Category Archives: Security

Decentralization and digital identity venture Manyone marks the 2nd year of its strategic collaboration with Blockchain@UBC

VANCOUVER, Canada, 15-Apr-2021 — /EPR INTERNET NEWS/ — Manyone, a pioneering technology venture in decentralization and digital identity, is delighted to announce that 2021 marks the second year of the strategic collaboration between Manyone and The Peer Social Foundation and the Blockchain@UBC research cluster at the University of British Columbia.

This academic-industry partnership is one of the first to critically assess the feasibility of decentralized social media, explore engineering possibilities and configure the privacy and security implications of self-ownership of social media data.

Blockchain@UBC Graduate researchers gain research opportunities at Manyone and The Peer Social Foundation by applying for grants from MITACS (Mathematics of Information Technology and Complex System), a Canadian non-profit research organization that fosters cross-sector collaboration and develops talents for the innovation ecosystem in Canada.

In the next year, UBC researchers will identify technical requirements for decentralized identities, design new system architecture, and explore the value and business models for blockchain-based identity management.

Chang Lu, Research Manager at Blockchain@UBC states that, “Manyone and The Peer Social Foundation offer an inspiring space for our students to sharpen their knowledge about blockchain. Their vision of decentralized social media represents a paradigm shift in the world of social networks. We are grateful that we can contribute to the shift”.

Michael Cholod CEO at Manyone and The Peer Social Foundation comments, “As a Vancouver based pioneering enterprise, we value the opportunity to work with academics and researchers in Canada to identify the social and organizational impact of decentralized identity and determine the privacy and security implications of self-ownership of social media data. The academics at UBC help us in understanding the bigger picture and how to look for real world solutions.”

Dr. Victoria Lemieux, Blockchain@UBC Co-Lead and Associate Professor at UBC’s School of Information, further adds that, “We’re excited to delve further into both the technological and policy ramifications of Manyone’s vision of securing digital data free from manipulation or distortion and to support technical and social innovation in Canada”.

Manyone, with offices in Vancouver, Canada and Stockholm, Sweden is launching the world’s first decentralised secure messaging and identity sharing platform in April 2021.

Manyone is a pioneering technology venture that aims to deliver private secure networks, private digital identities, to increase enterprise productivity and digital security. Manyone actively works with The Peer Social Foundation. The Peer Social Foundation and Manyone believe in empowering a distributed internet where everyone can feel in control of their digital identity. They do this by delivering a self-sovereign digital identity and decentralized social platform for enterprise and consumers. A critical component of this is to work beside and support vital education, R&D and the open-source community to connect people, businesses and governments.Find out more here: www.manyone.one

SOURCE: EuropaWire

Conference organiser company Confinn behind the largest web conference in Lithuania’s history

VILNIUS, 1-Apr-2021 — /EPR INTERNET NEWS/ — Three days, 6000 minutes of content, 300 speakers, and over 10,000 attendees. With its unprecedented scale, the Lithuanian Business Forum will certainly feature in every best practice handbook for virtual events. The largest web conference in the country’s history took place in early March and transformed a now-tired traditional online format into an unusual digital space, recreating the true feeling of a live event. Nine months of preparation, many complex technical challenges, and carefully curated content – the organisers are right to describe setting up this event as a true feat.

A 3-day interactive programme

On March 3rd-5th, the record-breaking Lithuanian Business Forum brought together experts from various fields – economists, politicians, business and management consultants – and created a unique space to share ideas and promote solutions amongst professionals. The event focused on digitalisation and the circular economy.

According to Dainius Baltrušaitis, organiser of the Lithuanian Business Forum and head of Confinn, a conference organiser company, many people have grown tired of the virtual format’s omnipresence events being online-only because of the pandemic. This is why this unprecedented conference for the Nordic-Baltic region elicited a radically different reaction from the public: it attracted a lot of early interest, and its engagement remained high during the entire event.

Organisers are convinced that this success was due to the innovative format of the event. The Forum lasted 3 days and included interactive presentations, discussions and webinars.

“Last year, the event was spread out across nine halls, so it was difficult for our attendees to visit everything physically. In order to make the experience more enjoyable this year we split the programme over several days, so people could have a chance to listen to whichever speaker they wanted to see. We are delighted to hear that our attendees reported feeling as if they’d visited a new and unique space after the event. The constant interactive migration from one hall to another generated excitement and made them feel like they were attending a “real” event”, said business psychologist Dainius Baltrušaitis.

 

Artūras Laucius, another leader at ‘Confinn’, explains that the dynamic platform not only drew in people but also allowed them to consume valuable content for the next six months. “We chose this format because it gives the content a lot more depth. While people at the event are not required to listen to all the speakers, they may want to view them at a completely different time that is more convenient to them. So a one-day event of this scale, once recorded, can turn into a month-long event, and a three-day event can become a three-month event”, he added.

The biggest organisational challenges

According to Artūras Laucius, an event of this scale requires very careful preparation. One of the main challenges was time and people management. In order to organise such a huge conference without any interruptions, preparations need to start no less than nine months in advance.

