Category Archives: Security

Join the movement: Share your anti-war art on social media using hashtags like #ArtOfPeace

TBILISI, Georgia, 15-Aug-2023 — /EPR INTERNET NEWS/ — This summer, four anti-war Russian emigrants came together through their involvement in the first-ever “Art of Peace” artist residency, backed by Campaigns for Humanity, the human rights-focused philanthropic arm of digital marketing agency Renaissance3. The initiative facilitates connection among artists affected by conflict and provides them with a platform to express their opposition to war and engage with their host communities.

“Art of Peace” innovators blend technology, self-expression to bring anti-war messages to life

Created through a collaboration of artists wishing to remain anonymous due to concerns for the safety of loved ones inside Russia, the cutting-edge project known as “Road Signs” uses augmented reality to catapult street art into the future: Users in Russia and neighboring countries who download the mobile app “AR Hunter” can point their smartphone camera at a road sign and see it transform into an animated artwork promoting peace.

“Road Signs,” whose message speaks directly to those potentially involved in armed conflict, will be integrated into the “AR Hunter” [http://arhunter.org/] app created by Anastasia Vladychkina, leader of the well-known art group Yav [https://taplink.cc/yav_zone], by the end of August.

Continuing the embrace of the latest applications of technology in art, prizewinning artist and “Art of Peace” resident Alisa Yoffe [http://alisayoffe.com/] led a masterclass on protest art in the virtual-reality world of “Xanax Tbilisi.” During the session, Yoffe virtually “walked” participants through the streets of Tbilisi to view protest art superimposed on elements of the cityscape. Emphasizing the collaborative nature of the project, Yoffe has invited all who wish to contribute their own anti-war graffiti to access the world of “Xanax Tbilisi” through the platform “VRChat [https://hello.vrchat.com/].”

Against the backdrop of war, a poignant artistic movement emerges

A heartfelt song born from the collective contemplation of 10 Russian emigrants when posed with the question, “What would you say to someone fighting in the war against Ukraine?” and titled “To the Russian Soldier,” culminates in the haunting refrain, “I want [you] to live… others will live too.”

Data reported [https://en.zona.media/article/2023/07/10/stats] in Mediazona underscore the grave risk born by those sent by Russia to fight: While military casualty data are classified, with those daring to report on the number of fallen soldiers prosecuted for spreading “fake news” about the army, as of late May 2023, at least 47,000 Russian men under the age of 50 had died in the war. Mediazona and Meduza estimated [https://en.zona.media/article/2023/07/10/stats] that 78,000 Russian soldiers may have been wounded or missing in action, bringing overall losses to 125,000. This figure stands in stark contrast with publicly disclosed information from Russia; as reported in Mediazona [https://en.zona.media/article/2023/07/10/stats], the last time the Ministry of Defence disclosed any casualty figures was in September 2022, when Sergei Shoygu announced that a total of 5,937 soldiers were killed in action.

Pioneering narratives for peace

Semra Fogel, an inaugural “Art of Peace” resident and architect of the “Verses are Louder than Bombs” workshop, gathered five anti-war poets at Reforum Space Tbilisi [https://reforumspaces.io/] this July for a collaborative art-making experience centered around song. In her own words, “I think art is a way to draw attention to this problem. If more people are going to use their art for this purpose and ask their friends to, we stand a better chance at peace. It’ll be better… for those who have already suffered from the war and for those defending themselves against further and further evil that this war brings.”

Fogel plans to build on her initial concept, with the goal of scaling it so more people feel prepared to produce protest art, whether collaboratively or individually. Reflecting on the five poets who participated in her flagship workshop, Fogel said, “I’m very proud of their work. I’m proud of my work because I managed to inspire them. It’s the coolest thing.”

Get involved

To participate in the Art of Peace movement, individuals and communities are encouraged to:

  • Share their anti-war artwork on social media using the hashtags #ArtofPeace#ИскусствоМира#IWantYouToLive, & #ХочуЧтобыЖил.
  • Contribute to the virtual gallery [https://campaignsforhumanity.com/art-of-peace] hosted by Campaigns for Humanity.
  • Host their own collaborative art-making meetups. The resident artists crafted a guide for members of the public to use, included below.

Guide to Hosting an Art of Peace Art-Making Meetup

  1. Gather a group of people and any art supplies you like or have access to. Old magazines, glue, and paper are all you need to create a collage!
  2. Together, look at a piece of art, such as one of those included in the virtual gallery [https://campaignsforhumanity.com/art-of-peace/]. Then discuss how it makes you feel, what you like about it; maybe what you didn’t understand or didn’t like about it.
  3. Spend some time as a group making art or poetry of your own, inspired by the discussion and the artwork. You might use the title “I want you to live” or “art of peace” to help guide you.
  4. Share your work on social media using the hashtag #ArtofPeace#ИскусствоМира#IWantYoutoLive, & #ХочуЧтобыЖил.

To stay up to date on the latest Art of Peace news, follow Campaigns for Humanity on TwitterFacebook, and Instagram.

SOURCE: EuropaWire

New online organizing platform serves  Russian-speaking anti-war activists worldwide as a centralized hub for initiatives

VILNIUS, 31-May-2023 — /EPR INTERNET NEWS/ — According to reporting in the Moscow Times, up to 1 million people have fled Russia in the wake of the full-scale invasion of Ukraine. Hailing from a diversity of backgrounds but united by an impassioned opposition to the invasion and unequivocal support for Ukrainian sovereignty, the anti-war Russian diaspora has established itself as a massive force driven by tireless emigres committed to justice.

Lana Pylaeva, the coordinator of Free Russia Netherlands, told independent media outlet Not My War, “To me, the greatest achievement is that we have established ourselves in the Netherlands as a community of war–opposing Russians. To achieve this, we have organized a whole complex of activities since the full-scale war.”

From collecting humanitarian aid for Ukrainians and running bots to help those in Russia avoid conscription; to in-person pickets, marches, and blanketing the streets with protest art; to launching a multinational project demanding the return of Ukraine’s stolen children, dubbed SaveChildrenFromPutinism.org; the opportunities to reject Russian state aggression are as multifaceted as the people spearheading them, and the rate of activity is enough to make the head spin.

