22nd Edition of Cyber Security Summit: Thailand to Convene Esteemed Panel of Industry Leaders

BANGKOK, Apr 19, 2024 – (ACN Newswire) – In today’s interconnected world, digital technology permeates every aspect of our lives, transforming how we live, work, and interact. As Thailand advances its digital landscape, the importance of cybersecurity cannot be overstated. The Cyber Security Summit: Thailand aims to unite visionaries and industry leaders to address the challenges and opportunities in securing Thailand’s digital future.

Under the theme “Navigating Threats across Thailand’s Cyber Landscape,” the summit will focus on strategies, action plans, and best practices to develop and protect the nation’s cybersecurity sector and build a resilient digital ecosystem. Key topics of discussion will include transformative pathways for digital success, future-proofing data centers, unleashing the AI revolution, unlocking legacy systems, and navigating cyber resilience in the digital era.

The Cyber Security Summit: Thailand, in its 22nd edition, continues to be a pivotal event in addressing cybersecurity challenges. Scheduled for 30th May in Sofitel Bangkok, it emphasizes Thailand’s growing importance in the digital domain. As an integral part of a prestigious global event series, this summit offers industry leaders a platform to explore strategies aimed at enhancing decision-making capabilities, driving operational efficiencies, and nurturing a pervasive digital ethos. It underscores the urgency of proactive cybersecurity measures and Thailand’s role in navigating the dynamic cyber landscape.

key highlights of the 22nd Edition Cyber Security Summit, Thailand

1. Esteemed Speaker Lineup: Featuring top cybersecurity experts and industry leaders.
2. Theme: “Navigating Threats across Thailand’s Cyber Landscape”: Addressing proactive approaches to enhance critical infrastructure capabilities and raise cybersecurity awareness.
3. Actionable Insights: Attendees will gain practical strategies and best practices to develop and protect the nation’s cybersecurity sector.
4. Networking Opportunities: Facilitating collaboration and knowledge exchange among cybersecurity professionals.

Esteemed Speaker Lineup: Featuring prominent cybersecurity experts and industry leaders such as:

  • Jadet Khuhakongkit, Assistant Secretary General, National Cyber Security Agency, Kingdom of Thailand
  • Athikom Kanchanavibhu, Chief Information Security Officer: Executive Vice President, Digital & Technology Transformation, Mitr Phol Group
  • Yaron Slutzky, Chief Information Security Officer, Agoda
  • Phong Sam, Chief Information Security Officer, Central Group
  • George Papas, Chief Information Security Officer, Asian Tigers Group Thailand
  • Daniel Lui, Chief Information Officer, Pacific Healthcare Group
  • Chatchawarn Jirupathum, Group Information Security and Data Protection Officer, RMA Group Co. Ltd.
  • Narudom Roongsiriwong, Senior Vice President – Global Enterprise Architecture and Cyber Security, Banpu Public Company Limited

About the cyber security summit Thailand

The Cyber Security Summit (CSS) Thailand is a premier event that convenes cybersecurity leaders from various sectors in Thailand. It provides a platform for sharing insights, strategies, and best practices to enhance cybersecurity resilience and awareness in the country. With esteemed speakers, interactive discussions, and networking opportunities, CSS Thailand fosters collaboration and promotes a proactive approach to cybersecurity, ultimately contributing to Thailand’s cybersecurity readiness and resilience.

For more information on the Cyber Security Summit Thailand, visit: https://exito-e.com/cybersecuritysummit/thailand/

About Exito

Exito, which means success in Spanish, embodies our commitment to the success of our customers. Each year, we host over 240 virtual and in-person conferences globally, bringing together audiences with world-class thought leaders and C-level executives across industries. Our meticulously crafted agendas, based on extensive research and valuable industry insights, facilitate business, knowledge transfer, deal flow, and impactful messaging for brands.

For Media Enquiries, contact:
Kasturi Nayak (Sr. Marketing Executive)
Kasturi.nayak@exito-e.com
Enquiry@exito-e.com
Exito Media Concepts



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

Seamless for Science: Revolutionizing Literature Reviews with Advanced AI and Real Database Access

BEIJING, Apr 15, 2024 – (ACN Newswire) – Seamless AI is proud to unveil Seamless for Science, a state-of-the-art web application that is redefining the creation of literature reviews through advanced AI technology. This tool is specifically engineered to support academic rigor by linking directly to real scientific journal databases, ensuring that all references are credible and extensively vetted. As we approach the end of the school year, Seamless for Science is becoming an essential resource for students and researchers across China, helping them to efficiently complete complex research tasks with accuracy and speed. Access this innovative tool now at https://seaml.es/science.html.

How Seamless for Science Works

Seamless for Science employs sophisticated artificial intelligence algorithms to assist users in conducting thorough, accurate literature reviews. Here’s how it works:

Query Input: Users start by entering their research topic or question into the system.

