Tag Archives: HTS

Cyble Triumphs Yet Again With 9 Category Wins at the Global InfoSec Awards 2023, Including Editor’s Choice for Cybersecurity Startup

Cyble recognized with 9 wins at the prestigious 11th Annual Global InfoSec Awards at #RSAConference2023

ATLANTA, April 25, 2023 /PRNewswire/ — Cyble, the Y Combinator-backed leader in AI-powered global cyber threat intelligence, today announced that it has been named a winner in 9 categories of the 11th Annual Global InfoSec Awards hosted by the Cyber Défense Magazine (CDM), the industry’s leading electronic information security magazine.  

Cyble recognized with 9 wins at the prestigious 11th Annual Global InfoSec Awards at #RSAConference2023
Cyble recognized with 9 wins at the prestigious 11th Annual Global InfoSec Awards at #RSAConference2023

The recognition further consolidates Cyble’s position as a global technology and cybersecurity leader and a trusted agile partner that empowers businesses with cutting-edge engineering solutions that ingest and enrich data using AI/ML and Natural language processing (NLP) technologies to offer over 40 different types of alerts across six use cases. Last year, in June 2022, Cyble swept the coveted Global InfoSec Awards 2022 – Editor’s Choice Threat Intelligence – with wins in 8 categories.

Founded in early 2019, Cyble has swiftly expanded into a team of top-notch cybersecurity specialists with global reach, supported by the industry’s leading figures. The company’s commitment to exploring new horizons in threat research and enhancing its AI/ML capabilities have led to its exceptional 3X growth from 2021 to 2023, with the world’s leading Fortune 500 companies turning to Cyble for their Threat Intelligence needs.

In March 2023, Cyble was recognized by Forbes as One of America’s Best Startup Employers 2023. Hot on the heels of their Forbes recognition and recent Cybersecurity Excellence Awards wins – taking home Gold for Best Threat Intelligence Platform 2023 and Fastest-growing Cybersecurity Companies in North America – Cyble has done it again, earning yet another impressive accolade.

“Cyble embodies three major features we judges look for to become winners: understanding tomorrow’s threats, today, providing a cost-effective solution, and innovating in unexpected ways that can help mitigate cyber risk and get one step ahead of the next breach,” said Gary S. Miliefsky, Publisher of Cyber Defense Magazine.

Please join Cyble at the #RSAC RSA Conference 2023 today and be a part of the company’s red-carpet experience. With a focus on gathering intelligence from the deep, dark, and surface web, the company has quickly established itself as one of the fastest-growing cybersecurity startups in the industry, known for its advanced threat research. The news of these wins at #RSAC 2023 closely follows the announcement of the former BookMyShow CTO Mahesh Vandi Chalil joining Cyble as its Chief Product and Technology Officer.

Beenu Arora, Co-founder and CEO of Cyble. “We’re thrilled to be recognized with one of the most coveted awards in the industry, and we couldn’t be happier to have been a part of the event by CDM. As CDM celebrates its 11th anniversary as an independent cybersecurity news and information provider, we sincerely congratulate them. The fact that CDM aims to showcase more innovative players with new and unique technologies makes this recognition all the more valuable to us.”

“We are honored and thankful to receive this recognition from Cyber Defense Magazine,” said Manish Chachada, Co-founder and COO of Cyble. “At Cyble, we are committed to addressing the modern, complex, and unprecedented cybersecurity challenges arising from the constantly changing threat landscape. These awards are a testament to our continued efforts towards securing governments, businesses, and individuals, even as we scale and grow.”

About Cyble:

Cyble (YC W21) is a leading global cyber intelligence startup that utilizes patent-pending AI-powered threat intelligence to help organizations manage cyber risks. With the ability to provide the fastest and most comprehensive coverage across adversaries, infrastructure, exposure, weaknesses, and targets from the deep web, dark web, and surface web, Cyble is quickly establishing itself as one of the fastest-growing cybersecurity startups in the industry, receiving recognition from Forbes and other esteemed organizations. Headquartered in Alpharetta, Georgia, and with offices in Australia, Singapore, and India, Cyble has a global presence.
To learn more about Cyble, visit www.cyble.com

For more information on this press release, please contact:
Email:      Enquiries@Cyble.com
Mobile:    +1 678 379 3241

About CDM InfoSec Awards

This is Cyber Defense Magazine’s tenth year of honoring InfoSec innovators from around the Globe. Our submission requirements are for any startup, early stage, later stage, or public companies in the INFORMATION SECURITY (INFOSEC) space who believe they have a unique and compelling value proposition for their product or service. Learn more at www.cyberdefenseawards.com

About the Judging

The judges are CISSP, FMDHS, CEH, certified security professionals who voted based on their independent review of the company submitted materials on the website of each submission including but not limited to data sheets, white papers, product literature and other market variables. CDM has a flexible philosophy to find more innovative players with new and unique technologies, than the one with the most customers or money in the bank. CDM is always asking “What’s Next?” so we are looking for best of breed, next generation InfoSec solutions.