“It is important to have all technical solutions tested, as they cause many of the problems that organisers have to deal with. We were planning to have many attendees, and we were concerned that some of our programs would interpret so many connexions as being a cyber-attack, which would paralyse our servers. When performing “stress tests”, it is necessary to slowly increase the number of users, as one thousand, five thousand or more users bring with them different technical challenges. It is important always to be one step ahead – to know exactly what ten thousand attendees will see on their screens during the event, and how it’s actually going to work”, he explains.

When setting up the event, content selection is another important task. According to Dainius Baltrušaitis, selecting high-quality material takes longer than one would expect, and investing in promoting your event matters when you want to attract the best moderators to your event. “We approve about 30% of speakers. In our case, with 300 speakers and 20 days of content waiting to be approved, it takes a very long time to go through discussions regarding content with everyone and select the best candidates. This is a crucial but time-consuming process. Choosing the best content and ensuring that everything goes smoothly guarantees a successful event. Long-term experience and good knowledge of the region are very important, too”, he notes.

Our tip to keep viewers engaged

Virtual events are very time-sensitive, explains Dainius Baltrušaitis. While a speaker has two minutes to make an impression during a live event, they only have 30 seconds to grab the viewer’s attention in a virtual format.

 

“If you start introducing yourself in the first minute, this means your visibility has failed, and your message is doomed. In an online format, you have as little as thirty seconds to present your point and convince the viewer to listen on. This is then followed by the main point of the speech, expert insights, and three examples. During a live event, a member of the audience would often feel uncomfortable standing up in the middle of the hall and leaving the auditorium, asking fellow audience members to make room for them as they leave. Here, in a virtual event, all it takes is one second and a click to move to another digital space if the content is not catchy enough.

“Our content professionals put a lot of effort into making the speakers shine. Sometimes a speaker contacts us and claims that there is no way for them to shorten their 40-minute presentation. We would then ask them to write everything down on a piece of paper physically. We would normally delete most of the text, reducing it from 20 pages to about 2. Our recommendation is to limit presentations to 10 minutes,” he explains.

Dainius Baltrušaitis further explains that another important aspect is to have an interactive comment section, which the moderator can control. Upvoting interesting questions works as an additional encouragement for attendees to get involved.

“All conference organisers know how hard it is to get audience members to ask questions. When people are asked if they have any questions during a live event, there is usually an awkward silence. But our trick is inertia. You need to wait out that initial period and encourage the participants to get involved after 4–5 minutes when an avalanche of questions normally begins. In the virtual format, we’ve included interactive comment fields that initially feature a couple of questions that can be upvoted. This method is simpler than users having to take the first step themselves. Upvoting helps us engage with the audience, and it encourages them to write their own questions.” says Dainius Baltrušaitis, who is pleased that technical and content-related ‘know-how’ gained in this region is being replicated abroad. Confinn, which used to primarily work on the largest conferences in the Nordic-Baltic region, is receiving more and more enquiries from across Europe to help organise huge virtual events with up to 100,000 people.

SOURCE: EuropaWire

Manyone to launch the first decentralised secure messaging solution by Mid-2021

VANCOUVER, 24-Feb-2021 — /EPR INTERNET NEWS/ — Manyone Inc., a pioneering technology venture in decentralization and digital identity, is delighted to announce that it has entered into a new strategic relationship with the globally renowned University College London (UCL) Centre Blockchain Technology (CBT).

This partnership will support research conducted by UCL CBT’s Senior Research Associate, Dr Geoffrey Goodell, to explore and evaluate end-user technology systems, infrastructure, business imperatives, and regulatory policy to support the privacy, dignity, and market power of individual persons in the emerging digital economy. The research is aimed at identifying the requirements and approaches for systems whose features specifically support the advancement of truly consensual trust relationships, the empowerment of local communities, and the public interest.

Vancouver-based Manyone believes in empowering solutions and technologies with the potential to produce a new, distributed internet where everyone can feel safe, secure and in control of their digital identity.

Dr Paolo Tasca, Founder and Executive Director of the UCL Centre for Blockchain Technologies, notes that, “On behalf of UCL and the Centre for Blockchain Technologies, I am delighted to begin our new partnership with international industry partners Peer Social Foundation and Manyone. We are grateful for their support and recognition of the impactful research being done to meet our shared ambitions. Thanks to their generosity we will continue our proud tradition of enabling academic research with real-world application.”

Michael Cholod CEO at Manyone and Executive Director of The Peer Social Foundation comments, “As a dedicated group of decentralists, our teams look to find ways to free communication from manipulation and control by protecting individual, business or governmental digital identities. Part of that mission is to work with the most respected and knowledgeable people in the field. The team at UCL represent some of the best thinkers in the area and we’re honoured to work with them.”

Dr Geoffrey Goodell, Senior Research Associate at UCL Centre for Blockchain Technologies, specifically ads that, “The funding from The Peer Social Foundation and Manyone will provide vital resource to explore and evaluate user-controlled identity management, decentralised social networks, and tokenisation as vehicle for authorisation without identification. Our partnership will support the advancement of trusted relationships in the digital economy, the empowerment of local communities for the benefit of public interest. I am excited to deepen our collaboration and share our insights.”