AI-Driven Search: The AI scans through extensive databases containing millions of scientific journal articles.

Data Extraction and Analysis: Key pieces of information and relevant data are extracted based on the query.

Synthesis of Information: The AI compiles and synthesizes the extracted data into a coherent literature review, formatted according to academic standards.

Citation and Referencing: All sources are accurately cited with links to the original journals, ensuring each piece of data can be traced back to a verified source.

This streamlined process not only saves time but also enhances the quality of academic work by ensuring that all literature reviews are backed by legitimate scientific research.

Benefits to Students in China

As the academic year culminates, Chinese students face the pressure of completing multiple assignments and research papers. Seamless for Science is tailored to meet these demands by providing a tool that:

Reduces Workload: Automatically generates literature reviews, reducing the hours students would typically spend on research.

Improves Research Quality: Access to high-quality, peer-reviewed journals ensures that the information included in literature reviews is accurate and of high academic value.

Enhances Learning Experience: By handling the repetitive aspects of literature review, students can focus more on analysis and critical thinking, deepening their understanding of the subject matter.

Supports Non-Native English Speakers: Offers support in structuring and phrasing English literature reviews, which is crucial for students in China who are publishing or presenting their research in international forums.

Adoption and Impact

“Incorporating Seamless for Science into our academic resources has significantly elevated the quality and efficiency of student research projects,” says Professor Huang, an academic advisor from Shanghai. “Students can now engage more critically with their topics, as the tool takes care of the exhaustive, time-consuming parts of literature reviews.”

About Seamless AI

Seamless AI is committed to pioneering the development of artificial intelligence tools that integrate seamlessly with real-time data access, supporting the academic and professional growth of users worldwide. Our applications are crafted to be powerful yet user-friendly, making advanced technology accessible to everyone in the academic community.

To learn more about Seamless for Science and to begin using the application, please visit https://seaml.es/science.html.

Contact:
Tomer Tarsky
Media
Seamless AI
founders@seaml.es
647-923-4477
https://seaml.es/science.html

SOURCE: Seamless For Science



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

BLUETTI Leads the Charge Towards Greener Living this Earth Day 2024

SYDNEY, AU, Apr 15, 2024 – (ACN Newswire) – As Earth Day approaches, BLUETTI reaffirms its commitment to environmental stewardship with this year’s theme — “Embrace Our Earth, Energize Our Life”. The pioneering brand highlights innovative energy storage solutions to help users harness renewable energy, reduce carbon emissions, and promote sustainable lifestyles.

Water-Resistant BLUETTI AC240 Power Station for All-Weather Use

To minimize electronic waste, BLUETTI produces truly durable power products like the New AC240. With an impressive IP65 rating, it can endure dust and water ingress, guaranteeing longevity in outdoor settings like construction sites and marine applications. Capable of delivering 2,400W power and expandable with the B210 add-on batteries, the AC240 becomes an indispensable off-grid power solution for sailboat, yachts, and other demanding situations.

BLUETTI AC300+B300 Scalable Clean Energy Solution Empowering Off-Grid Living

Living off the grid doesn’t mean relying on traditional energy sources like firewood or fuel generators. The AC300+B300 system provides a sustainable power solution for remote cabins or homes. When linked with solar panels, it accepts up to 2,400W of solar intake. Its 3,000W inverter effortlessly powers most household appliances like air conditioners and refrigerators. As testified by user Thorn Gannon, this system with two PV350 solar panels made his modest home 80% off-grid with minimal worry. He also considered adding more B300 batteries to achieve greater solar storage while maintaining a green footprint.

BLUETTI AC70, AC180, AC200L Portable Generators for Earth-Conscious Lifestyles

BLUETTI endeavors to make clean energy accessible to all through its diverse product range. Each product features seamless compatibility with solar panels. The portable 10.2kg AC70 is a convenient power source for camping, road trips, and emergencies. The AC200L with a 2,400W output charges heavy-duty equipment and tools. These products offer peace of mind during power shortages, as exemplified by user Julie Cook’s experience with the AC180, which powered her devices to ensure the uninterrupted operation of her online business.

Join BLUETTI this Earth Day to embrace renewable energy and a brighter future.

About BLUETTI

Committed to a sustainable future, BLUETTI provides affordable green energy storage solutions for indoor and outdoor use. Through initiatives like the LAAF (Lighting An African Family) program, BLUETTI has impacted over 100,000 off-grid African families. With a focus on innovation and customer satisfaction, BLUETTI has become a trusted leader in over 100 countries worldwide.

SOURCE: Bluetti Power Inc.



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

Tau Unveils Groundbreaking Research in Logical Languages to Transform Software Development

TRIESEN, LIECHTENSTEIN, Apr 12, 2024 – (ACN Newswire) – This month, Tau has reached a pivotal milestone with the publication of Theories and Applications of Boolean Algebras, a research paper by Ohad Asor that lays the scientific groundwork for the innovative Tau Language.