Driving the opposition effort’s momentum are centralized hubs–such as the online platform Map of Peace–activists use to coordinate their activities and support one another. Originally launched just after the full-scale invasion as a means of connecting Russian-speaking anti-war activists across the globe, Map of Peace, bolstered by a recent Campaigns for Humanity award, is announcing a new goal of hosting every Russian anti-war initiative on its map. With 144 communities already on the map and growing by the dozens in recent months, project organizers are confident the updated platform’s one-stop-shop convenience will amplify the impact of the legions of expatriates agitating for peace.

As the war drags into its 16th month, there’s a renewed sense of urgency among anti-war advocates, fueled by evidence suggesting that their efforts are working. For example, activists with Feminist Anti-War Resistance (FAR), a movement hosted on Map of Peace, frequently engage in creative propaganda subversion techniques designed to appeal directly to those in Russia, such as creating “anti-lessons” parents can use to counter the effects of the militarization indoctrination imposed on Russian schoolchildren, and turning a favored Russian propaganda tool–tanks–on its head by posting to Google Maps photoshopped images of tanks covered in blood and featuring anti-war slogans.

Excerpt from Feminist Anti-War Resistance Facebook Post About Its “Anti-Lesson”: “Before May 9, propaganda ‘patriotic classes’ are held for many Russian schoolchildren and students, justifying the attack on Ukraine with the narrative of the Second World War. We studied the materials of ‘Conversations about the important things’ to May 9 and information on how educational institutions will celebrate this day. Based on what we’ve read, we have prepared an outline and materials for the Anti-Lesson for May 9th to initiate a conversation about anti-militarism and the causes of war.

Can exiled Russians’ ingenuity influence the outcome of the war? Recent reporting suggests so. According to Mediazona, Russian AWOL figures are soaring, surpassing the 2022 full‑year tally within the first four months of 2023. Both contract soldiers and conscripts are going AWOL, either by directly refusing orders to deploy to Ukraine or deserting from the front lines.

As stated by the Congress of Antiwar Initiatives on the one-year anniversary of the full-scale invasion, “We must keep resisting the regime together, support all forms of protest, change the minds of supporters of the war, help those who are in trouble because of the war and show solidarity by all means available and safe for us, let’s not be afraid to speak the truth! We urge Russians to refuse to participate in and help others to not take part in the criminal war and genocide of the Ukrainian people.” Join our mission for peace and justice for Ukraine. Visit www.mapofpeace.org today to ensure your initiative is represented.

SOURCE: EuropaWire

Probax Launches Object Storage Powered By Wasabi To Partners In North America, Australia, Singapore and Europe

NEW YORK, 2022-Aug-11 — /EPR INTERNET NEWS/ — Probax has announced the launch of Honeycomb Object Storage as a Service powered by Wasabi.

The purpose-built Object Storage solution was designed for MSPs that need secure and simplified long-term AWS S3 compatible cloud storage for their customer data. With no egress or API request charges, faster performance than public cloud and bulletproof ransomware protection, Probax makes object storage simple with pay-as -you-go pricing models.

As a 100%-channel partner centric business, this launch represents Probax’s continued mission to empower its MSP partners to deliver scalable and reliable ‘out-of-the-box ready’ data protection solutions that offer substantial benefits to their own MSP business, while delivering real value to the customers they service.

“Long-term data retention is now easier and more cost-effective than ever for MSPs,” said Sam Meegahage, COO at Probax. “With industry-specific security and compliance, guaranteed availability, and all-inclusive pricing, MSPs can get an upper hand with Probax’s Object Storage as a Service. This disruptive cloud storage solution opens up the floodgates for data – partners and customers can store more data, across multiple locations and environments.”

“As a market leader in MSP cloud data protection solutions, our new Honeycomb Object Storage gives our MSP Partners more choice and flexibility when it comes to protecting their customer’s data.”

Available to MSPs in North America, Europe, Australia and Singapore, Probax’s Object Storage solution contributes to Wasabi’s global expansion.

“Wasabi is committed to providing simple, affordable hot cloud storage that our strategic partners can bundle with their own solutions to deliver lower cost, high performance service to the market,” said Marty Falaro, EVP & COO, Wasabi Technologies. “As Wasabi expands globally, partners like Probax contribute significantly to our rapid growth. Honeycomb Object Storage as a Service powered by Wasabi brings together the best of both worlds so users benefit from leading-edge cloud technology that removes prohibitive costs and complex storage tiers and instead allows them to extract real value from unlimited amounts of data when and how they need to.”

Honeycomb Object Storage is integrated with Probax’s award-winning data protection platform Hive, delivering complete visibility and control for MSPs of their customer data protection services in one place.

Hive’s built-in automation, intelligence, security, and monitoring capabilities adds further value to MSPs who are looking to leverage cost-effective Object Storage.

Probax Honeycomb Object Storage also integrates seamlessly with Veeam Software. Veeam Backup & Replication supports object storage as a destination for long-term data storage. Similarly, Veeam Backup for Office 365 and cloud-specific offerings, such as Veeam Backup for AWS, Veeam Backup for Azure, Veeam Backup for Google Cloud Platform all support object storage.

For more information, visit: https://www.probax.io/products/object-storage-as-a-service

### ENDS ###

About Probax

Probax is an award-winning provider of MSP data protection solutions and services including data backup and retention, disaster recovery and business continuity. With unmatched partner enablement and support, together with continued innovation and integration with leading technology vendors including Veeam, StorageCraft, Dropbox and Microsoft; Probax empowers businesses to protect their most valuable asset, their data. Probax is a Wasabi Channel Partner and Platinum Veeam Cloud & Service Provider (VCSP) that was been awarded VCSP Innovation and VCSP Partner of the Year awards by Veeam Software. www.probax.io

About Wasabi Technologies

Wasabi provides simple, predictable and affordable hot cloud storage for businesses all over the world. It enables organizations to store and instantly access an unlimited amount of data at 1/5th the price of the competition with no complex tiers or unpredictable egress fees. Trusted by tens of thousands of customers worldwide, Wasabi has been recognized as one of technology’s fastest-growing and most visionary companies. Created by Carbonite co-founders and cloud storage pioneers David Friend and Jeff Flowers, Wasabi has secured nearly $275 million in funding to date and is a privately held company based in Boston. Wasabi is a Proud Partner of the Boston Red Sox, and the Official Cloud Storage Partner of Liverpool Football Club and the Boston Bruins. Follow and connect with Wasabi on Twitter, Facebook, Instagram, and The Bucket. www.wasabi.com

Via EPR Network
More Internet & Online press releases

Wind to implement identity verification solution from iDenfy

KAUNAS, Lithuania, 2022-Jan-18 — /EPR INTERNET NEWS/ — Countries worldwide are constantly striving to reduce emissions and make their cities greener. It leads to them prioritizing alternative, sustainable means of transportation. However, not everyone can afford an electric car and going to work or simply travelling in the city on a bus is rarely appealing.