Manyone, with offices in Vancouver, Canada and Stockholm, Sweden are looking to launch the first decentralised secure messaging solution by Mid-2021.

Manyone is a pioneering technology venture that aims to deliver private secure networks and private digital identities, to increase personal and enterprise productivity and digital security. Manyone actively works with The Peer Social Foundation on education and research into topics of interest to consumers and enterprise. The Peer Social Foundation and Manyone believe in empowering a distributed internet where everyone can feel in control of their digital identity. They do this by delivering a self-sovereign digital identity and decentralized communication and sharing platform for enterprise and consumers. A critical component of this is to work beside and support vital education, R&D and the open-source community to connect people, businesses and governments.

Find out more here: www.manyone.one and http://blockchain.cs.ucl.ac.uk/

SOURCE: EuropaWire

Xverify opens an office in Dublin, Ireland

DUBLIN, 19-Mar-2019 — /EPR INTERNET NEWS/ — Xverify, a TowerData company, is addressing the needs of European email marketers for data quality, GDPR compliance and superior support by processing data within the European Union and opening an office in Dublin. Xverify is a leader in Email Verification services, and has verified more than 11 billion emails since 2011.

All data submitted to Xverify for Email Verification by European-based clients will now be processed on servers located within the EU, giving clients more oversight of their customers’ data. Xverify is fully compliant with European data security regulations including GDPR, and has been processing European data for more than 7 years.

Xverify has also opened a local office in Dublin with dedicated staff covering accounts based in the European Union.

“Email Verification is a vital tool for marketers around the world to ensure data cleanliness, improve deliverability and prevent fraud.” said Rob Huey, Xverify CEO. “We know that keeping the customer data of our clients within the European Union gives them peace of mind, and opening a Dublin office ensures they have a trusted representative they can call on their time.”

Xverify’s Email Verification allows marketers to identify undeliverable or risky emails on their marketing list or on their webforms in real-time thanks to a flexible API. By maintaining clean, accurate data, marketers are able to better reach their customers, avoid fraud and boost their sender reputation. Hundreds of companies around the world trust Xverify with their data verification needs everyday.

Xverify is an industry leader in email verification that helps digital marketers improve email deliverability by eliminating hard bounces, reducing spam complaints, and minimizing fraud in milliseconds. Validation can occur directly on your site in real time, or you can upload a list and get results. Make your email marketing more effective and improve delivery and response today.

SOURCE: EuropaWire

PG Services will be demonstrating DB CyberTech’s GDPR solution during Elastic{ON} Frankfurt on October 30, 2018

SAN DIEGO, CA, USA, 29-Oct-2018 — /EPR INTERNET NEWS/ — DB CyberTech, a pioneer in machine learning based predictive data loss prevention, today announced that it is launching into the European market through a partnership with PG Services of Luxembourg. PG Services joins DB CyberTech’s growing partner ecosystem focused on bringing the next generation of truly intelligent cybersecurity solutions to market. DB CyberTech’s European operations will be headquartered in London.

“We’re excited to begin our new partnership with DB CyberTech. PG Services is known for selecting best in class solutions and integrating them into the Elastic SIEM for our global clients,” said Ali Alaie, Managing Director of PG Services. “After careful review and engineering investment in Europe, we selected DB CyberTech’s patented and award winning compliance and security platform to build a modernized connector that now presents critical GDPR discovery and classification data through the Elastic interface. We’re making DB CyberTech’s innovative platform for compliance and security available to all of our global Elastic clients. I’m pleased to showcase the integrated solution at this weeks Elastic{ON} conference in Frankfurt.”

DB CyberTech solutions enable customers with real-time visibility into their structured data for data security and GDPR compliance. The GDPR compliance solution is based on natural language processing to enable automated and continuous identification of high-value and sensitive personal data.

“We’re truly impressed with PG Services extensive experience with Data Analytics and Elastic value-added integrated solutions,” said Ali Hedayati, COO and President of DB CyberTech. “Our solution integration with PG Services Elastic-centric technology enables visualization, analysis, and searching of host intrusion detection alerts. The integration provides customers with comprehensive visibility, intelligent data classification, and automated machine learning for detection of suspicious activity in the data tier for security and GDPR compliancy.”

PG Services will be demonstrating DB CyberTech’s GDPR solution during Elastic{ON} Frankfurt on October 30, 2018.

SOURCE: EuropaWire

Advanced Data Classification now available for DB CyberTech’s #Predictive Data Loss Prevention and #GDPR solutions

SAN DIEGO, CA, United States, 27-Aug-2018 — /EPR INTERNET NEWS/ — DB CyberTech, a pioneer in machine learning based predictive data loss prevention, today announced advanced data classification for structured data as a new capability of their security and privacy platform. This new capability supports compliance with EU’s General Data Protection Regulation (GDPR).

DB CyberTech’s advanced data classification utilizes natural language processing to continuously and accurately identify high value sensitive data such as personal data, intellectual property, and financial information. With this capability, privacy professionals and Data Protection Officers are now able to focus more of their attention on a set of databases that store sensitive data and therefore pose the greatest risk to the organization.