Tau Unveils Logical Languages ResearchTau Unveils Logical Languages Research

Cover of Theories and Applications of Boolean Algebras by Ohad Asor

Ohad Asor’s Research: Breakthroughs in Logic and Computation

The recently published research paper by Ohad Asor, the founder and CTO of Tau, introduces significant advancements in the field of artificial intelligence (AI) with new logical languages, such as NSO and GSSOTC, designed to surpass currently widespread machine-learning methods by enabling formal proofs and reasoning over the entirety of any software developed using Tau Language. The capabilities of Tau Language are indispensable for a wide range of AI-based software, from complex and mission-critical systems to simple applications. Asor’s work successfully overcomes some of the most complex problems in the field of logic and mathematics and provides efficient methods to employ logic-based AI to tackle some of the most prevalent challenges in software development.

The research covered in Theories and Applications of Boolean Algebras stands on four pillars:

  • NSO language, addressing the long-standing challenge of self-referential logic.
  • GSSOTC, a pioneering temporal logic.
  • Decidable conservative extensions to Boolean Algebras’ first-order theory.
  • Related algorithms that enable complete transformation of software development processes.

Coming Up: Tau Language Alpha Release

The publication of Theories and Applications of Boolean Algebras precedes the upcoming Tau Language Alpha release which will introduce core capabilities of the Tau Language. The release will be the first step in applying the team’s long-standing theoretical research in practice and will mark the beginning of the Alpha testing phase of Tau’s solutions for software development, decentralized applications and more.

Be the first to hear about Tau product releases by signing up here. Follow updates and learn more on TwitterYouTube, or LinkedIn.

Contact Information
Karolina Masilione
Marketing Manager, Tau
karolina@idni.org

SOURCE: Tau

.

View the original press release on newswire.com.



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

Hack The Box Redefines Cybersecurity Performance, Setting New Standards in the Cyber Readiness of Organizations

NEW YORK, NY, LONDON, UK and SYDNEY, AUSTRALIA, Apr 11, 2024 – (ACN Newswire) – Companies can level up their cybersecurity defenses – eliminating the skills and knowledge gaps that criminals regularly exploit thanks to Hack The Box’s Cyber Performance Center.

Hack The Box’s Cyber Performance Center unites individual ability, business management practices, and the human factor in the cybersecurity industry and it is designed to help organizations take a coordinated approach to their cyber readiness, reducing the vulnerabilities created when cybersecurity is siloed or treated as a tick-box requirement.

Its innovative model transcends the limits of traditional cyber training, taking a 360º overview that considers a business’s processes and technology investments along with the requirements of its cybersecurity teams. By matching processes and exercises to organizational outcomes it helps to align cybersecurity and business objectives.

Hack The Box’s disruptive approach also directly addresses the key human element within corporate cybersecurity, focusing on the upskilling and development cyber professionals need to perform to their best while providing clear career paths to encourage retention and combat the increased burnout and fatigue within the sector. This is critical as the global cybersecurity industry currently faces a skills shortage of four million people.

It is estimated that, by next year over half of significant cyber incidents will be caused by human error or skill shortages1. The Cyber Performance Center approach helps organizations tackle their security as a company-wide goal, considering the needs of its cybersecurity team, business processes, and respective technology investments to promote a healthy security culture.

Hack The Box combines these three organizational pillars with a continuous learning journey based on the latest technologies, vulnerabilities, and solutions for all cybersecurity domains. The approach enables customers to create and maintain a robust cyber strategy, unlocking the skills of each member of their security teams, matching processes and exercises to organizational outcomes, and bridging the gap between cybersecurity and business objectives.

“At Hack The Box, we believe cybersecurity readiness is not just a technical requirement but a company-wide imperative, involving people, technology, and processes”, highlights Haris Pylarinos, Founder and CEO at Hack The Box. “Only by taking into account the needs of an organization’s cybersecurity team, its business processes, and respective technology investments, can a healthy security culture thrive. That’s why we’ve developed the Cyber Performance Center approach, where our focus is on empowering cyber individuals and organizations to bring out the best version of themselves, day in and day out.”

Hack The Box is the only Cyber Performance Center that builds on three critical pillars:

Continuous, gamified, hands-on upskilling from cybersecurity fundamentals to advanced scenarios.

Cybersecurity workforce development plans, baked into the fabric and objectives of organizations.

Career path programs and retention strategies to fight burnout, fatigue, and skill gaps.

Haris Pylarinos continues: “What makes Hack The Box different is that, unlike traditional training methods, we provide an all-in-one platform that serves as a single pane of glass for organizations and cybersecurity leaders to recruit, upskill, retain, and track their team’s success. Cyber Performance Center marks the next stage of Hack The Box’s evolution. We will continue to support the industry by acting as a vital ally in crafting high-performing security teams and organizations that put the human factor in the forefront.”

