combine these AI-generated video insights with other data sources and systems to facilitate both real-time operations and strategic analysis. The VisualCortex Model Store also provides a secure marketplace for customers, partners and independent machine learning experts to share quality controlled computer vision models

For more information, visit www.visualcortex.com

About Axis Communications

Axis enables a smarter and safer world by creating solutions for improving security and business performance. As a network technology company and industry leader, Axis offers solutions in video surveillance, access control, intercom, and audio systems. They are enhanced by intelligent analytics applications and supported by high-quality training.

Axis has around 4,000 dedicated employees in over 50 countries and collaborates with technology and system integration partners worldwide to deliver customer solutions. Axis was founded in 1984, and the headquarters are in Lund, Sweden.

For further media information, interviews or images, or product demonstrations, please contact:

Lachlan James, VisualCortex Chief Marketing Officer, on +61 (0)431 835 658 or lachlan.james@visualcortex.com

For regular updates, follow VisualCortex on Twitter (@VisualCortexApp), LinkedIn (VisualCortex), YouTube (VisualCortex) and Facebook (@VisualCortexApp).

For regular industry news and analysis, subscribe to VisualCortex’s mailing list here: https://visualcortex.com/contact-us/

NordVPN Study: 90% of Hong Kong residents use smartphones while on the toilet

This is the biggest result compared to other countries surveyed

LONDON, May 9, 2023 /PRNewswire/ — A recent survey by the cybersecurity company NordVPN revealed that as much as 90% of Hong Kong residents bring their smartphones with them into the toilet. That’s the biggest result of all other surveyed countries. While most Hong Kong people (61.1%) scroll through social media during that time, barely anyone thinks of growing threats online and hackers’ attempts to compromise people’s phones.

Hong Kong people seem to need smartphones a lot. Our previous survey already showed that people of Hong Kong spend a lot of time online  more than 44 years per lifetime, which is a half of their lives,” says Ugne Mikalajunaite, a country manager for Hong Kong at NordVPN. “Even though the majority (80%) name smartphones as the device that tracks their online behavior the most, Hong Kong residents still haven’t developed good cyber habits to protect their online lives,” she says.

Using social media and gaming — top activities for Hong Kong residents while on the toilet

The majority of Hong Kong people admit that their time on the toilet is mostly spent scrolling through social media (61.1%), gaming (40.3%), and watching videos, movies, or television programs (36.5%).

Among other activities, Hong Kong residents also listen or read news (34.3%), call and message people (31.3%), and shopping online (21.4%).

Cybersecurity refresher for Hong Kong

Ugne Mikalajunaite, a country manager for Hong Kong at NordVPN, shares key tips on protecting your phone on and off the john:

  • Keep apps and the phone’s operating system (OS) up to date. Don’t skip software updates.
  • Do your research. Never download unknown apps — read up on them first.
  • Avoid unofficial app stores. They’re more likely to contain malware-ridden apps.
  • Avoid using unknown Wi-Fi. And always use a VPN when you do.
  • Be vigilant. Don’t click on suspicious links, don’t give out your number to strangers, and be wary of unknown numbers.

Methodology: The survey was commissioned by NordVPN and conducted by the external company Cint on February 13-22, 2023. The survey’s target group was residents of France, USA, the UK, Canada, Australia, Germany, Spain, the Netherlands, Poland, Lithuania, Hong Kong, Taiwan and Singapore aged 18+ (nationally representative), except for Lithuania (18-74) and the sample was taken from national internet users.

CYBERSEC 2023, the fastest growing and the largest cybersecurity exhibit in Asia, welcomes world-renowned cybersecurity experts and premium brands to Taiwan

TAIPEI, May 1, 2023 /PRNewswire/ — CYBERSEC 2023, organized by iThome, will kick off on May 9, running through May 11, at the Taipei Nangang Exhibition Center, Hall 2. For nine years running, CYBERSEC is the fastest growing and one of the largest and most professional cybersecurity exhibits in Asia. This year, the overall scale of the event is 30 percent larger than last year, with nearly 900 booths and more than 300 exhibiting brands. The three-day event will also showcase 15 concurrent conference sessions, and more than 200 domestic and foreign cybersecurity experts have been invited to share their experience and expertise. The exhibit, which is the largest CYBERSEC ever, is expected to attract more than 18,000 cybersecurity professionals from both Taiwan and overseas.

“CYBERSEC in Taiwan is not only an annual must-see event for cybersecurity professionals, but it has also gained increased international recognition over the years,” said Ann Gu, iThome managing director and CYBERSEC founder. Over the years, the conference organizer has invited world-renowned cybersecurity experts, including security guru Bruce Schneier, to Taiwan to share their experiences. This year, CYBERSEC 2023 invites world-renowned cybersecurity leaders and experts, including Janet Napolitano, former U.S. Secretary of Homeland Security and founder of the Berkeley Center for Security in Politics; Shane Huntley, Senior Director of Google’s Threat Analysis Group (TAG); Sounil Yu, creator and author of Cyber Defense Matrix (CDM); David Chow, Chief Technology Strategy Officer at Trend Micro; and Derek Manky, Chief Security Strategist and Global VP Threat Intelligence at Fortinet.