About Cyber Defense Magazine

Cyber Defense Magazine is the premier source of cyber security news and information for InfoSec professions in business and government. We are managed and published by and for ethical, honest, passionate information security professionals. Our mission is to share cutting-edge knowledge, real-world stories and awards on the best ideas, products, and services in the information technology industry.  We deliver electronic magazines every month online for free, and special editions exclusively for the RSA Conferences. CDM is a proud member of the Cyber Defense Media Group. Learn more about us at https://www.cyberdefensemagazine.com and visit https://www.cyberdefensetv.com and https://www.cyberdefenseradio.com to see and hear some of the most informative interviews of many of these winning company executives.  Join a webinar at https://www.cyberdefensewebinars.com and realize that infosec knowledge is power.

Source: Cyble Inc.

AiDot Passes ISO 27017 and ISO 27018 Audit, Showing Cloud Safety, Privacy Commitments to End-users

LOS ANGELES, April 4, 2023 /PRNewswire/ — AiDot, an uprising star in smart home ecosystem, announces the successful passes on multiple ISO standard audits, including ISO 27001, the international information security management standard, ISO 27017, the international cloud environment and information security control standard, and ISO 27018, the international cloud privacy protection standard for individual privacy. These certifications show AiDot’s further commitment to cloud safety, data security and privacy protection for all end-users and all WWA (Works With AiDot) partners.

AiDot and WWA(works with AiDot) partners.
AiDot and WWA(works with AiDot) partners.

To earn an ISO 27001 certification, a company shall ensure that all transactions and information exchange with shared partners are securely protected. It helps AiDot give partner organizations and customers greater confidence in their interaction with AiDot.

The ISO 27017 standard is built on the hallmark of ISO 27001 and adds further privacy control requirements on how a cloud service provider generates sensitive user-specific data, and how to store, manage, encrypt, transfer and delete such data while giving full notice to customers. Being Awarded with ISO 27001 certification is the highest level of acknowledgements from BSI, a worlding leading conformity assessment body, to AiDot for always chasing and practicing the best security practices.

The ISO 27018 certificate is directed to cloud-service provider specifically and is designed to stipulate the cloud protection framework for processing and storing Personal Identifiable Information (PII), which can be used to trace a person’s identity or link to a personal account.

AiDot believes that protecting partners and end-user’s privacy is the core of AiDot’s cloud service. Through mapping out applicable law in different countries and regions as well as complying with these global cloud safety hallmarks, AiDot acts as a leading safety compliance player and trusted partner in the cloud service marketplace. As of today, AiDot has gained the compliance of CCPA (California Consumer Privacy Act) and GDPR (General Data Protection Regulation) in over 120 countries.

As an AiDot cloud operation technology developer pointed out that, cloud service gives enterprises more agility for choosing working partners but it also poses new security and compliance challenge when it comes to cloud transfer and cloud layer governance. Thus, it is of utmost importance for a cloud service provider to offer cloud layer safety, operation security and data safety compliance through an integrated cloud service solution. By following the best security practices throughout the cloud structuring and software developing process, an enterprise would be able to offer a reliable and trustworthy cloud service for their clients and partners, like what AiDot is currently offering for Winees. “That’s why AiDot would always pass the most strict and leading third-party audits. We’re always dedicated to the most forerunning security practices in the industry and we’ll always build the trust between end-users and shared partners.”

About AiDot:

AiDot is a smart home platform that connects devices across brands and ecosystems. With AiDot, your home becomes a connected space that makes your life simpler, safer, and more entertaining.

The AiDot app is the central part of the platform for controlling all smart home devices installed in your home. No matter where you are, you can control “Works with AiDot” devices in your home, including lights, switches, outlets, cameras, sensors and household appliances, or create scenes and automation around your routines.

“Works with AiDot” (WWA) is a mark of interconnectivity across different brands and categories. You can easily control any product featuring the WWA label with AiDot app. Brands that have joined the AiDot ecosystem include well-known smart device brands, such as Linkind, OREiN, Mujoy, Winees, WELOV, Syvio, GoGonova, Ganiza, etc.

About Winees

Winees, a valued WWA partner of AiDot, leverages AiDot’s special edge on cloud safety to offer smart security cameras solution to all end consumers.