Notes to editors:

1 Predicts 2023: Cybersecurity Industry Focuses on the Human Deal, Gartner

Additional graphics available upon request.

About Hack The Box:

Hack The Box is the Cyber Performance Center with the mission to provide a human-first platform to create and maintain high-performing cybersecurity individuals and organizations. Hack The Box is the only platform that unites upskilling, workforce development, and the human focus in the cybersecurity industry, and it’s trusted by organizations worldwide for driving their teams to peak performance. Offering an all-in-one environment for continuous growth, assessment, and recruitment, Hack The Box provides solutions for all cybersecurity domains. Launched in 2017, Hack The Box brings together the largest global cybersecurity community of more than 2.6 million platform members. Rapidly growing its international footprint and reach, Hack The Box is headquartered in the UK, with additional offices in the US, Australia, and Greece.

For more information, please visit hackthebox.com

Find us on:

LinkedIn – Facebook – Instagram – Twitter – Discord – YouTube

For press inquiries, please contact: pr@hackthebox.com

SOURCE: Hack The Box



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

Ensign InfoSecurity showcases AI-powered cyber solutions to combat homeland cybersecurity challenges

  • Ensign Labs R&D team continuously innovates and develops AI-powered cyber solutions that detect, response, and protect against malicious cyberattacks.
  • At Milipol AsiaPacific – TechX Summit 2024, Ensign showcases AI-powered services designed to detect and mitigate sophisticated cybercrimes, including phishing and deepfakes.

SINGAPORE, Apr 3, 2024 – (ACN Newswire) – In an era where people and devices are increasingly connected to the Internet and each other, cyberattack surfaces are growing exponentially, posing threats not only to individuals at home but organisations and nations worldwide. Evidently, safeguarding cyberspace has become the most dynamic threat to homeland security. To combat these ever-expanding complexities of cybercrimes, Ensign InfoSecurity (Ensign), Asia Pacific’s largest pure-play cybersecurity provider, has positioned itself as the forefront of cyber defence innovation. Ensign Labs, the dedicated in-house R&D team of Ensign, continuously innovate and embed AI into cyber solutions, delivering data-driven and threat-informed defence solutions to detect, response, and protect against sophisticated and malicious cyberattacks.

A Platinum sponsor at the inaugural Milipol AsiaPacific – TechX Summit 2024, Ensign demonstrates its commitment to combating homeland cybersecurity challenges through its AI-powered services in tackling cybercrimes. Leveraging Ensign’s in-house AI-engine, Ensign’s offerings are able to monitor and detect new unknown threats based on behavioural patterns to generate contextualised alerts. Designed by Ensign Labs, this AI-engine is made up by a collection of patented algorithms and novel techniques that ingests and makes sense of petabytes of varied data.

Among the solutions presented, the Phishing and Deepfake Detection solution stands out as Ensign’s main showcase. Characterised by deception and manipulation, the insidious nature of phishing threats persistently undermines both citizens’ and the nation’s security. To tackle scammers and phishing attempts, Ensign developed an AI machine learning detection system that analyses and flags email addresses and embedded URLs that attempt to mimic legitimate domain names (full domain phishing); slightly alter or misspell domain names to trick recipients (typo-squatting); or use characters similar to legitimate ones to deceive the eye (homoglyph attacks). With a detection rate exceeding 90% for phishing attacks and campaigns, this deep learning detection system utilises generative adversarial neural networks, image recognition algorithms, transformer neural networks and behavioural-based analysis to combat sophisticated phishing attempts.

In recent years, the tactics of scammers, particularly in the area of phishing, have shapeshifted to a combination of social engineering techniques and deepfake technology – deepfake phishing. This is particularly dangerous as deepfake technology becomes increasingly sophisticated and accessible with the advent of AI tools. Recognising the emerging threats posed by deepfakes, Ensign adopted a two-pronged approach to address them: generating deepfakes to understand and expose their flaws; then deploying sophisticated detection mechanisms to identify and mitigate these advanced deceptions.

“Cybercriminals do not discriminate, and as cyber threats evolve, anyone can become a target. The fight against cybercrime is becoming increasingly complex, making the traditional cyber defence playbook insufficient. At Ensign, our commitment to continuous innovation keeps us ahead in this game. Through Ensign Labs, we integrate AI into various aspects of our cyber solutions. This results in data-driven and threat-informed defence strategies, ensuring the resilience and security of Singapore’s cyberspace. Our efforts extend to protecting our clients’ systems and data, thereby contributing to the nation’s long-term prosperity,” said Ms. Tammie Tham, Group Chief Executive Officer of Ensign InfoSecurity.

The Phishing and Deepfake Detection solution is part of a broader suite of AI-powered cybersecurity solutions showcasing at Milipol AsiaPacific – TechX Summit 2024. To find out more, please visit booth 1835, between 3rd and 5th April, at the Sands Expo and Convention Centre, Singapore.