Advanced Data Classification is available now for DB CyberTech’s Predictive Data Loss Prevention and GDPR solutions. Data classification operates completely non-intrusively by analyzing database conversations. No database login credentials are necessary and there’s no impact on database performance.

“To defend against today’s security threats to structured data, DB CyberTech offers database asset discovery, automatic data classification, and continuous monitoring to identify where sensitive data is stored along with which clients and applications process sensitive information,” said Brett Helm, CEO of DB CyberTech. “We then apply machine learning and behavioral analytics to pinpoint rogue activities including insider threats.”

SOURCE: EuropaWire

Racing Towards Retailization: WishKnish and InstantAccess.io Bring Down Usability Barriers to True Blockchain Adoption

Washington, DC, USA, 2018-Jan-08 — /EPR INTERNET NEWS/ — What does the average retail user think about blockchain technology? A few words that frequently come up are: confusing, abstract, scary, complicated, overwhelming. Not exactly wide adoption territory. But one innovative company hopes to change that.

Any great technological revolution goes through stages, each with its own unique challenges. Blockchain technology is still in its infancy, and yet it’s already rearing to change the world. However, before it can “grow up”, it has to be accepted by the harshest audience of all: the average retail consumer.

So, how does one make the average consumer fully understand blockchain tech? If you ask Alisa Gus, CEO of WishKnish (https://wishknish.com) – you don’t.

“When you get into your car in the morning, do you need to understand the principles of internal combustion in order to get your engine revved up? I don’t think so,” Alisa says. “Neither do you need to understand how SSL encryption works in order to make a secure e-commerce purchase. Any great technology has to fit transparently into your routine so that you use it successfully without thinking. That is what needs to happen to blockchain tech before it can be fully embraced.”

WishKnish, the social, gamified marketplace platform startup based out of the Washington, DC area, has been making great strides in bringing much-needed usability improvements to the often complicated process of obtaining and transacting in cryptocurrencies – virtual tokens encrypted using a secret hash and decentralized across multiple distributed “ledgers”.

Last month WishKnish announced a key partnership with UK biometric security firm BioSSL to replace the convoluted and oft-problematic “private key” used to unlock cryptocurrency wallets, with army-grade biometric security measures and other layers of authentication.

Michael Kapoor, former managing partner at Propeller Venture Capital and newly minted COO of WishKnish is no stranger to untangling the usability struggles commonly encountered in this nascent space. “If you’ve ever lost your private key, your tokens are as good as gone,” Mr. Kapoor says. “This level of risk is simply unacceptable for the average user. This is just one example of the evolutionary challenges we are addressing with the WishKnish platform.”

Now, the ambitious team is staring off 2018 by partnering with InstantAccess.io, a usability startup based out of Berlin, Germany that helps users save time filling out form online by maintaining their own private, secure repository that can be easy tapped into with a single click. Previously stored form fields can be updated across the entire network, making changes easy.

“It’s as simple as logging in via Facebook or Twitter – just click the icon, authenticate, and the necessary data will automatically be sent to the app,” explains Eugene Teplitsky, CTO of WishKnish and Alisa’s partner. “Since our goal is to accommodate a wide range of storefront communities, we anticipate a broad need for information that users could potentially exchange with them, from the mundane – like shoe size or dietary preference – to more complex, harder-to-remember details – like blockchain wallet addresses. InstantAccess.io will save users a ton of time, and shave off another layer of usability barriers between blockchain technology and full adoption among retail users.”

“We are super excited about the partnership with WishKnish as we believe blockchain technology is becoming widely adopted by everyday users”, says Rick Chen, director at InstantAccess.io. “Our aim is simple, we want the InstantAccess app to save users time, make their life easier, especially in adopting new and exciting technologies like blockchain.”

The future for retailization of user-facing blockchain marketplaces has never been brighter.

About WishKnish Corp.
WishKnish (https://wishknish.com) offers businesses, affiliates, and non-profits a decentralized marketplace platform for launching gamified, socially-engaged storefront communities equipped with the tools to turn regular users into super-fans and evangelizers while streamlining coin-agnostic e-commerce and fulfillment, as well as offering advanced blockchain-as-a-service tools to meet enterprise clients’ needs.

About InstantAccess.io
InstantAccess is an app that saves all kinds of user information/preferences securely and privately. Users can then re-use this information online and offline with just one click. From emails to shoe sizes to blockchain wallet addresses, InstantAccess makes it easier to access services.

Contact-Details:

WishKnish Corp.,
P.O. Box 2160, Reston,
VA 20195
(202) 800-2663
info@wishknish.com,
https://wishknish.com

Via EPR Network
More Internet & Online press releases

Axiomatics offers fine-grained policy-based access control and dynamic data masking and filtering

CHICAGO, Oct-05-2017 — /EuropaWire/ — Axiomatics, the leader in fine-grained dynamic authorization, today announced that KuppingerCole has profiled its data-centric dynamic authorization suite in a recent analyst report titled, “Executive View – Axiomatics Data Security.” The report sheds light on two flagship products; Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data, both of which apply an Attribute Based Access Control mechanism across different types of data stores, and centralizes policy-based authorization rules for access to the content within these data stores.