E-scooters are a great solution to this problem. Wind is a great provider of them, offering its customers the ability to travel in the city in a fun and eco-friendly way. It allows people to travel less stressfully and more conveniently, making the cities less crowded at the same time. The company is constantly making an effort to help the environment and has recently partnered with Treedom to contribute to forestation. Wind operates in France, Iceland, Israel, Italy, Korea, Norway, and the United Kingdom.

Wind has decided to implement an identity verification solution to their industry and chose iDenfy, a company offering a powerful modern solution complying with the latest AML, KYC, and GDPR regulations, as their partner. Wind’s customers can now enjoy a seamless sign-up procedure, making the onboarding process easy, safe, and reliable. At the same time, the company can be assured of the user’s eligibility – iDenfy’s solution features AI-based biometric recognition and accepts more than 2000 document types from 200+ countries.

It is crucial for both the clients and Wind that the ID verification process is swift and seamless. People today are always rushing and are used to services being provided quickly. Every second counts. Fortunately, verifying one’s identity with iDenfy is just a few steps away at any given time. All the user has to do to get on board with Wind is upload the image of their driving license or ID card (depending on the market) for age & identity verification and wait a few seconds to get it confirmed. That’s it!

“We are glad to welcome Wind as our partner. Eco-friendly means of transportation are rising in demand, and it is a pleasure to contribute to a company providing the supply. With iDenfy’s ID verification, the customer onboarding process will be seamless and reliable,” said Domantas Ciulde, CEO of iDenfy.

Via EPR Network
More Internet & Online press releases

Decentralization and digital identity venture Manyone marks the 2nd year of its strategic collaboration with Blockchain@UBC

VANCOUVER, Canada, 15-Apr-2021 — /EPR INTERNET NEWS/ — Manyone, a pioneering technology venture in decentralization and digital identity, is delighted to announce that 2021 marks the second year of the strategic collaboration between Manyone and The Peer Social Foundation and the Blockchain@UBC research cluster at the University of British Columbia.

This academic-industry partnership is one of the first to critically assess the feasibility of decentralized social media, explore engineering possibilities and configure the privacy and security implications of self-ownership of social media data.

Blockchain@UBC Graduate researchers gain research opportunities at Manyone and The Peer Social Foundation by applying for grants from MITACS (Mathematics of Information Technology and Complex System), a Canadian non-profit research organization that fosters cross-sector collaboration and develops talents for the innovation ecosystem in Canada.

In the next year, UBC researchers will identify technical requirements for decentralized identities, design new system architecture, and explore the value and business models for blockchain-based identity management.

Chang Lu, Research Manager at Blockchain@UBC states that, “Manyone and The Peer Social Foundation offer an inspiring space for our students to sharpen their knowledge about blockchain. Their vision of decentralized social media represents a paradigm shift in the world of social networks. We are grateful that we can contribute to the shift”.

Michael Cholod CEO at Manyone and The Peer Social Foundation comments, “As a Vancouver based pioneering enterprise, we value the opportunity to work with academics and researchers in Canada to identify the social and organizational impact of decentralized identity and determine the privacy and security implications of self-ownership of social media data. The academics at UBC help us in understanding the bigger picture and how to look for real world solutions.”

Dr. Victoria Lemieux, Blockchain@UBC Co-Lead and Associate Professor at UBC’s School of Information, further adds that, “We’re excited to delve further into both the technological and policy ramifications of Manyone’s vision of securing digital data free from manipulation or distortion and to support technical and social innovation in Canada”.

Manyone, with offices in Vancouver, Canada and Stockholm, Sweden is launching the world’s first decentralised secure messaging and identity sharing platform in April 2021.

Manyone is a pioneering technology venture that aims to deliver private secure networks, private digital identities, to increase enterprise productivity and digital security. Manyone actively works with The Peer Social Foundation. The Peer Social Foundation and Manyone believe in empowering a distributed internet where everyone can feel in control of their digital identity. They do this by delivering a self-sovereign digital identity and decentralized social platform for enterprise and consumers. A critical component of this is to work beside and support vital education, R&D and the open-source community to connect people, businesses and governments.Find out more here: www.manyone.one

SOURCE: EuropaWire

Conference organiser company Confinn behind the largest web conference in Lithuania’s history

VILNIUS, 1-Apr-2021 — /EPR INTERNET NEWS/ — Three days, 6000 minutes of content, 300 speakers, and over 10,000 attendees. With its unprecedented scale, the Lithuanian Business Forum will certainly feature in every best practice handbook for virtual events. The largest web conference in the country’s history took place in early March and transformed a now-tired traditional online format into an unusual digital space, recreating the true feeling of a live event. Nine months of preparation, many complex technical challenges, and carefully curated content – the organisers are right to describe setting up this event as a true feat.

A 3-day interactive programme

On March 3rd-5th, the record-breaking Lithuanian Business Forum brought together experts from various fields – economists, politicians, business and management consultants – and created a unique space to share ideas and promote solutions amongst professionals. The event focused on digitalisation and the circular economy.

According to Dainius Baltrušaitis, organiser of the Lithuanian Business Forum and head of Confinn, a conference organiser company, many people have grown tired of the virtual format’s omnipresence events being online-only because of the pandemic. This is why this unprecedented conference for the Nordic-Baltic region elicited a radically different reaction from the public: it attracted a lot of early interest, and its engagement remained high during the entire event.