About Ensign InfoSecurity

Ensign InfoSecurity is the largest, pure-play end-to-end cybersecurity service provider in Asia. Headquartered in Singapore, Ensign offers bespoke solutions and services to address their clients’ cybersecurity needs. Its core competencies are in the provision of cybersecurity advisory and assurance services, architecture design and systems integration services, and managed security services for advanced threat detection, threat hunting, and incident response. Underpinning these competencies is in-house research and development in cybersecurity. Ensign has two decades of proven track record as a trusted and relevant service provider, serving clients from the public and private sectors in the Asia Pacific region. 

Ensign InfoSecurity is ranked 7th in a worldwide survey of MSSPs (Managed Security Services Providers). In addition, it has achieved a significant milestone by being the first Singapore-based organisation to attain the status of a Research Sponsor for MITRE Engenuity Center for Threat-Informed Defense (CTID).

For more information on Ensign, please visit www.ensigninfosecurity.com

For enquiries, please email: media@ensigninfosecurity.com



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

Cyber Security Summit Unveils the Elite ‘Cyber 50’: Celebrating Trailblazing Leaders in Cybersecurity

Johannesburg, South Africa, Mar 11, 2024 – (ACN Newswire) – The Cyber Security Summit, which will be held on 14 March 2024 at Johannesburg, South Africa,   is thrilled to unveil the inaugural Cyber 50, showcasing the most influential and promising leaders in the field of cybersecurity. After an extensive evaluation process involving nominations, direct applications, database research, interviews, and thorough analysis of public sources, we are proud to recognize these individuals for their exceptional contributions and dedication to advancing cybersecurity.

The Cyber 50 winners represent a diverse range of expertise, spanning cybersecurity, artificial intelligence, data protection, cloud security, and quantum computing. They are united by their passion and unwavering commitment to effecting meaningful change in the realm of cybersecurity, demonstrating remarkable leadership and innovation in their respective domains.

Among the Cyber 50 are individuals who have demonstrated outstanding vision and execution in navigating the complex landscape of cyber threats and challenges. These leaders have not only raised the bar for excellence but have also inspired others with their relentless pursuit of cybersecurity excellence.

The Cyber 50 winners for 2024 are:

1. Abdul Kader Baba, Chief Technology and Information Officer, Industrial Development Corporation
2. Andre Pretorius, Head of Cyber Security, DRDGOLD Limited
3. Avhatakali Munyai, Director of IT, University of Johannesburg
4. Ayanda Peta, CISO, African Rainbow Minerals Limited
5. Brian Knott, CIO, Calgro M3
6. Celia Mantshiyane, CISO, MTN
7. Darshan Lakha, CISO, Vodacom
8. Dr. Amos Anele, Academic Head of Programmes, Information Technology Eduvos (Pty) Ltd.
9. Duke Mathebula, Chief Information Officer, Trident Steel Africa
10. Graeme te Brake, CIO, Eazi Access
11. Hans Zachar, Group Chief Technology and Innovation Officer, Nutun
12. Helene Bezuidenhout, Deputy Director: ICT Information Security, Government Pensions Administration Agency (GPAA)
13. Hendrik Wiese, Chief Information Security Officer, iMasFinance
14. Henny Schlebusch, Regional IT Director: Middle East & Africa, Rhenus Logistics
15. Ishaaq Jacobs, Chief Cyber Security Officer, Sasol
16. Itumeleng Makgati, Executive: Information Security, Standard Bank group
17. Jabu Mtsweni, Head of Information and Cyber Security Research Centre, CSIR
18. Jeanette Morwane, Chief Director – ICT Innovations, Department of Communications and Digital Technologies
19. Jenny Mohanlall, Senior Director : IT, DHL International
20. John Bosco Arends, Group Head Information and Network Technology Operations City of Johannesburg
21. John Mukomana, Head: IT Governance & Reporting, NHLS
22. Joseph Stokes, Head: Cyber Security and IT Governance, Telesure Investment Holdings (TIH).
23. Judy Winn, Head of Information Security, Peach Payments
24. Justin Williams, Group CISO, MTN Group
25. Khomotso Mokwele, Director – Information Security, Government Pension Administration Agency
26. Lesiba Sebola, IT Director, Bidvest International Logistics
27. Lineo Racoco, Group CISO, Coca-Cola Beverages Africa
28. Manoj Puri, CISO, Absa Group
29. Mario Pinto, Head of Business Information security, Life Healthcare
30. Mlindi Mashologu, Deputy Director-General: ICT Information Society and Capacity DevelopmentDepartment of Communications and Digital Technologies
31. Mthoko Mncwabe, Chief Information Officer, Airports Company South Africa (ACSA)
32. Mthokozisi Hlatshwayo, Director: IT Auditor, SASSA
33. Nadia Veeran-Patel, ISO, LRMG
34. Niel Van Rooyen, CISO, MagicOrange
35. Nkosenhle Ngongoma, Director of IT, City lodge hotels
36. Olabode Ogundele, Chief Information Security Officer, Vox Telecom
37. Phathu Mathivha, Group Head IT, Bushveld Minerals
38. Pieter Steyn, Chief Information and Technology Officer, Luxaviation Group
39. Popi Kunene, Head of Technology retail, Old mutual
40. Rohan Day, CISO, Access Bank South Africa
41. Sachin Surajbali, Group Chief Information Security Officer, Liberty Group South Africa
42. Shalin Naidoo, Chief Information and Technology Officer, DRDGOLD Limited.
43. Simon Nare, Head of Information Security, TransUnion Africa
44. Sithembile Songo, Chief Information Security Officer, Eskom Holdings Soc Limited
45. Thipe Khaole, CISO, Alexforbes
46. Tshepiso Lebogo, Senior Manager: Cyber Security Operations, SOC and Threat Intelligence, Afrocentric Group
47. Tswakai Luke, Director: ICT, Cooperative Governance & Traditional Affairs
48. Venisha Nayagar, Group CISO, Life Healthcare
49. Vuma Magaqa, CIO, Department of Health South Africa
50. Yosheen Padayachee, Chief Information Officer, Tsebo Solutions Group.