KuppingerCole’s Executive View describes the solutions in detail and offers advice to IT professionals looking for data-centric security. The Axiomatics Data Access Filter offers policy-based access control and dynamic data masking and filtering for relational databases. Implemented as a database proxy, the product intercepts all connections to the database from any user or application and analyzes every SQL statement for potential violations of applicable security policies. In accordance to the ABAC approach, the authorization service may query multiple attribute sources for additional context information needed for a fine-grained access decision.

SmartGuard™ for Big Data (the most recent addition to Axiomatics’ data security portfolio) extends ABAC-based dynamic authorization to Hadoop Big Data stores. There’s a growing need to ensure consistent fine-grained access control and maintain regulatory compliance for Hadoop. These infrastructures often comprise multiple loosely coupled components, and Big Data stores are used to store massive amounts of data from numerous sources with multiple applications accessing them simultaneously. Utilizing ABAC for transparent dynamic access control to a Big Data store for multiple analytics applications allows enterprises to combine all the benefits of a single data warehouse with the traditional siloed approach, where each application has access only to its own data silo.

“For years, we have been tracking the information security market. As data security threats rise, Axiomatics continues to lead by offering solutions that help companies with fine-grained policy-based access control and dynamic data masking and filtering. Axiomatics Data Access Filter for Multiple Databases and Axiomatics SmartGuard™ for Big Data are a natural expansion of the company’s comprehensive suite of dynamic authorization solutions,” said Alexei Balaganski, lead analyst for KuppingerCole and author of the report. “Whether deployed standalone or as a part of an enterprise-wide ABAC infrastructure, these products provide an additional dynamic security and access control layer around multiple data stores transparently and without any application changes.”

“Our relentless focus on solving the toughest problems in data-centric security, have made Axiomatics the choice for IT professionals and companies looking for data security solutions to complex big data environments,” said Gerry Gebel, vice president of business development at Axiomatics. “We are honored to have such a distinguished analyst like KuppingerCole continue to review our suite of products. Their reports further underscore its commitment to delivering cutting-edge information on data security in the era of digital transformation.”

For more information about Axiomatics, visit www.axiomatics.com. For more information on KuppingerCole, visit https://www.kuppingercole.com.

SOURCE: EuropaWire

SecBI’s software provides early and accurate detection of advanced cyber threats

Tel Aviv, Israel and Rome, Italy, 26-Sep-2017 — /EuropaWire/ — SecBI, a leading developer of advanced cybersecurity threat detection solutions, and Innovery, a leading ICT services provider and software developer, today announced a partnership for distributing SecBI products in Italy and Spain.

“Traditional security means are simply insufficient in dealing with advanced threats, leading to an average dwell time of 100 days before the attack is identified,” said Gilad Peleg, CEO of SecBI. “With SecBI, we can drastically reduce this time span to hours and provide the analyst with early and accurate detection with no false alerts. We are delighted to partner with Innovery, who have the expertise and reach to promote SecBI’s solution to the Italian and Spanish customers who need it.”

“In order to be always ahead of our competitors and offer the best possible services, Innovery invests a lot in new technologies,” said Mr. Gianvittorio Abate, CEO and co-founder, Innovery. “Hence our collaboration with SecBI, a company that we feel has the potential for a great future in the security arena.”

SecBI’s software provides early and accurate detection of advanced cyber threats, including those that are hidden from other systems. By providing full-scope analysis of threats — including all involved users, devices, domains, IPs, C&C servers, drop points and more — SecBI makes mitigation fast and accurate.

Innovera and SecBI will present SecBI’s solution at Cybertech Europe 2017, taking place on September 26-27 at Roma Convention Center – La Nuvola.

SOURCE: EuropaWire

ExpressVPN sostenere organizzazioni noprofit per proteggere libertà e della privacy in internet

TORTOLA, Isole Vergini Britanniche, 27-Feb-2017 — /EPR INTERNET NEWS/ — Riflettendo la diversità degli utenti VPN in tutto il mondo, ExpressVPN è lieta di presentare ExpressVPN.com in 6 nuove lingue:

Tedesco: (www.expressvpn.com/de)
Olandese: (www.expressvpn.com/nl)
Norvegese: (www.expressvpn.com/no)
Italiano: (www.expressvpn.com/it)
Spagnolo: (www.expressvpn.com/es)
Portoghese: (www.expressvpn.com/pt)

Milioni di persone in tutto il mondo possono ora consultare il contenuto di ExpressVPN nella loro lingua madre per scoprire:

  • In che modo una VPN aiuta le persone ad utilizzare internet in modo sicuro e privato
  • Informazioni riguardo le posizioni server di oltre 87 paesi di ExpressVPN
  • Notizie riguardo gli ultimi software ExpressVPN, incluse nuove funzioni e compatibilità
  • Consigli per scegliere la posizione server VPN migliore per accedere a diversi tipi di contenuto
  • Un elenco completo di servizi e siti web che si possono sbloccati con una VPN

ExpressVPN si impegna a rendere la vita delle persone di tutto il mondo più semplice, grazie ad un utilizzo di internet privato, sicuro e libero.