For more information, visit: www.AiDot.com

Lloyds Banking Group invests £10 million in digital identity company Yoti

  • Investment will be used to develop innovative technology that protects customers’ identities and personal data online
  • Lloyds Banking Group will support Yoti in developing a new, reusable digital identity proposition that will help combat the growing risks of identity fraud

LONDON, March 9, 2023 /PRNewswire/ — Lloyds Banking Group has invested £10 million in digital identity company Yoti, an investment which supports the development of innovative technology to keep people safe online, tackle the ever-growing risks of identity fraud, and give people more control over their personal data.

Lloyds Banking Group invests £10 million in digital identity company Yoti
Lloyds Banking Group invests £10 million in digital identity company Yoti

Yoti offer a range of digital identity solutions that make it simple for people and businesses to protect themselves online. This includes a free Digital ID app, which gives individuals a safe and instant way to prove their identity from their phone, with no need to show ID documents or share an excessive amount of personal data. Digital IDs are a UK government-approved form of identification for right to work, right to rent and criminal records checks. Yoti’s Digital ID is also accepted as proof of age at UK cinemas,and for the sale of lottery tickets, energy drinks and tobacco. Businesses across a range of industries – from financial services and retail to gaming and e-commerce – are already seeing the benefits of Digital ID services.

The investment from Lloyds Banking Group will support Yoti’s development of a new reusable digital identity proposition that will complement Yoti’s existing solutions. Set to launch later this year, this will give users a more private, secure and convenient way to prove their identity.

Kirsty Rutter, FinTech Investment Director at Lloyds Banking Group, said: “We are thrilled to be supporting Yoti and their experienced, passionate team with their work to further protect people online, through developing and growing digital identity solutions.

“We know how important fintechs and technology partners are for delivering better outcomes for our customers and this investment represents another step forward in our plans to strengthen the UK’s financial ecosystem and is a crucial part of how we help Britain prosper.”

Robin Tombs, CEO at Yoti said, “I’m delighted to announce Lloyds Banking Group’s significant investment in Yoti. The combination of their expertise in financial services and our digital identity solutions will bring security to even more businesses, people and communities. We will make it easier and safer for individuals to prove who they are and enable businesses to have more trust and confidence in the identity of their customers.”

The investment in Yoti is Lloyds Banking Group’s second investment of 2023, following a successful round of investments in 2022. These investments are headed up by the Group’s recently formed Fintech Investment team, which focuses on identifying and exploring opportunities for investment into fintech at Seed to Series B.

Notes to editors:

With a reusable digital identity, individuals only need to verify their identity once and then share verified details in seconds, without needing to show their ID documents each time. Individuals can just share the details they need and nothing else – giving them greater control over their personal data. With individuals pre-verified, organisations can have greater confidence and trust in who they are dealing with.

About Lloyds Banking Group

Lloyds Banking Group is the largest UK retail and commercial financial services provider with around 26 million customers and a presence in nearly every community. Our main business activities include retail and commercial banking, general insurance, and long-term savings, provided through well recognised brands including Lloyds Bank, Halifax, Bank of Scotland, Scottish Widows.

Our purpose is helping Britain prosper. We have served Britain through our products and services for more than 320 years, across every community and millions of households. Our success is interwoven with the UK’s prosperity, and we aim to help Britain prosper by operating as a responsible, sustainable, and inclusive Group.

About Yoti

Yoti is a digital identity technology company that makes it safer for people to prove who they are, verifying identities and trusted credentials online and in-person. They now provide verification solutions across the globe, spanning identity verification, age verification, document eSigning, access management, and authentication and leading facial age estimation. Over 13 million people have downloaded the free Yoti Digital ID app across the world. It is available in English, Spanish, French, German, Portuguese and Polish. Yoti is certified to ISO/IEC 27001:2013 for ID Verification Services, ISAE 3000 (SOC 2) Type 2 certified for its technical and organisational security processes. For more information, please visit www.yoti.com.

press@yoti.com

Pentera Announces Speaker Lineup for XPOSURE SUMMIT 2023

Michelle McKenna, former CIO of Universal Studios and the NFL, and Partner at Evercore, kicks off XPOSURE, sharing best practices in building security operations as a business enabler

BOSTON and TEL AVIV, Israel, Feb. 17, 2023 /PRNewswire/ — The keynote speaker lineup for XPOSURE SUMMIT, the global forum bringing together security practitioners and leaders, was announced today.

The virtual event is hosted by Pentera, the leader in automated security validation, and will take place March 1, 2023. XPOSURE focuses on actionable methodologies for developing and executing successful Exposure Management strategies.

“I am thrilled to invite all the security professionals to join us for the industry’s 2nd XPOSURE SUMMIT,” said Amitai Ratzon, CEO of Pentera. “XPOSURE places the practical cyber exposure management and risk reduction practices center stage. We have assembled an incredible speaker lineup, featuring top security executives, hackers turned researchers, and security analysts who are setting the standards for managing security and business risks globally.”

Why attend XPOSURE?