Organisers are convinced that this success was due to the innovative format of the event. The Forum lasted 3 days and included interactive presentations, discussions and webinars.

“Last year, the event was spread out across nine halls, so it was difficult for our attendees to visit everything physically. In order to make the experience more enjoyable this year we split the programme over several days, so people could have a chance to listen to whichever speaker they wanted to see. We are delighted to hear that our attendees reported feeling as if they’d visited a new and unique space after the event. The constant interactive migration from one hall to another generated excitement and made them feel like they were attending a “real” event”, said business psychologist Dainius Baltrušaitis.

 

Artūras Laucius, another leader at ‘Confinn’, explains that the dynamic platform not only drew in people but also allowed them to consume valuable content for the next six months. “We chose this format because it gives the content a lot more depth. While people at the event are not required to listen to all the speakers, they may want to view them at a completely different time that is more convenient to them. So a one-day event of this scale, once recorded, can turn into a month-long event, and a three-day event can become a three-month event”, he added.

The biggest organisational challenges

According to Artūras Laucius, an event of this scale requires very careful preparation. One of the main challenges was time and people management. In order to organise such a huge conference without any interruptions, preparations need to start no less than nine months in advance.

“It is important to have all technical solutions tested, as they cause many of the problems that organisers have to deal with. We were planning to have many attendees, and we were concerned that some of our programs would interpret so many connexions as being a cyber-attack, which would paralyse our servers. When performing “stress tests”, it is necessary to slowly increase the number of users, as one thousand, five thousand or more users bring with them different technical challenges. It is important always to be one step ahead – to know exactly what ten thousand attendees will see on their screens during the event, and how it’s actually going to work”, he explains.

When setting up the event, content selection is another important task. According to Dainius Baltrušaitis, selecting high-quality material takes longer than one would expect, and investing in promoting your event matters when you want to attract the best moderators to your event. “We approve about 30% of speakers. In our case, with 300 speakers and 20 days of content waiting to be approved, it takes a very long time to go through discussions regarding content with everyone and select the best candidates. This is a crucial but time-consuming process. Choosing the best content and ensuring that everything goes smoothly guarantees a successful event. Long-term experience and good knowledge of the region are very important, too”, he notes.

Our tip to keep viewers engaged

Virtual events are very time-sensitive, explains Dainius Baltrušaitis. While a speaker has two minutes to make an impression during a live event, they only have 30 seconds to grab the viewer’s attention in a virtual format.

 

“If you start introducing yourself in the first minute, this means your visibility has failed, and your message is doomed. In an online format, you have as little as thirty seconds to present your point and convince the viewer to listen on. This is then followed by the main point of the speech, expert insights, and three examples. During a live event, a member of the audience would often feel uncomfortable standing up in the middle of the hall and leaving the auditorium, asking fellow audience members to make room for them as they leave. Here, in a virtual event, all it takes is one second and a click to move to another digital space if the content is not catchy enough.

“Our content professionals put a lot of effort into making the speakers shine. Sometimes a speaker contacts us and claims that there is no way for them to shorten their 40-minute presentation. We would then ask them to write everything down on a piece of paper physically. We would normally delete most of the text, reducing it from 20 pages to about 2. Our recommendation is to limit presentations to 10 minutes,” he explains.

Dainius Baltrušaitis further explains that another important aspect is to have an interactive comment section, which the moderator can control. Upvoting interesting questions works as an additional encouragement for attendees to get involved.

“All conference organisers know how hard it is to get audience members to ask questions. When people are asked if they have any questions during a live event, there is usually an awkward silence. But our trick is inertia. You need to wait out that initial period and encourage the participants to get involved after 4–5 minutes when an avalanche of questions normally begins. In the virtual format, we’ve included interactive comment fields that initially feature a couple of questions that can be upvoted. This method is simpler than users having to take the first step themselves. Upvoting helps us engage with the audience, and it encourages them to write their own questions.” says Dainius Baltrušaitis, who is pleased that technical and content-related ‘know-how’ gained in this region is being replicated abroad. Confinn, which used to primarily work on the largest conferences in the Nordic-Baltic region, is receiving more and more enquiries from across Europe to help organise huge virtual events with up to 100,000 people.

SOURCE: EuropaWire

Manyone to launch the first decentralised secure messaging solution by Mid-2021

VANCOUVER, 24-Feb-2021 — /EPR INTERNET NEWS/ — Manyone Inc., a pioneering technology venture in decentralization and digital identity, is delighted to announce that it has entered into a new strategic relationship with the globally renowned University College London (UCL) Centre Blockchain Technology (CBT).

This partnership will support research conducted by UCL CBT’s Senior Research Associate, Dr Geoffrey Goodell, to explore and evaluate end-user technology systems, infrastructure, business imperatives, and regulatory policy to support the privacy, dignity, and market power of individual persons in the emerging digital economy. The research is aimed at identifying the requirements and approaches for systems whose features specifically support the advancement of truly consensual trust relationships, the empowerment of local communities, and the public interest.

Vancouver-based Manyone believes in empowering solutions and technologies with the potential to produce a new, distributed internet where everyone can feel safe, secure and in control of their digital identity.

Dr Paolo Tasca, Founder and Executive Director of the UCL Centre for Blockchain Technologies, notes that, “On behalf of UCL and the Centre for Blockchain Technologies, I am delighted to begin our new partnership with international industry partners Peer Social Foundation and Manyone. We are grateful for their support and recognition of the impactful research being done to meet our shared ambitions. Thanks to their generosity we will continue our proud tradition of enabling academic research with real-world application.”

Michael Cholod CEO at Manyone and Executive Director of The Peer Social Foundation comments, “As a dedicated group of decentralists, our teams look to find ways to free communication from manipulation and control by protecting individual, business or governmental digital identities. Part of that mission is to work with the most respected and knowledgeable people in the field. The team at UCL represent some of the best thinkers in the area and we’re honoured to work with them.”