SOURCE: EuropaWire

New Canadian Security Company Fighting Worldwide Corporate Espionage and Advanced Attackers

Information theft, or hacking, is extremely common in the business world. Companies with the most valuable information are under constant attack and need of sophisticated defense team. The Arc4dia team of experts has years of practical experience in the field of high-level cyber attacks and can help businesses to protect their privacy.

Snow Cover is the main defense service offered by Arc4dia. It is the first cyber security monitoring service truly aimed at advanced persistent attacks. Unlike the plethora of other services claiming to protect organizations against advanced persistent threats (APTs) while relying on the same technologies and people behind Anti-Virus, Arc4dia defense service is built from the ground up to provide a real fight against the advanced attackers using strategic and transparent techniques.

For a company with sensitive information, installing security software is not enough. Hackers constantly evolve, using new exploits to get past stationary defenses. That means a company’s defense strategy must also evolve in response. “We’ve helped clients to get rid of an attacker they didn’t know they had before we came in. The only hint the client had in a span of three years, was that they started losing critical contracts to a foreign competitor ” said Roberge, Arc4dia founder.

For a limited time, Arc4dia offers Early Snow Program as a trial for Snow Cover. ESP is a program aimed to organizations that are likely to be victims of advanced targeted attacks. This program is completely free. The main benefits to the program participants: cutting edge 24/7 surveillance, evolving detection and immediate mitigation of targeted threats, and all this in transparent manner that won’t impact the running of your business.

About Arc4dia
The passionate team of researchers at Arc4dia has extensive experience in IT security in the Intelligence and Law Enforcement world with a combined talent that continuously strives to be the best in mobile security. Arc4dia protects some of the most valuable and critically sensitive information in the world, including intellectual property, manufacturing processes, military research, pharmaceutical research, and more. For more information, visit www.arc4dia.com or call 1-866-598-4317.

Via EPR Network
More Internet & Online press releases

Alentus teams with GamaSec to provide Web Application Security services

Alentus announced today its partnership with GamaSec, a remote online website security scan service. GamaScan identifies web application vulnerabilities, provides real-time vital business solutions, and recommends optimally matched solutions.

Clearly, Web applications are the weakest link in an organization’s security strategy. Web applications are more difficult to protect than traditional applications that reside behind a firewall. Web application security needs to be stringently checked on a regular basis using an automated Web application security scanner.

GamaSec’s commercial solution, branded “GamaScan”, is a remote online web vulnerability-assessment service. delivered via SaaS (software-as-a-service) and is designed to identify security weaknesses in web applications. The GamaSec Application Vulnerability Scanner identifies application vulnerabilities (e.g. Cross Site Scripting (XSS), SQL injection, Code Inclusion etc.) as well as site exposure risks. It also ranks threat priority, produces highly graphical, intuitive HTML reports, and indicates site security posture by vulnerabilities and threats.

Avi Bartov, GamaSec CEO comments, “Our core business is to help our partners mitigate risks on their website by providing real-time evaluation reports and recommendations. We provide service 24 hours a day, 7 days a week. Application vulnerabilities are the Achilles heel in the protection of websites. It is better to know your weaknesses and fix them than wait to respond after an attack.”

“At Alentus, we strive to offer our customers the highest quality extensive range of services that small businesses need to maintain a successful online presence” says Peter McNeill, Sales Manager at Alentus Corporation. “After learning about GamaSec and their web vulnerability assessment service, I felt that this partnership adds a valuable set of tools to assist Alentus with what it needs to succeed in today’s security conscious Internet.”

The partnership agreement will enable Alentus Corporation to offer GamaSec’s website scan security services – which include blacklist monitoring and application vulnerability scanning services – to their shared web hosting and dedicated server clients.

Alentus will use GamaSec’s private partner interface to deliver and manage the delivery of the entire range of GamaSec services.

Via EPR Network
More Internet & Online press releases

New Firewall Hacking Book By HackerStorm For Penetration Testing & Ethical Hackers, Cowboy Testers Beware!

HackerStorm.com has published a new ebook aimed at ethical hackers and security professionals who hire or manage penetration testing services.

‘Firewall Hacking Secrets For Security Professionals’, available via Amazon.com for kindle, is the first ebook in the series. For many, firewall’s are the first line of defence and with high profile hacking incidents on the rise, the requirement for good firewall testing is now essential.

Timur Mehmet, author of the ebook and creator of HackerStorm.com comments:
“Firewall testing and hacking was an easy choice as a first publication, many depend heavily on firewall security and a lot of organisations are being targeted for all manner of reasons which creates a demand for regular firewall testing”.

Timur Mehmet adds: “The aim of the ebook is to give people enough knowledge to enable managers and penetration testers to ask the right questions so that they can create a more meaningful test scope and test plan. All too often the testers ask what the customer wants and the customer really has no idea, all they know is they are worried about Anonymous, LulzSec and the rise in activity from Iran and China but have no idea on how to approach the testing or how to evaluate the testers”.