As the attack surface continues to expand and our environments grow more complex, security professionals must move forward from traditional vulnerability-centric methods, to embrace a new approach that takes into account all possible threats and attack surfaces. Over the course of the virtual summit, attendees will benefit from deep-dive breakout sessions focusing on real world practices for threat exposure management.

This year’s XPOSURE SUMMIT boasts an impressive and diverse lineup of speakers, including:

  • Michelle McKenna, Former NFL CIO, CEO of the Michelle McKenna Collaborative, and a Partner at Evercore: An innovator who led massive security and technology transformations at Disney, Universal Studios and most recently the National Football League, Michelle will share her approach to ensuring security keeps pace with the speed of innovation.
  • Hector Monsegur, Ex-Anonymous/LulzSec Black Hat Hacker, Director of Security Research at Alacrinet: Once known by the online alias “Sabu” as a well-known hacker for Anonymous/LulzSec, Hector is a former black-hat hacker, turned security researcher. His session will showcase how hackers approach your organizational security for exploitation.
  • Matt Bromiley, SANS Analyst & Security Researcher, Lead Solutions Engineer at Lima Charlie: A noted cybersecurity educator and digital forensics and incident response expert, Matt will discuss the path of least resistance and how adversaries can abuse leaked credentials.
  • Mauricio Velazco, Principal Threat Research Engineer at Splunk: Mauricio is an information security professional with more than a decade of work experience across different roles on both offensive and defensive security. His session will focus on the use of automated security validation to stress test organizational defense.

Session Spotlight: What’s on the Agenda

  • Peer Showcases: Global brands, such as Groupe ADP, share their success stories and provide best practices for deploying exposure management strategies.
  • The State of Pentesting: As security validation moves to the forefront of the security discussion within the Exposure Management framework, this session will share insights from an original industry-wide survey of 300 security executives about the current and future developments in pentesting and security validation.
  • Modern Security Validation Fundamentals for Executives: An exploration of security validation as a method for identifying an organization’s exploitable security gaps across an ever-growing attack surface.
  • Pentera Labs Research: With hacker’s utilizing every security gap available to them, red-teamers on Pentera’s research team highlight relevant attack tactics that security professionals need to know about.

Registration for XPOSURE SUMMIT 2023 is now open. If you are interested in learning more and to register please visit: https://xposure2reg.pentera.io/.

Pentera is a member of the Cloud Security Alliance (CSA), and all sessions at XPOSURE SUMMIT can be redeemed for CPE credits.

About Pentera

Pentera is the category leader for Automated Security Validation, allowing every organization to test with ease the integrity of all cybersecurity layers, unfolding true, current security exposures at any moment, at any scale. Thousands of security professionals and service providers around the world use Pentera to guide remediation and close security gaps before they are exploited. For more info, visit: pentera.io

Media contact
Senior PR Manager
Noam Hirsch
Noam.Hirsch@pentera.io

Aratek TruFace: A Smarter Biometric Security Solution for Access Control

TAIPEI, Feb. 6, 2023 /PRNewswire/ — Aratek, a biometrics and security industry leader, has recently launched “Aratek TruFace,” a comprehensive biometric security solution designed to revolutionize access control security and maximize workforce efficiency.

The Aratek Truface biometric access control system provides you with cutting-edge facial recognition technology, offering you with unmatched protection in just minutes.
The Aratek Truface biometric access control system provides you with cutting-edge facial recognition technology, offering you with unmatched protection in just minutes.

The Aratek TruFace solution is the perfect way to keep your facility protected. With biometric access control, visitor management, and time attendance tracking capabilities, it’s a great fit for institutions in numerous industries like education, government, healthcare, business, law enforcement, retail, and hospitality.

Easy integration with your current security infrastructures 

The Aratek TruFace solution is a breeze to set up and use. “Our API and SDK make it super easy to integrate its applications with your security infrastructure, like video surveillance or alarm systems, plus HR management platforms like attendance tracking and payroll systems,” said Samuel Wu, Aratek’s VP for International Business Division.

“The Aratek TruFace provides a painless biometric access control and attendance tracking solution that anyone can use almost out of the box – without need for lengthy training or complicated set-up so you can enjoy better security and efficiency in no time,” Samuel Wu explained.

Streamline access control with a single powerful biometric solution 

The Aratek TruFace solution combines the cutting-edge “Aratek BA8300” facial recognition terminal with the powerful “Aratek TruFace Manager” software platform, delivering an intuitive and robust system for any business.

  • Aratek TruFace hardware: An unmatched facial recognition terminal 

The “Aratek BA8300” facial recognition terminal supports multi-factor authentication with fingerprint, RFID card, barcode, and facial recognition. With this device in your building, you can secure access and maximize usability across multiple applications.