Dr Geoffrey Goodell, Senior Research Associate at UCL Centre for Blockchain Technologies, specifically ads that, “The funding from The Peer Social Foundation and Manyone will provide vital resource to explore and evaluate user-controlled identity management, decentralised social networks, and tokenisation as vehicle for authorisation without identification. Our partnership will support the advancement of trusted relationships in the digital economy, the empowerment of local communities for the benefit of public interest. I am excited to deepen our collaboration and share our insights.”

Manyone, with offices in Vancouver, Canada and Stockholm, Sweden are looking to launch the first decentralised secure messaging solution by Mid-2021.

Manyone is a pioneering technology venture that aims to deliver private secure networks and private digital identities, to increase personal and enterprise productivity and digital security. Manyone actively works with The Peer Social Foundation on education and research into topics of interest to consumers and enterprise. The Peer Social Foundation and Manyone believe in empowering a distributed internet where everyone can feel in control of their digital identity. They do this by delivering a self-sovereign digital identity and decentralized communication and sharing platform for enterprise and consumers. A critical component of this is to work beside and support vital education, R&D and the open-source community to connect people, businesses and governments.

Find out more here: www.manyone.one and http://blockchain.cs.ucl.ac.uk/

SOURCE: EuropaWire

Xverify opens an office in Dublin, Ireland

DUBLIN, 19-Mar-2019 — /EPR INTERNET NEWS/ — Xverify, a TowerData company, is addressing the needs of European email marketers for data quality, GDPR compliance and superior support by processing data within the European Union and opening an office in Dublin. Xverify is a leader in Email Verification services, and has verified more than 11 billion emails since 2011.

All data submitted to Xverify for Email Verification by European-based clients will now be processed on servers located within the EU, giving clients more oversight of their customers’ data. Xverify is fully compliant with European data security regulations including GDPR, and has been processing European data for more than 7 years.

Xverify has also opened a local office in Dublin with dedicated staff covering accounts based in the European Union.

“Email Verification is a vital tool for marketers around the world to ensure data cleanliness, improve deliverability and prevent fraud.” said Rob Huey, Xverify CEO. “We know that keeping the customer data of our clients within the European Union gives them peace of mind, and opening a Dublin office ensures they have a trusted representative they can call on their time.”

Xverify’s Email Verification allows marketers to identify undeliverable or risky emails on their marketing list or on their webforms in real-time thanks to a flexible API. By maintaining clean, accurate data, marketers are able to better reach their customers, avoid fraud and boost their sender reputation. Hundreds of companies around the world trust Xverify with their data verification needs everyday.

Xverify is an industry leader in email verification that helps digital marketers improve email deliverability by eliminating hard bounces, reducing spam complaints, and minimizing fraud in milliseconds. Validation can occur directly on your site in real time, or you can upload a list and get results. Make your email marketing more effective and improve delivery and response today.

SOURCE: EuropaWire

PG Services will be demonstrating DB CyberTech’s GDPR solution during Elastic{ON} Frankfurt on October 30, 2018

SAN DIEGO, CA, USA, 29-Oct-2018 — /EPR INTERNET NEWS/ — DB CyberTech, a pioneer in machine learning based predictive data loss prevention, today announced that it is launching into the European market through a partnership with PG Services of Luxembourg. PG Services joins DB CyberTech’s growing partner ecosystem focused on bringing the next generation of truly intelligent cybersecurity solutions to market. DB CyberTech’s European operations will be headquartered in London.

“We’re excited to begin our new partnership with DB CyberTech. PG Services is known for selecting best in class solutions and integrating them into the Elastic SIEM for our global clients,” said Ali Alaie, Managing Director of PG Services. “After careful review and engineering investment in Europe, we selected DB CyberTech’s patented and award winning compliance and security platform to build a modernized connector that now presents critical GDPR discovery and classification data through the Elastic interface. We’re making DB CyberTech’s innovative platform for compliance and security available to all of our global Elastic clients. I’m pleased to showcase the integrated solution at this weeks Elastic{ON} conference in Frankfurt.”

DB CyberTech solutions enable customers with real-time visibility into their structured data for data security and GDPR compliance. The GDPR compliance solution is based on natural language processing to enable automated and continuous identification of high-value and sensitive personal data.

“We’re truly impressed with PG Services extensive experience with Data Analytics and Elastic value-added integrated solutions,” said Ali Hedayati, COO and President of DB CyberTech. “Our solution integration with PG Services Elastic-centric technology enables visualization, analysis, and searching of host intrusion detection alerts. The integration provides customers with comprehensive visibility, intelligent data classification, and automated machine learning for detection of suspicious activity in the data tier for security and GDPR compliancy.”

PG Services will be demonstrating DB CyberTech’s GDPR solution during Elastic{ON} Frankfurt on October 30, 2018.

SOURCE: EuropaWire

Advanced Data Classification now available for DB CyberTech’s #Predictive Data Loss Prevention and #GDPR solutions

SAN DIEGO, CA, United States, 27-Aug-2018 — /EPR INTERNET NEWS/ — DB CyberTech, a pioneer in machine learning based predictive data loss prevention, today announced advanced data classification for structured data as a new capability of their security and privacy platform. This new capability supports compliance with EU’s General Data Protection Regulation (GDPR).

DB CyberTech’s advanced data classification utilizes natural language processing to continuously and accurately identify high value sensitive data such as personal data, intellectual property, and financial information. With this capability, privacy professionals and Data Protection Officers are now able to focus more of their attention on a set of databases that store sensitive data and therefore pose the greatest risk to the organization.

Advanced Data Classification is available now for DB CyberTech’s Predictive Data Loss Prevention and GDPR solutions. Data classification operates completely non-intrusively by analyzing database conversations. No database login credentials are necessary and there’s no impact on database performance.

“To defend against today’s security threats to structured data, DB CyberTech offers database asset discovery, automatic data classification, and continuous monitoring to identify where sensitive data is stored along with which clients and applications process sensitive information,” said Brett Helm, CEO of DB CyberTech. “We then apply machine learning and behavioral analytics to pinpoint rogue activities including insider threats.”