“Unfortuntately, some testers out there relish this situation becuase it enables them to do the minimum amount of work for the maximum amount of money leaving the hiring managers with a huge false sense of security, on the flip side, there are many penetration testers and ethical hackers who want to know if what they are doing is in line with best practice as most books on the subject provide very little information other than to download and install some free tools”.

‘Firewall Hacking Secrets For Security Professionals’ is a vendor neutral guide aimed purely at testing firewall technology. The book does not focus on how to use various tools or explain basic networking like virtually all hacking books to date. The HackerStorm.com ebook gets straight to it.

A summarised checklist is also provided to help create a test plan and to enable all parties to discuss the scope of testing to ensure the project is relevant.

The book is currently available in Kindle format via Amazon for immediate download with further formats plannned in the future. To stay informed about new tools and ebooks, you can follow hackerStorm.com on Twitter at @hackerstorm.

Via EPR Network
More Internet & Online press releases

Nothing’s Safe In Cyberspace Says Leo Impact Security

What do the NSA, the Army and Sony Corporation have in common with US embassies around the world? All of them, along with over 2,500 other entities, have been compromised by hackers like Wikileaks and Antisec. The cost of these cyber-crimes has mounted to over $3 billion a year. And “the little guy” isn’t safe, either. Everyone who uses the internet is at risk, despite the increasing use of antivirus software, IDS/IDP and firewalls in the current security models.

Today Leo Impact Security is exposing top secret methods used by cyber criminal’s also defending preventive methods because today all corporate, personal, and government computers are vulnerable to remote cyber attacks.

How do cyber criminals bypass current security model?

1. Antivirus bypass using crypters and protectors with random encryption methods
(ex: cypherx, Themida).
2. Firewall bypass using known ports in malware like port 80 and 8080.
3. IDS/IPS avoid using SSL encryption+ DNS tunneling-based malware (BOTS, RAT).
4. Remote access to any computer using Zero day exploits (.doc, .PPT, and .PDF individual files), Java silent driveway, browser packs, Router DNS MITM, and pen testing tools – Core impact, immunity canvas, Metasploit Pro etc.

For Proof of concepts/Live demos, check our site: http://www.leoimpact.com

How to defend against advanced cyber attacks?

Use m2 security model developed by cyber security expert Manish Kumar, chief research officer at Leo Impact. All of the following services are nonprofit as per our Corporate Social Responsibility (CSR).

1. World’s first free antivirus scanning online engine which protects your PC from viruses, trojans, spyware, rootkits, and other malicious programs (zero day exploits) and attachments by using 32+ antivirus on cloud. Visit: www.balajiplus.com

2. To protect against unknown malware (rootlets, trojans, BOTS-Zesus, spyeye, Ghostrat, etc.) and zero day exploits attacks using Neutron+ Protection system software in PC.

3. To protect against remote-based attacks like DDOS, Sql Injections, XSS, and buffer overflow, use cloudflare.com on servers and Free VPN providers ( www.usaip.euwww.vpnreactor.comwww.torproject.orgwww.hotspotshield.com )

4. To protect against data & information leakage and other attacks, use our two-way authentication and free security analysis and consultancy.

Via EPR Network
More Internet & Online press releases

TrustTone Communications Appliances – Voted BEST BUY for Email Encryption

TrustTone Communications, Inc., the leader in Email Encryption technology, today announced it has been rated Best Buy by SC Magazine. The Best Buy designation reflects the coveted Five Star rating for every aspect of the product – Features, Ease of Use, Performance, Documentation, Support and Value for Money. TrustTone continues to provide the most comprehensive feature set at the lowest cost.

“Simple, effective, secure. This is just what this doctor ordered.” notes SC Magazine.

“TrustTone is the perfect solution for email privacy compliance for organization large and small. The product offers depth of functionality and configuration flexibility with very low total cost of ownership,” said Hemant Thakkar, CEO of TrustTone Communications. “We are thrilled to earn the Best Buy designation by SC Magazinne. It validates our approach to creating value for our customers.”

Via EPR Network
More Internet & Online press releases

commissum Sponsorship of Open University Student Prize

commissum is proud to again be the sponsor of the prize for the Open University Post Graduate module for Information Security Management; the M886 module. This is the second year that commissum has sponsored this prize.

The winner of the prize this year is Canadian student Sara Maharaj, from Ontario. Sara took the Information Security Management module as a standalone course for her professional development. The Information Security Management module is very focused on taking a practice-based approach; this encourages the student to base what they do upon an organisation that they are familiar with.

The course provides the foundation knowledge, understanding, analysis and synthesis needed to develop a practical information security management system (ISMS), to the standard set by the ISO/IEC 27001:2005 and BS ISO/IEC 17799:2005. It also targets helping the students acquire the personal development skills that they need to keep abreast of important developments in the rapidly changing field of Information Security.

Sara, having successfully undertaken the course as the top student, said:

“The course provides valuable insights into how to strategically manage information security within the organization. The practical exercises force you to think through a methodical implementation of the ISO 27001 standard, which facilitates excellent learning.”

Managing Director at commissum, Martin Finch, is a keen advocate of this practical approach to learning. He said:

“When students are given the opportunity to apply what they learn during the course of the module, it not only reinforces the lesson and benefits them and their respective organisations, but also instils a sense of great satisfaction”.