“Users can gain access by having their faces, fingerprints, or RFID cards scanned, or in combination modes, adding an additional layer of security to protected areas,” Samuel Wu noted.

  • Aratek TruFace software: Amplify your security with innovative platform 

The powerful “Aratek TruFace Manager” software platform gives administrators full control over device management, device diagnostics, access control rule setting, and attendance tracking. Its intuitive overview dashboard lets admins visualize performance metrics in clear reports.

Plus, with its mobile app for Android and iOS phones, employees can manage attendance remotely with features such as punching in/out, applying for leaves and generating attendance reports. This solution offers businesses a reliable, secure and convenient way to monitor and bolster their security needs.

About Aratek Biometrics

Aratek is a global leader in the biometrics and security industries. For over 20 years, we’ve been providing cutting-edge biometric products tailored to the needs of governments, schools, banks, and a variety of other institutions in becoming more secure and efficient. From state-of-the-art fingerprint scanners and facial recognition access control devices, all the way up to robust physical security systems and biometric softwares – Aratek will have you covered when it comes to tackling your toughest challenges!

eQ Technologic Joins AWS Partner Network

COSTA MESA, Calif., Jan. 20, 2023 /PRNewswire/ — eQ Technologic, the provider of eQube®-DaaS, the powerful low/no-code data integration and analytics platform, is proud to announce it has joined the Amazon Web Services (AWS) Partner Network (APN).

eQ Technologic Joins AWS Partner Network
eQ Technologic Joins AWS Partner Network

The APN is a global community of AWS Partners leveraging AWS to build innovative software solutions and services. AWS offers technical support and expertise to its Partners, along with a wider reach that allows them to grow their customer base.

The AWS Partner designation status is a testament to eQ’s customer-centric business outcomes driven approach that aligns with the AWS Well-Architected Best Practices, prioritizing all its six pillars. eQ Technologic’s platform, using AWS services like EC2, S3, RDS, SNS, ACM, KMS, and more, provides a complete cloud services and cloud management portfolio that creates secure, rapid, and flexible access to the cloud.

Dinesh Khaladkar, President & CEO of eQ Technologic said, “We are very excited to join the AWS Partner Network, as it is the perfect place for us to substantially extend the reach of eQube®-DaaS. With this, in addition to providing game changing business outcomes-based data fabric solutions to large customers globally, we will reach more small and medium-sized companies. Our Data Fabric solutions will become more cost effective and accessible to anyone. By joining the APN, we are on an accelerated path to democratize digital transformation.”

Sanjeev Tamboli, the CTO added, “We are thrilled to join the AWS Partner Network. AWS Partner status underscores our ability to provide scalable and managed cloud deployments, without compromising on security best practices. By leveraging AWS, eQ will be able to reach a wider audience and allow customers to effortlessly integrate cloud based and on-premises applications.”

Globally, businesses are increasingly moving towards software solutions and services that can – without compromising on security – rapidly and efficiently address their business needs to accelerate their digital transformation. eQube®-DaaS, a leading integration and analytics platform, helps its customers accelerate their Digital Transformation by establishing a data fabric connecting enterprise-wide data, applications, and devices. Working with AWS consolidates eQ’s objectives: empowering businesses through scalable and robust integration and analytics solutions; creating ease of access to business insights for digital transformation; and creating valuable and meaningful impact.

About eQ Technologic

eQ Technologic, Inc. (‘eQ’) is a trusted provider of the eQube®-DaaS (Data as a Service) platform that delivers a highly scalable, resilient, and secure Data Fabric for its Customers. 

eQube®-DaaS is a powerful Low/No-Code Data Integration and Analytics platform. It establishes a Digital Backbone connecting enterprise-wide data, applications, and devices. This creates a ‘Data Fabric’ which puts the power of analytics in the hands of end users, leading to Actionable Insight. eQube®-DaaS platform-based solutions result in substantial productivity gain.

eQube® platform is flexible, robust, resilient, scalable, and secure with an overall lower total cost of ownership. The enterprise platform is now accessible through eQube®-Cloud, a game changer that further democratizes access to powerful data integration and analytics solutions, allowing organizations to embark on their Digital Transformation journeys.

Visit https://www.1eQ.com for more information on the eQube®-DaaS platform.

Source: eQ Technologic, Inc.

Nuix Discover® for Government Designated FedRAMP Ready

Important milestone on the path to becoming an eDiscovery Cloud Service Provider authorized to handle High Impact data for federal agencies

HERNDON, Va., Jan. 10, 2023 /PRNewswire/ — Global software company Nuix (www.nuix.com | ASX:NXL) today announced Nuix Discover® for Government has been designated FedRAMP Ready, at the High security impact level, and is now listed in the Federal Risk and Authorization Management Program Marketplace for US federal agencies and  government contractors. 