The theme of CYBERSEC 2023 is “Bring Security To.” “With the acceleration of global digitization, threats to cybersecurity have also emerged in applications where chips, codes, and networks are deployed. We need to integrate cybersecurity into all industries and everything as soon as possible, so that cybersecurity can become the DNA of corporate organizations and people’s lives to ensure a safe and secure future,” said Merton Wu, iThome editor-in-chief and CYBERSEC chairman.

Highlights of CYBERSEC 2023 include:

  • Cyber Taiwan Pavilion

More than 50 leading domestic cybersecurity brands will showcase Taiwan’s rich cybersecurity R&D capabilities and forward-looking solutions.

  • Asia Cyber Channel Summit

Cybersecurity channel distributors from Southeast Asia are invited to carry out in-depth face-to-face exchanges with their Taiwanese counterparts to identify the best business matches.

  • Cyber Talent

Exchanges on career development, skills training, and talent supply and demand will be carried out through theme-specific seminars, on-site recruitment, and functional assessment activities.

Cybersecurity experts will lead on-site drills to demonstrate cybersecurity attack and defense, threat hunting, forensic analysis, and blue team defense.

  • Over 30 cybersecurity forums

The diverse and wide-ranging topics include Blue Team, Red Team, DevSecOps & SecOps, Web3, Cyber Leadership, CISO, CMMC, AI security, Supply Chain security, FINSEC, Anti-Ransomware, Zero Trust, Cybersecurity Governance, Threat Research, security in Electric and Self-driving Vehicles, and other emerging cybersecurity issues.

Visit CYBERSEC 2023 website at https://cyber.ithome.com.tw/2023/en

Akamai Announces Brand Protector to Defend Against Phishing Attacks and Fake Websites

SINGAPORE, April 26, 2023 /PRNewswire/ — Akamai Technologies, Inc. (NASDAQ: AKAM), the cloud company that powers and protects life online, today announced the availability of Brand Protector, a new solution that detect and disrupt phishing sites, fake stores, and brand impersonations. Brand Protector enables organizations to retain and grow customer loyalty while minimizing loss, drops in productivity and bad customer feedback.

According to Google, over 50,000 new phishing websites are created every week. Akamai Brand Protector inspects trillions of digital activities a day across both internal and external sources to discover abuse of an organization’s brand – often before an attack campaign launches. This shields businesses from revenue loss and increased risk by combating fake goods sales, phishing sites and unauthorized use of brand elements outside of its environment and across the internet.

Brand Protector addresses the problem of fraudulent impersonations with a four-step approach:

  • Intelligence: As the world’s largest distributed edge and cloud platform, our proprietary view across the worldwide web traffic analyzes over 600 TB of data a day. The depth of intelligence in Brand Protector is enhanced with third-party data feeds for holistic visibility into attacker actions everywhere.
  • Detection: Today’s brand attacks automate the deployment of malicious, short-lived websites. Akamai Brand Protector traces live traffic to detect brand abuse often before a phishing campaign begins – instead of relying on refreshed lists or delayed feeds. The outcome reduces attack impact, protecting customers and brand trust.
  • Visibility: Customer-centric design gives security teams vital security insight in a single dashboard view. After receiving intelligence, data signals are run through a series of heuristic and AI detectors. Akamai’s simplified user interface provides an instant understanding of real-time threats to customers via impersonations. Findings are ranked by threat score and users click into an alert to view analyzed threat data including confidence score, severity rating, number of affected users and a timeline of attack events.
  • Mitigation: Integrated takedown services help close the loop to combat brand fraud. Brand Protector enables security teams to issue a takedown request of the abusive site right in the detection screen. Takedown requests for Brand Protector automatically attach the detection’s evidence and supporting details for ease of use.

“Attackers are increasingly abusing trusted brand names to lure end-users through phishing and fake sites for the promise of financial gain,” said Rupesh Chokshi, Senior Vice President and General Manager, Application Security at Akamai. “Detecting the rapid deployment of these attack campaigns and mitigating them can be a challenge for global brands. Brand Protector retains customer loyalty and revenue by addressing these external attack campaigns before they can gain momentum.”

To learn more about Akamai’s Brand Protector and other products and capabilities that empower customers to provide consistent online experiences, please visit: https://www.akamai.com/products.

About Akamai

Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. Akamai Connected Cloud, a massively distributed edge and cloud platform, puts apps and experiences closer to users and keeps threats farther away. Learn more about Akamai’s security, compute, and delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on Twitter and LinkedIn.

Source: Akamai Technologies, Inc.