SOURCE: EuropaWire

Racing Towards Retailization: WishKnish and InstantAccess.io Bring Down Usability Barriers to True Blockchain Adoption

Washington, DC, USA, 2018-Jan-08 — /EPR INTERNET NEWS/ — What does the average retail user think about blockchain technology? A few words that frequently come up are: confusing, abstract, scary, complicated, overwhelming. Not exactly wide adoption territory. But one innovative company hopes to change that.

Any great technological revolution goes through stages, each with its own unique challenges. Blockchain technology is still in its infancy, and yet it’s already rearing to change the world. However, before it can “grow up”, it has to be accepted by the harshest audience of all: the average retail consumer.

So, how does one make the average consumer fully understand blockchain tech? If you ask Alisa Gus, CEO of WishKnish (https://wishknish.com) – you don’t.

“When you get into your car in the morning, do you need to understand the principles of internal combustion in order to get your engine revved up? I don’t think so,” Alisa says. “Neither do you need to understand how SSL encryption works in order to make a secure e-commerce purchase. Any great technology has to fit transparently into your routine so that you use it successfully without thinking. That is what needs to happen to blockchain tech before it can be fully embraced.”

WishKnish, the social, gamified marketplace platform startup based out of the Washington, DC area, has been making great strides in bringing much-needed usability improvements to the often complicated process of obtaining and transacting in cryptocurrencies – virtual tokens encrypted using a secret hash and decentralized across multiple distributed “ledgers”.

Last month WishKnish announced a key partnership with UK biometric security firm BioSSL to replace the convoluted and oft-problematic “private key” used to unlock cryptocurrency wallets, with army-grade biometric security measures and other layers of authentication.

Michael Kapoor, former managing partner at Propeller Venture Capital and newly minted COO of WishKnish is no stranger to untangling the usability struggles commonly encountered in this nascent space. “If you’ve ever lost your private key, your tokens are as good as gone,” Mr. Kapoor says. “This level of risk is simply unacceptable for the average user. This is just one example of the evolutionary challenges we are addressing with the WishKnish platform.”

Now, the ambitious team is staring off 2018 by partnering with InstantAccess.io, a usability startup based out of Berlin, Germany that helps users save time filling out form online by maintaining their own private, secure repository that can be easy tapped into with a single click. Previously stored form fields can be updated across the entire network, making changes easy.

“It’s as simple as logging in via Facebook or Twitter – just click the icon, authenticate, and the necessary data will automatically be sent to the app,” explains Eugene Teplitsky, CTO of WishKnish and Alisa’s partner. “Since our goal is to accommodate a wide range of storefront communities, we anticipate a broad need for information that users could potentially exchange with them, from the mundane – like shoe size or dietary preference – to more complex, harder-to-remember details – like blockchain wallet addresses. InstantAccess.io will save users a ton of time, and shave off another layer of usability barriers between blockchain technology and full adoption among retail users.”

“We are super excited about the partnership with WishKnish as we believe blockchain technology is becoming widely adopted by everyday users”, says Rick Chen, director at InstantAccess.io. “Our aim is simple, we want the InstantAccess app to save users time, make their life easier, especially in adopting new and exciting technologies like blockchain.”

The future for retailization of user-facing blockchain marketplaces has never been brighter.

About WishKnish Corp.
WishKnish (https://wishknish.com) offers businesses, affiliates, and non-profits a decentralized marketplace platform for launching gamified, socially-engaged storefront communities equipped with the tools to turn regular users into super-fans and evangelizers while streamlining coin-agnostic e-commerce and fulfillment, as well as offering advanced blockchain-as-a-service tools to meet enterprise clients’ needs.

About InstantAccess.io
InstantAccess is an app that saves all kinds of user information/preferences securely and privately. Users can then re-use this information online and offline with just one click. From emails to shoe sizes to blockchain wallet addresses, InstantAccess makes it easier to access services.

Contact-Details:

WishKnish Corp.,
P.O. Box 2160, Reston,
VA 20195
(202) 800-2663
info@wishknish.com,
https://wishknish.com

Via EPR Network
More Internet & Online press releases

Axiomatics offers fine-grained policy-based access control and dynamic data masking and filtering

CHICAGO, Oct-05-2017 — /EuropaWire/ — Axiomatics, the leader in fine-grained dynamic authorization, today announced that KuppingerCole has profiled its data-centric dynamic authorization suite in a recent analyst report titled, “Executive View – Axiomatics Data Security.” The report sheds light on two flagship products; Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control mechanism across different types of data stores, and centralizes policy-based authorization rules for access to the content within these data stores.

KuppingerCole’s Executive View describes the solutions in detail and offers advice to IT professionals looking for data-centric security. The Axiomatics Data Access Filter offers policy-based access control and dynamic data masking and filtering for relational databases. Implemented as a database proxy, the product intercepts all connections to the database from any user or application and analyzes every SQL statement for potential violations of applicable security policies. In accordance to the ABAC approach, the authorization service may query multiple attribute sources for additional context information needed for a fine-grained access decision.

SmartGuard™ for Big Data (the most recent addition to Axiomatics’ data security portfolio) extends ABAC-based dynamic authorization to Hadoop Big Data stores. There’s a growing need to ensure consistent fine-grained access control and maintain regulatory compliance for Hadoop. These infrastructures often comprise multiple loosely coupled components, and Big Data stores are used to store massive amounts of data from numerous sources with multiple applications accessing them simultaneously. Utilizing ABAC for transparent dynamic access control to a Big Data store for multiple analytics applications allows enterprises to combine all the benefits of a single data warehouse with the traditional siloed approach, where each application has access only to its own data silo.

“For years, we have been tracking the information security market. As data security threats rise, Axiomatics continues to lead by offering solutions that help companies with fine-grained policy-based access control and dynamic data masking and filtering. Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data are a natural expansion of the company’s comprehensive suite of dynamic authorization solutions,” said Alexei Balaganski, lead analyst for KuppingerCole and author of the report. “Whether deployed standalone or as a part of an enterprise-wide ABAC infrastructure, these products provide an additional dynamic security and access control layer around multiple data stores transparently and without any application changes.”