Nuix has initiated the FedRAMP authorization process, which can take up to 12 months. Upon authorization, federal agencies will be able to use Nuix Discover for Government to process and store their most sensitive unclassified data.

“We’re excited to have achieved this important milestone on the path to becoming FedRAMP Authorized at the High Impact level and providing a secure and robust cloud eDiscovery and investigation solution for federal agencies,” said Michael Smith, EVP, Americas at Nuix. “As part of our mission of finding truth in a digital world to be a force for good, we look forward to helping our federal government customers conduct their most sensitive and significant investigations using our secure cloud software.”

Nuix Discover for Government combines the world’s leading eDiscovery processing, review, analytics and predictive coding in one software-as-a-service solution that can be hosted in Nuix’s US government-only cloud environment or an agency’s private cloud. It dramatically improves the speed and quality of early case assessment, investigation, document review and case management in eDiscovery, investigation and Freedom of Information Act (FOIA) request processes.

As part of the FedRAMP authorization process, Nuix has incorporated world-class end-to-end encryption into Nuix Discover for Government, meeting Federal Information Processing Standard (FIPS) 140-2 Security Requirements for Cryptographic Modules.

The FedRAMP High Impact level is required for agencies that handle the government’s most sensitive, unclassified data in cloud computing environments. This includes systems where loss of confidentiality, integrity or availability could have a severe or catastrophic adverse effect on organizational operations, organizational assets or individuals.

 “This significant investment in cloud security benefits not just our federal government customers but everyone who uses Nuix software as a service,” said Michael Smith.

Copyright ©2023 Nuix. All rights reserved

About the Federal Risk and Authorization Management Program (FedRAMP)
FedRAMP (www.fedramp.gov) is a government-wide program that promotes the adoption of secure cloud services across the federal government by providing a standardized approach to security assessment, authorization, and continuous monitoring for cloud products and services. FedRAMP empowers agencies to use modern cloud technologies, with an emphasis on security and protection of federal information.

About Nuix
Nuix (www.nuix.com | ASX:NXL) creates innovative software that empowers organizations to simply and quickly find the truth from any data in a digital world. We are a passionate and talented team, delighting our customers with software that transforms data into actionable intelligence and helps them overcome the challenges of litigation, investigation, governance, risk and compliance.

Nuix North America Inc
13755 Sunrise Valley Drive, Suite 300
Herndon, VA 20171, USA

Nuix (and any other Nuix trademarks used) are trademarks of Nuix Ltd. and/or its subsidiaries, as applicable. All other brand and product names are trademarks of their respective holders. Any use of Nuix trademarks requires prior written approval from the Nuix Legal Department. The Nuix Legal Department can be reached by e-mail at Legal@nuix.com. THIS MATERIAL IS COMPRISED OF INTELLECTUAL PROPERTY OWNED BY NUIX LTD. AND ITS SUBSIDIARIES (“NUIX”), INCLUDING COPYRIGHTABLE SUBJECT MATTER THAT HAS BEEN NOTICED AS SUCH AND/OR REGISTERED WITH THE UNITED STATES COPYRIGHT OFFICE. ANY REPRODUCTION, DISTRIBUTION, TRANSMISSION, ADAPTATION, PUBLIC DISPLAY OR PUBLIC PERFORMANCE OF THE INTELLECTUAL PROPERTY (OTHER THAN FOR PREAPPROVED INTERNAL PURPOSES) REQUIRES PRIOR WRITTEN APPROVAL FROM NUIX.

Copyright ©2023

Cision View original content:https://www.prnewswire.com/news-releases/nuix-discover-for-government-designated-fedramp-ready-301716860.html

Sangfor Named as a Representative Vendor in Gartner Market Guide for Network Detection and Response

HONG KONG, Dec. 28, 2022 /PRNewswire/ — Sangfor Technologies (300454.SZ), a leading global vendor of cybersecurity and cloud computing solutions, is proud to announce that it has been named as a Representative Vendor in the latest Gartner® Market Guide for Network Detection and Response (NDR).[1]

The latest Market Guide for NDR provides an updated market definition and description of NDR. According to Gartner, “Organizations rely on NDR to detect and contain postbreach activity such as ransomware, insider threats, or lateral movements. NDR complements other technologies, which trigger alerts primarily based on rules and signatures, by building heuristic models of normal network behavior and spotting anomalies.” The Market Guide also provides recommendations, market direction and analysis, and a list of nineteen Representative Vendors from across the world to help organizations looking to invest in NDR navigate the market.

“We are very honored to be named as a Representative Vendor for our NDR solution – Cyber Command,” said Kaden Zhang, President of Sangfor International Market. “Sangfor continuously strives to provide the world’s leading cybersecurity products and services to our customers. We believe this recognition from Gartner is testament to our NDR product’s outstanding ability to protect organizations from today’s most sophisticated cyber threats.”