Join us at the Digital Transformation Summit to celebrate their achievements and gain insights into the future of technology.

For Media Enquiries, contact:
Kasturi Nayak (Sr. Marketing Executive)
Kasturi.nayak@exito-e.com 



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

Cyber Security Summit South Africa: Unveiling the State of Cyber Security in the Nation

Johannesburg, South Africa, Mar 8, 2024 – (ACN Newswire) – Cybersecurity is crucial in South Africa due to its reliance on digital technologies and the prevalence of cyber threats. As one of Africa’s most targeted countries, South Africa faces risks such as ransomware attacks and data breaches, jeopardising individuals, businesses, and critical infrastructure. With rapid digital transformation in finance, healthcare, and government, robust cybersecurity is essential to safeguard sensitive data, ensure operational continuity, and mitigate financial losses.

In a recent cybersecurity incident in South Africa, a leading financial institution became the target of a sophisticated ransomware attack, resulting in extensive disruptions to its operations and the compromise of sensitive customer data. Exploiting vulnerabilities in the institution’s network infrastructure, threat actors infiltrated systems and encrypted critical files, issuing ransom demands. Faced with a critical decision, the institution navigated the dilemma of whether to comply with demands, risking further exploitation, or resist, potentially enduring severe operational and reputational repercussions. Through a concerted response effort involving cybersecurity experts, law enforcement agencies, and regulatory bodies, the institution successfully mitigated the attack, restored affected systems, and instituted enhanced security measures to prevent future breaches.

This case underscores the pervasive cyber threat landscape confronting organizations in South Africa and the imperative of robust cybersecurity protocols. It underscores the necessity for continual monitoring, routine vulnerability assessments, and proactive risk management strategies to counter evolving cyber threats effectively. Moreover, it emphasizes the pivotal role of collaboration between the public and private sectors in combatting cybercrime and safeguarding national critical infrastructure from malicious actors.

The Cyber Security Summit endeavors to address critical aspects, including strengthening the protection of national critical information infrastructure, fostering coordinated approaches to national cybersecurity, and enhancing regional and international cyber-capacity building efforts.

Overview of the event:

The Cyber Security Summit, an exclusive in-person event for cybersecurity leaders in South Africa, convenes under the theme “South Africa’s Cyber Security Models For Tomorrow”. With a focus on the nation’s safety and security in the cyber realm, the 21st Edition will feature top security experts sharing strategies, action plans, and best practices to bolster South Africa’s cybersecurity sector and establish a next-generation digital cyber vault. Gathering over 150 industry experts, the summit equips attendees with essential tools to safeguard businesses from risks.

The event will kick-off with a high-profile panel discussion titled “The Cyber Threat Landscape in South Africa: What Lies Ahead?” featuring esteemed industry experts:

– Martin Oliver, Head of Information Technology, AVIS Southern Africa.
– Prof. Basie von Solms, Director: Centre for Cyber Security, University of Johannesburg.
– Joseph Stokes, Group Head: Cyber Security and IT Governance, Telesure Investment Holdings.
– Gert Thoonen, Principal Architect OT Security, Rockwell Automation.

The attendees will engage in insightful sponsor presentations, workshops, and fireside chats delving into various aspects of cybersecurity, including the role of Generative AI in defence against digital threats and strategies for privacy-preserving data sharing and collaboration in the cloud.