“Our relentless focus on solving the toughest problems in data-centric security, have made Axiomatics the choice for IT professionals and companies looking for data security solutions to complex big data environments,” said Gerry Gebel, vice president of business development at Axiomatics. “We are honored to have such a distinguished analyst like KuppingerCole continue to review our suite of products. Their reports further underscore its commitment to delivering cutting-edge information on data security in the era of digital transformation.”

For more information about Axiomatics, visit www.axiomatics.com. For more information on KuppingerCole, visit https://www.kuppingercole.com.

SOURCE: EuropaWire

SecBI’s software provides early and accurate detection of advanced cyber threats

Tel Aviv, Israel and Rome, Italy, 26-Sep-2017 — /EuropaWire/ — SecBI, a leading developer of advanced cybersecurity threat detection solutions, and Innovery, a leading ICT services provider and software developer, today announced a partnership for distributing SecBI products in Italy and Spain.

“Traditional security means are simply insufficient in dealing with advanced threats, leading to an average dwell time of 100 days before the attack is identified,” said Gilad Peleg, CEO of SecBI. “With SecBI, we can drastically reduce this time span to hours and provide the analyst with early and accurate detection with no false alerts. We are delighted to partner with Innovery, who have the expertise and reach to promote SecBI’s solution to the Italian and Spanish customers who need it.”

“In order to be always ahead of our competitors and offer the best possible services, Innovery invests a lot in new technologies,” said Mr. Gianvittorio Abate, CEO and co-founder, Innovery. “Hence our collaboration with SecBI, a company that we feel has the potential for a great future in the security arena.”

SecBI’s software provides early and accurate detection of advanced cyber threats, including those that are hidden from other systems. By providing full-scope analysis of threats — including all involved users, devices, domains, IPs, C&C servers, drop points and more — SecBI makes mitigation fast and accurate.

Innovera and SecBI will present SecBI’s solution at Cybertech Europe 2017, taking place on September 26-27 at Roma Convention Center – La Nuvola.

SOURCE: EuropaWire

ExpressVPN sostenere organizzazioni noprofit per proteggere libertà e della privacy in internet

TORTOLA, Isole Vergini Britanniche, 27-Feb-2017 — /EPR INTERNET NEWS/ — Riflettendo la diversità degli utenti VPN in tutto il mondo, ExpressVPN è lieta di presentare ExpressVPN.com in 6 nuove lingue:

Tedesco: (www.expressvpn.com/de)
Olandese: (www.expressvpn.com/nl)
Norvegese: (www.expressvpn.com/no)
Italiano: (www.expressvpn.com/it)
Spagnolo: (www.expressvpn.com/es)
Portoghese: (www.expressvpn.com/pt)

Milioni di persone in tutto il mondo possono ora consultare il contenuto di ExpressVPN nella loro lingua madre per scoprire:

  • In che modo una VPN aiuta le persone ad utilizzare internet in modo sicuro e privato
  • Informazioni riguardo le posizioni server di oltre 87 paesi di ExpressVPN
  • Notizie riguardo gli ultimi software ExpressVPN, incluse nuove funzioni e compatibilità
  • Consigli per scegliere la posizione server VPN migliore per accedere a diversi tipi di contenuto
  • Un elenco completo di servizi e siti web che si possono sbloccati con una VPN

ExpressVPN si impegna a rendere la vita delle persone di tutto il mondo più semplice, grazie ad un utilizzo di internet privato, sicuro e libero.

SOURCE: EuropaWire

New Canadian Security Company Fighting Worldwide Corporate Espionage and Advanced Attackers

Information theft, or hacking, is extremely common in the business world. Companies with the most valuable information are under constant attack and need of sophisticated defense team. The Arc4dia team of experts has years of practical experience in the field of high-level cyber attacks and can help businesses to protect their privacy.

Snow Cover is the main defense service offered by Arc4dia. It is the first cyber security monitoring service truly aimed at advanced persistent attacks. Unlike the plethora of other services claiming to protect organizations against advanced persistent threats (APTs) while relying on the same technologies and people behind Anti-Virus, Arc4dia defense service is built from the ground up to provide a real fight against the advanced attackers using strategic and transparent techniques.

For a company with sensitive information, installing security software is not enough. Hackers constantly evolve, using new exploits to get past stationary defenses. That means a company’s defense strategy must also evolve in response. “We’ve helped clients to get rid of an attacker they didn’t know they had before we came in. The only hint the client had in a span of three years, was that they started losing critical contracts to a foreign competitor ” said Roberge, Arc4dia founder.

For a limited time, Arc4dia offers Early Snow Program as a trial for Snow Cover. ESP is a program aimed to organizations that are likely to be victims of advanced targeted attacks. This program is completely free. The main benefits to the program participants: cutting edge 24/7 surveillance, evolving detection and immediate mitigation of targeted threats, and all this in transparent manner that won’t impact the running of your business.

About Arc4dia
The passionate team of researchers at Arc4dia has extensive experience in IT security in the Intelligence and Law Enforcement world with a combined talent that continuously strives to be the best in mobile security. Arc4dia protects some of the most valuable and critically sensitive information in the world, including intellectual property, manufacturing processes, military research, pharmaceutical research, and more. For more information, visit www.arc4dia.com or call 1-866-598-4317.

Via EPR Network
More Internet & Online press releases

Alentus teams with GamaSec to provide Web Application Security services

Alentus announced today its partnership with GamaSec, a remote online website security scan service. GamaScan identifies web application vulnerabilities, provides real-time vital business solutions, and recommends optimally matched solutions.

Clearly, Web applications are the weakest link in an organization’s security strategy. Web applications are more difficult to protect than traditional applications that reside behind a firewall. Web application security needs to be stringently checked on a regular basis using an automated Web application security scanner.

GamaSec’s commercial solution, branded “GamaScan”, is a remote online web vulnerability-assessment service. delivered via SaaS (software-as-a-service) and is designed to identify security weaknesses in web applications. The GamaSec Application Vulnerability Scanner identifies application vulnerabilities (e.g. Cross Site Scripting (XSS), SQL injection, Code Inclusion etc.) as well as site exposure risks. It also ranks threat priority, produces highly graphical, intuitive HTML reports, and indicates site security posture by vulnerabilities and threats.