Source

[1]Gartner Inc., Market Guide for Network Detection and Response, Cybersecurity Research Team, December 14, 2022

Gartner Disclaimer

GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and are used herein with permission. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

About Sangfor Technologies

Sangfor is an APAC-based, leading global vendor specializing in Cybersecurity, Cloud Computing, and IT Infrastructure. Founded in 2000 and publicly listed since 2018 (STOCK CODE: 300454.SZ), Sangfor employs 9,500 employees, operates 60 offices, and serves more than 100,000 customers worldwide, many of them Fortune Global 500 companies, governmental institutions, universities, and schools. Visit www.sangfor.com to learn more about Sangfor’s solutions and let Sangfor make Your Digital Transformation Simpler and Secure.

Five Types of Shoppers You’ll Find This Holiday Season (and the Cyberscams They Must Watch Out For)

JAKARTA, Indonesia, Dec. 22, 2022 /PRNewswire/ — With the holidays around the corner, we’re smack in the middle of every shopper’s favourite season. Big sales days like Singles’ Day, Black Friday, Cyber Monday, and 12.12 all offer many great opportunities for shoppers to get their fill of good deals.

Akamai Technologies, Inc., the cloud company that powers and protects life online, shares five common shopper profiles observed during the year-end shopping period and the cyberscams they should watch out for to help consumers and businesses identify potential blind spots, and learn how to protect themselves this holiday season.

“The number of cyber-attacks continues to rise and mutate all the time. In 2022, the most alarming has been the sharp increase in malicious bot attacks, where we recorded a three-fold increase of such attacks. What this means for the retail industry is the likelihood of increased credential stuffing, where attackers use lists of compromised user credentials to breach into a system and data scraping attacks, the process of importing information from a website into a spreadsheet or local file saved on your computer.” said Dean Houari, Director of Security Technology and Strategy, APJ, Akamai.

“It is no surprise that attackers are looking to take advantage of the flurry of peak retail activity online during the extended shopping festival season since there’s much to gain financially, especially in Asia that accounts for approximately 60 percent of global ecommerce sales. It’s essential that both shoppers and retailers work together to learn how to watch out for scams and protect themselves,” he continued.

FIVE TYPES OF YEAR-END SHOPPERS

1.     THE PLANNER
You can spot a planner miles away! Planners have their presents wrapped and ready, months before the holidays. Making and planning purchases well ahead of time, Planners often save their credit card information, log ins and other personal information on shopping sites.

Most likely to fall for: Credential Stuffing
During such attacks, attackers use lists of compromised user credentials to breach into a system via malicious bots, based on the assumption that many users reuse usernames and passwords across multiple services.

Tips to protect against credential stuffing:

  • Be wary of saving payment details on merchant websites. While this may be convenient, it can leave data vulnerable if the merchant is breached.
  • Practice good password hygiene, by setting up different passwords for different sites. Better yet – use a password manager to set up unique, difficult-to-guess passwords.

2.     THE LAST-MINUTE SCRAMBLER
The opposite of Planners, Last-Minute Shoppers often remember its sale day on 11.11 or 12.12 itself, just before the clock strikes midnight. They snag their deals, but it’s always down to the wire for them!

Most likely to fall for: Phishing
In their rush, the Last-Minute Shopper is likely to accidentally click on untrustworthy links and fall prey to phishing scams. What appears to be an email from a reputable retailer with a coveted discount may be fraudulent, but the last-minute shopper doesn’t have time to check.

With the rise of online marketplaces, this is becoming more common. Earlier this year, Singapore’s most popular peer-to-peer sales platform was affected when attackers posing as legitimate buyers directed victims to a fake bank website where they would be asked to give their banking details to receive payment. This resulted in at least 72 people losing over $109,000

Tips to protect against phishing

  • Verify the validity of sites before clicking on them or providing any personal information.
  • If emails are unsolicited, be alert to any potential errors. Do not proceed if it includes wrong information, or requests to enable macros, adjust security settings or install applications.

3.     The Bargain Hunter
The price point is the most significant purchase consideration for these shoppers, who would sift through various sites to get a substantial deal.

Most likely to fall for: Social Engineering Attacks
Bargain hunters would be likely to click on spoofed emails or accept malicious extensions that function as price comparison tools.

Attackers prey on buyer’s eagerness for a good deal by sending them fake offers that request for their personal data on a page, even impersonating legitimate tools like Google Analytics or Google Tag Manager to compromise code and steal valuable information, impacting shopping sites.

Tips to protect against social engineering attacks

  • Always verify the validity of the offer and the legitimacy of the sender.
  • Use a good spam filter for emails, as a first barrier of defence against suspicious files and links.