Key agenda highlights include:

– A workshop by Rockwell Automation focusing on a risk-based approach for Africa’s mission-critical infrastructure.
– Fireside chats featuring discussions on the transformative potential of Generative AI in cybersecurity and the challenges of connecting the digital dots with safety.
– Panel discussions exploring mechanisms for securely sharing data while preserving privacy, leveraging AI-powered algorithms for threat detection, and ensuring compliance with South Africa’s cybersecurity regulations.
– The summit provides a unique platform for industry leaders, policymakers, and cybersecurity professionals to exchange insights, explore innovative solutions, and forge collaborative partnerships in the fight against cyber threats.

Join us at Cyber Security Summit South Africa to be part of this critical dialogue shaping the future of cybersecurity in the nation.

Click on the link, for more information on Cyber Security Summit, South Africa.

For Media Enquiries, contact:
Kasturi Nayak (Sr. Marketing Executive)
Kasturi.nayak@exito-e.com
Enquiry@exito-e.com
Exito Media Concepts



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

Trustifi Launches Geofencing Capabilities in Australia

LAS VEGAS, NV, Mar 5, 2024 – (ACN Newswire) – Trustifi, the premier provider of AI- and cloud-based email cyber security solutions, announced that it is now able to “geofence” email data for its growing base of MSSP (managed security service provider) customers in Australia in accordance with nationwide compliance needs. This makes Trustifi’s unique next-generation cybersecurity solutions more effective for a greater addressable market of businesses and MSSP partners in Australia, opening new opportunities for solution providers in this market to enhance their cybersecurity offerings. Trustifi has been serving managed service providers (MSPs) in Australia and New Zealand since 2022 and is steadily building a partner community in this high-potential marketplace. The ability to geofence data in this country comes due to Trustifi’s new relationship with a powerful AWS data storage center in that country.

The Office of the Australian Information Commissioner (OAIC) oversees issues relative to data privacy in Australia. One of its core functions is to help safeguard records pertaining to individuals, and provide guidance on the collection, storage, and transmission of that data. The Australia Privacy Act is applicable to all private healthcare providers throughout Australia, including practitioners and private hospitals. Due to these statutes, MSSPs are recommended to maintain confidential personal data on servers that are local to that country, especially in sensitive industries such as healthcare, financial services, and legal. This procedure is known as geofencing, or the establishment of a virtual boundary that limits the geographical transmission of data to a designated region-in this case the nation of that data’s origin. Trustifi now offers geofencing in a range of countries, including the US, Canada, Ireland, Germany, Singapore, Brazil, and Australia.

Trustifi MSSP partners who work with global end-customers can easily add Australian geofencing capabilities to their client’s security plans with one click via a newly implemented software setting. The company added this feature to better serve its expanding Australian customer base, and due to the strong general growth of the security market in this country, resulting in notable opportunities for MSPs.

“Compliance is a crucial element of any security program, and personal data is subject to a roster of complex regulations and recommendations across the globe, including in Australia,” said Trustifi CEO and Co-founder Rom Hendler. “Trustifi continues to expand its global footprint, offering easy-to-implement compliance capabilities for our customers in a variety of countries. The Australian market is rife with opportunities for managed service providers, especially in complicated verticals such as healthcare and financial services, where sensitive patient and client data is subject to additional compliance needs. We’re proud to be able to offer new, more stringent geofencing capabilities to our customers who work in global markets, better securing their patients’ data while opening new potential sales avenues across the Australian business community.”

Trustifi offers a comprehensive suite of email cybersecurity solutions that leverage advanced AI-driven tools to accomplish what many traditional, gateway-based solutions can’t. They combat sophisticated image- and text-based, AI-generated attacks. This includes techniques like the resurgence of the “@” bypass strategy, where hackers surreptitiously insert “@” signs into URL names to disguise the phrasing of malicious links, which many security solutions can’t interpret. These disguised URLs pass through security filters without being flagged. Trustifi’s proof-of-concept scans have indicated an uptick of this method in recent months (after the “@” scam had seemingly receded for several years).

According to Trustifi’s data, the use of infected QR codes has also sharply increased, since hackers have realized that most security solutions treat QR codes as harmless images. Trustifi’s AI-driven tools and metrics are designed to root-out such tactics. This is opposed to traditional solutions that rely too heavily on age-old methods like the blacklisting of known nefarious IP addresses.

“Trustifi has been a committed technology partner for our business, providing superior security for our clientele and an ease-of-use that outpaces other security and encryption solutions,” said Jess Walker, founder/CISO, of Holocron, a Trustifi MSSP located in Brisbane, Australia. “Their ability to easily geofence data is a critical asset for MSSPs who work in sensitive verticals. It will allow more Australian customers to take advantage of Trustifi’s next generation, born-in-the-cloud capabilities in an environment where AI-based threats continue to escalate.”

Trustifi was recognized in the 2023 Gartner Market Guide for Email Security* for its Outbound Shield, Inbound Shield, and Account Compromise Detection solution. Trustifi’s solutions have repeatedly been acknowledged through awards from esteemed sources such as CRN Magazine, SourceForge, the American Business Association, ChannelVision magazine, Expert Insights, the Cybersecurity Breakthrough Awards, and the Golden Bridge Awards.