Avi Bartov, GamaSec CEO comments, “Our core business is to help our partners mitigate risks on their website by providing real-time evaluation reports and recommendations. We provide service 24 hours a day, 7 days a week. Application vulnerabilities are the Achilles heel in the protection of websites. It is better to know your weaknesses and fix them than wait to respond after an attack.”

“At Alentus, we strive to offer our customers the highest quality extensive range of services that small businesses need to maintain a successful online presence” says Peter McNeill, Sales Manager at Alentus Corporation. “After learning about GamaSec and their web vulnerability assessment service, I felt that this partnership adds a valuable set of tools to assist Alentus with what it needs to succeed in today’s security conscious Internet.”

The partnership agreement will enable Alentus Corporation to offer GamaSec’s website scan security services – which include blacklist monitoring and application vulnerability scanning services – to their shared web hosting and dedicated server clients.

Alentus will use GamaSec’s private partner interface to deliver and manage the delivery of the entire range of GamaSec services.

Via EPR Network
More Internet & Online press releases

New Firewall Hacking Book By HackerStorm For Penetration Testing & Ethical Hackers, Cowboy Testers Beware!

HackerStorm.com has published a new ebook aimed at ethical hackers and security professionals who hire or manage penetration testing services.

‘Firewall Hacking Secrets For Security Professionals’, available via Amazon.com for kindle, is the first ebook in the series. For many, firewall’s are the first line of defence and with high profile hacking incidents on the rise, the requirement for good firewall testing is now essential.

Timur Mehmet, author of the ebook and creator of HackerStorm.com comments:
“Firewall testing and hacking was an easy choice as a first publication, many depend heavily on firewall security and a lot of organisations are being targeted for all manner of reasons which creates a demand for regular firewall testing”.

Timur Mehmet adds: “The aim of the ebook is to give people enough knowledge to enable managers and penetration testers to ask the right questions so that they can create a more meaningful test scope and test plan. All too often the testers ask what the customer wants and the customer really has no idea, all they know is they are worried about Anonymous, LulzSec and the rise in activity from Iran and China but have no idea on how to approach the testing or how to evaluate the testers”.

“Unfortuntately, some testers out there relish this situation becuase it enables them to do the minimum amount of work for the maximum amount of money leaving the hiring managers with a huge false sense of security, on the flip side, there are many penetration testers and ethical hackers who want to know if what they are doing is in line with best practice as most books on the subject provide very little information other than to download and install some free tools”.

‘Firewall Hacking Secrets For Security Professionals’ is a vendor neutral guide aimed purely at testing firewall technology. The book does not focus on how to use various tools or explain basic networking like virtually all hacking books to date. The HackerStorm.com ebook gets straight to it.

A summarised checklist is also provided to help create a test plan and to enable all parties to discuss the scope of testing to ensure the project is relevant.

The book is currently available in Kindle format via Amazon for immediate download with further formats plannned in the future. To stay informed about new tools and ebooks, you can follow hackerStorm.com on Twitter at @hackerstorm.

Via EPR Network
More Internet & Online press releases

Nothing’s Safe In Cyberspace Says Leo Impact Security

What do the NSA, the Army and Sony Corporation have in common with US embassies around the world? All of them, along with over 2,500 other entities, have been compromised by hackers like Wikileaks and Antisec. The cost of these cyber-crimes has mounted to over $3 billion a year. And “the little guy” isn’t safe, either. Everyone who uses the internet is at risk, despite the increasing use of antivirus software, IDS/IDP and firewalls in the current security models.

Today Leo Impact Security is exposing top secret methods used by cyber criminal’s also defending preventive methods because today all corporate, personal, and government computers are vulnerable to remote cyber attacks.

How do cyber criminals bypass current security model?

1. Antivirus bypass using crypters and protectors with random encryption methods
(ex: cypherx, Themida).
2. Firewall bypass using known ports in malware like port 80 and 8080.
3. IDS/IPS avoid using SSL encryption+ DNS tunneling-based malware (BOTS, RAT).
4. Remote access to any computer using Zero day exploits (.doc, .PPT, and .PDF individual files), Java silent driveway, browser packs, Router DNS MITM, and pen testing tools – Core impact, immunity canvas, Metasploit Pro etc.

For Proof of concepts/Live demos, check our site: http://www.leoimpact.com

How to defend against advanced cyber attacks?

Use m2 security model developed by cyber security expert Manish Kumar, chief research officer at Leo Impact. All of the following services are nonprofit as per our Corporate Social Responsibility (CSR).

1. World’s first free antivirus scanning online engine which protects your PC from viruses, trojans, spyware, rootkits, and other malicious programs (zero day exploits) and attachments by using 32+ antivirus on cloud. Visit: www.balajiplus.com

2. To protect against unknown malware (rootlets, trojans, BOTS-Zesus, spyeye, Ghostrat, etc.) and zero day exploits attacks using Neutron+ Protection system software in PC.

3. To protect against remote-based attacks like DDOS, Sql Injections, XSS, and buffer overflow, use cloudflare.com on servers and Free VPN providers ( www.usaip.euwww.vpnreactor.comwww.torproject.orgwww.hotspotshield.com )

4. To protect against data & information leakage and other attacks, use our two-way authentication and free security analysis and consultancy.

Via EPR Network
More Internet & Online press releases

TrustTone Communications Appliances – Voted BEST BUY for Email Encryption

TrustTone Communications, Inc., the leader in Email Encryption technology, today announced it has been rated Best Buy by SC Magazine. The Best Buy designation reflects the coveted Five Star rating for every aspect of the product – Features, Ease of Use, Performance, Documentation, Support and Value for Money. TrustTone continues to provide the most comprehensive feature set at the lowest cost.

“Simple, effective, secure. This is just what this doctor ordered.” notes SC Magazine.

“TrustTone is the perfect solution for email privacy compliance for organization large and small. The product offers depth of functionality and configuration flexibility with very low total cost of ownership,” said Hemant Thakkar, CEO of TrustTone Communications. “We are thrilled to earn the Best Buy designation by SC Magazinne. It validates our approach to creating value for our customers.”

Via EPR Network
More Internet & Online press releases