4.     The Impulse Buyer
Driven solely by emotions, impulse shoppers often do not have a specific product in mind before placing an order. They often respond to time pressure to access a coveted item on a limited time offer, at a price too good to refuse.

Most likely to fall for: Brand Impersonation Attacks
Via fraudulent links, cybercriminals impersonate popular brands, tricking victims into sharing personal information, buying contraband products, visiting a fake website, downloading malware, and more. Exacerbating these trends is social media, where attackers can easily impersonate brands, engage with customers seeking to purchase items, and request for their personal details.

Tips to protect against brand impersonation

  • Scrutinize links provided in emails and be on high alert if they are not pointing to the correct location or direct to a third-party site not affiliated with the brand.
  • If in doubt, reach out to the brand on their official channels to verify offers before clicking on any links to make payments. Make sure to check that accounts are verified.

5.     The Researcher
Researchers extensively compare products and offers before purchasing. They often have various browser extensions installed on their browsers to make quick comparisons.

Most likely to fall for: Extension Malware Attacks 
Cybercriminals hide viruses behind add-ons, which can then install adverts, gather users’ browsing history, and seek login credentials by impersonating famous apps and extensions. Malicious extensions could go undetected especially if security software programs treat known extensions as trusted applications.

Most recently, attackers have been using information-stealing malware like FB Stealer, which mimics the harmless and standard-looking Chrome extension Google Translate, to prey on users. Financially motivated, attackers after effectively locking a user out of their Facebook account, abuse access to ask the victim’s friends for money.

Tips to protect against extension malware attacks

  • Only install extensions from official Web stores.
  • If permissions that extensions require even before installing seem suspicious, it’ll be best not to install them.

Retailers must do their part too!
For a cybersafe shopping experience, retailers have a part to play as well.

Attacks on popular retail behemoths in the last few years have revealed important lessons for merchants. Prevention is better than cure. Taking proactive steps to monitor potential threats and being ready to block unauthorised access and keep shoppers safe throughout their retail experience is essential.

“As web traffic increases, attackers similarly increase their attacks. Case in point,  malicious bot attacks tripled during Single’s Day last year. These attacks could, immediately or in future, drain customer accounts, damage site functionality, and hold encrypted data ransom — all at enormous costs to businesses,” explained Houari.

“To ensure loyalty long term, retailers must make every effort to keep shopper data safe. This could include deploying a bot solution to stop credential stuffing attempts early and using password managers and multi factor authentication to secure users,” he concluded.

About Akamai
Akamai powers and protects life online. Leading companies worldwide choose Akamai to build, deliver, and secure their digital experiences — helping billions of people live, work, and play every day. With the world’s most distributed compute platform — from cloud to edge — we make it easy for customers to develop and run applications, while we keep experiences closer to users and threats farther away. Learn more about Akamai’s security, compute, and delivery solutions at akamai.com and akamai.com/blog, or follow Akamai Technologies on Twitter and LinkedIn.

Logo – https://techent.tv/wp-content/uploads/2022/12/five-types-of-shoppers-youll-find-this-holiday-season-and-the-cyberscams-they-must-watch-out-for.jpg 

Source: Akamai Technologies, Inc.

Aires Investment Holdings Granted U.S. Patent for Encryption Method Involving Artificial Intelligence

The encryption method developed potentially improves the security of millions of devices

SINGAPORE, Dec. 12, 2022 /PRNewswire/ — Aires Investment Holdings  (the “Company” or “Aires”), a groundbreaking technology company based in Singapore, announced today that the United States Patent and Trademark Office has granted US Patent No. 11,522,674 to Aires Investment Holdings. The patent, titled “Encryption, Decryption, And Key Generation Apparatus And Method Involving Diophantine Equation And Artificial Intelligence” illustrates the company’s multi-year research into artificial intelligence and cybersecurity.

US Patent No. 11,522,674 is among the the first in the world to utilize the concept of artificial intelligence paired with undecidable encryption. Artificial intelligence is designed to improve the encryption with data over periods of time while undecidable encryption are based on undecidable problems that no algorithm can solve. The patent grant is the first for Aires, with upcoming patent applications pending.

“The patent presents a novel encryption method that utilizes the concept of undecidability paired with artificial intelligence, we believe it has the potential to further improve encryption that are commonly used in millions of devices across the world” stated Lim Meng Liang, Inventor and co-founder, Aires Investment Holdings, Singapore.

The company is currently working with industry partners to further develop and expand the full potential of its proprietary technology for use in devices.

About Aires

Aires is a ground breaking technology company based in Singapore, focused on developing the latest technologies in artificial intelligence, cybersecurity and telecommunications.

For more information visit:
www.airesinvestment.com
www.airesatech.com

Contact
Ken Lin
kenlin@airesatech.com
Contact@airesinvestment.com