Last year’s joint winners were Ian Knight and Sally Anderson. Ian Knight who graduated with a BA/BSc Open Degree took the Information Security Management course as the last step in his degree journey. Ian works for a major Telecoms provider, with responsibility for Information Assurance on large client contracts. He said:

“The course materials were some of the best that I have encountered in the OU and in other study; I found the course to be of immediate practical use in my work almost from the start of the first unit”.

Sally Anderson, who is Head of Web and IT in a leading University, also commented on the practical nature of the course, saying “I have directly applied the new knowledge and skills to my work already and have the confidence now to advise and manage information security on behalf of my organisation”.

Via EPR Network
More Internet & Online press releases

commissum at Infosec Europe 2011

Another Infosec Europe has come and gone. Once again, commissum had a strong presence; the company’s sixth year of exhibiting at this premier event.

Information Security experts commissum managed to make the even a great success, despite visitor numbers being reported as 15% down on the previous year owing to the timing falling immediately before the Easter and Royal Wedding holiday weekends. We had over 500 visitors to the commissum stand asking for information on the company and arranging follow-up meetings after the show.

The commissum stand this year will have been familiar to regular attendees of the event. Our corporate colour of deep yellow once again stood out with our smartly dressed stand staff in their white shirts and yellow ties. Our credentials as a CREST company and CLAS consultancy provider were once again prominent.

At this year’s show, as usual, members of the commissum team were on hand to discuss our visitors’ requirements, provide advice, and also explain the services we offer. This naturally covered our complete portfolio across security management, penetration testing, consultancy and technology services; however, this year we also put some emphasis on two areas; both attracting strong interest:

Project/software development lifecycle (SDLC) security; and Managing Governance Risk & Compliance (GRC) through true unified governance.

We were supported in the above areas by our partners DB3, who demonstrated the HiScout Unified Governance suite, and Checkmarx, one of the leading innovators in the field of static code security analysis. Both partners received a lot of attention with their industry leading tool suits.

Via EPR Network
More Internet & Online press releases

Risks Of Using Social Networking In Business

Social Networking sites such as Facebook, Myspace and Youtube have gained popularity among the younger population. Sites such as LinkedIn, Plaxo and Xing have followed quickly in their footsteps to provide the business friendly social network opportunities.

More recently, companies large and small are exploring ways to use social network site to support and improve sales (Youtube), to find new employees and business partners (LinkedIn) or to monitor their performance and respond to critics (Yelp and increasingly Facebook and Twitter).

However, for information security experts commissum.com, businesses looking to embrace these social media channels and tools in their business need to understand and calculate the benefits and risks before engaging them.

To consider the risks of using social media for your business consider the following:

Be careful using social media for employment vetting purposes for the same reasons that employers should not ask about religion, preferences, age, race etc.

Once a business takes the step of using social media, they are opening up a channel that in most cases you have very limited control of; in fact almost handing over control to the public. How would the business deal with both fair and unfair criticisms and opinions expressed on social media websites and how could its reputation be affected?

Would your employees know what business information can be disclosed on social media websites and could the business therefore be at risk of involuntary information leakage?

Could information on the size, structure of the business and operational details such as IT infrastructure details be used for initial data gathering activities for targeted attacks?

Could the business IT infrastructure be vulnerable to malicious software downloaded from social network sites?

And lastly consider whether the business should monitor the activities of its employees to ensure that security is maintained and resources are not being wasted by social networking activities.

“The risks of using social media encompass all aspects of the business; legal, employment, technical, operational and reputation”, according to a commissum spokesperson.

Via EPR Network
More Internet & Online press releases

GRC (Governance, Risk and Compliance) is a recent acronym that has quickly spread among the senior management community around the world

Initially this was sparked by the fallout from a number of major corporate governance scandals, including those affecting Enron, Tyco and WorldCom; all of which led to the enactment of the US Sarbanes-Oxley Act and the concept of a more holistic view of Governance, Risk and Compliance. Interest has also grown rapidly in the UK as legislation and compliance requirements have increased.

Traditionally, most organisations ensure compliance with legislation, regulations and standards by instructing each department to determine the requirements for compliance and specify actions and controls to achieve this. Organisations will therefore have a number of organisational departments for business continuity (possibly aligning with BS25999), for IT security (in many cases aligning with ISO27001), for quality management, etc.

They will certainly have risk management carried out by these various departments, all identifying risks and controls and also individually reporting on these. Managing all of this and pulling it all together into a coherent picture upon which business decisions can be made and priorities can be based in an efficient and effective way is a complex challenge.

commissum’s Principal Assurance Consultant André Coner noted that as the number of legislation, regulatory and compliance requirements increases, the number of departments involved also increases, each defining their own controls and measures. This silo approach causes each department to “re-invent the Wheel”, wasting valuable time and increasing costs while introducing duplication, redundancy and confusion.

commissum’s approach to Unified Governance, Risk management and Compliance creates a common source of information. It creates a common model of the organisation; a unified methodology for managing risk, controlling deficiencies and measurement.

Via EPR Network
More Internet & Online press releases