*Gartner, “Market Guide for Email Security”, Ravisha Chugh, Peter Firstbrook, Franz Hinner, 13 February 2023. GARTNER is a registered trademark and service mark of Gartner, Inc. and/or its affiliates in the U.S. and internationally and is used herein with permission. All rights reserved. Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings or other designation. Gartner research publications consist of the opinions of Gartner’s research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

https://go.trustifi.com/gartner-email

About Trustifi

Trustifi is a cybersecurity firm featuring solutions delivered on a software-as-a-service platform including sophisticated AI-driven tools. Trustifi leads the market with the easiest-to-use and deploy email security products providing both inbound and outbound email security from a single vendor. The most valuable asset to any organization, other than its employees, is the data contained in its email, and Trustifi’s key objective is keeping clients’ data, reputations, and brands safe from all threats related to email. With Trustifi’s Inbound Shield, Data Loss Prevention, and Email Encryption, clients are always one step ahead of attackers. www.trustifi.com

Follow Trustifi: TwitterLinkedIn, and Facebook.

Contact:
Suzanne Mattaboni
CommCentric Solutions
610 737-2140
smattaboni@commcentric.com

SOURCE: Trustifi



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com

Bureau Expands Its Southeast Asia Presence with Expansion into the Philippines and Indonesia

MANILA, Feb 1, 2024 – (ACN Newswire) – Bureau, a global leader in identity decisioning and fraud prevention, today announced its strategic expansion into two key Southeast Asian markets: the Philippines and Indonesia. This move solidifies Bureau’s commitment to providing comprehensive and cutting-edge fraud and risk prevention solutions to digital-first businesses in the region.

With a rapidly growing digital economy and constantly evolving regulatory compliance, Southeast Asia presents both exciting opportunities and significant challenges for FinTechs and Digital Banks. Fraudulent activity threatens to undermine trust and stifle growth, making robust fraud prevention measures crucial.

Bureau’s diverse suite of solutions tackles this problem head-on, empowering FinTechs across the region to:

Prevent fraudulent users from entering their systems: Bureau maps digital personas, using user’s email, phone, and social profiles, to physical identities and analyzes behavioral activity to identify and remove suspicious users effectively, in real-time.

Guard against evolving fraud tactics: From device intelligence to device fingerprinting and behavioral biometrics, Bureau offers a comprehensive ML-based arsenal to combat synthetic frauds and money mules.

Gain actionable insights on New-to-Credit Borrowers: Tokenized risk scores and contextual analysis provide clear, actionable insights, to guide informed decision-making with the help of alternative risk intelligence signals.

Leverage a powerful Trust Network: Bureau’s unique network, built based on millions of processed data across regions, assesses risk based on connections between digital personas, physical identities, and behaviour patterns, offering a deep understanding of individual users.

“We understand the specific challenges faced by financial services in Southeast Asia,” says Ranjan R Reddy, CEO of Bureau. “Our targeted solutions are designed to address these challenges related to new-to-credit borrowers against money mules, social engineering, and account takeovers offering a tactical approach that solves real-world fraud problems for businesses of all sizes.”

“Southeast Asia presents a fertile ground for tech innovation in financial services,” states Preekshit Gupta, VP of SEA and MEA at Bureau. “With the ever-evolving nature of fraud, having a trusted partner like Bureau is crucial for FinTechs and Banks going digital, to protect their investments and maintain their customers’ trust. We are proud to be their go-to partner for achieving sustainable growth through effective fraud prevention.”

Bureau’s entry into these key SEA markets in the Digital Lending and Banking space underscores its commitment to building a robust regional presence and empowering businesses to navigate the growing complexities of the digital financial landscape.

About Bureau

Bureau is a modern no-code fraud detection, and identity decisioning platform. It delivers accurate conclusions about the trustworthiness of digital identities to prevent fraud and ease compliance, resulting in seamless digital journeys for legitimate customers. The single AI-architected platform provides banks, fintechs, gaming, and gig economy companies with a complete range of fraud, risk and compliance solutions in over 100 markets globally.

Backed by leading global investors, including Quona Capital, Village global, Commerce Ventures, Okta (Nasdaq) , and GMO Payments (Tokyo), Bureau is headquartered in San Francisco, with a global presence in India, Southeast Asia, and the Middle east. Learn more at https://www.bureau.id/

This press release is issued through AsiaNewswire.net (www.asianewswire.net) a newswire service for Asia Pacific, South and Southeast Asia. The release is distributed by EmailWire (www.emailwire.com) the global newswire service that provides Press release distribution with guaranteed results.™

Media Contact:
Maruthi Kumar
maruthi@bureau.id   



Copyright 2024 ACN Newswire. All rights reserved. http://www.acnnewswire.com