🚀 COLLABORATIVE INNOVATION PROJECT ANNOUNCEMENT 🚀 https://lnkd.in/ewEp3exh We are pleased to announce a new project funded within the call for projects "Empowering Small Organizations to Fight Against the Exponential Growth of Cybercrime" ⚡⚡⚡ COMBATING PHISHING - What innovations can we bring? ⚡⚡⚡ https://lnkd.in/ewEp3exh ➡️ Phishing is a growing societal threat and requires urgent, effective solutions. Through a collaborative process involving field feedback, ideation workshops, and state-of-the-art analysis, this open innovation project will explore technical, organizational, and legal solutions. The results will be prototypes, practical guidelines, and recommendations to strengthen digital security against phishing. Partners involved are HEIG-VD, Université de Lausanne ESC UNIL – École des sciences criminelles, EPFL Center for Digital Trust (C4DT) EPFL, Navixia SA, Police cantonale vaudoise, DGNSI - Direction générale du numérique et des systèmes d'information, Transports publics de la région lausannoise Sylvain Pasini Thomas Souvignet Linus Gasser Guillaume Fumeaux Tristan L. Serge Miéville Chloé Berthet Johann POLEWCZYK
[seal] - Innovation Program for Digital Trust and Cybersecurity of Canton Vaud’s Post
More Relevant Posts
-
We continue our acquaintance with the cybersecurity startup track of the official Ukrainian delegation to the 2024 SelectUSA Investment Summit. LetsData is an AI-based solution that predicts communication risks and opportunities and helps organizations counter threatening information campaigns. The team uses artificial intelligence-based alerts about the likelihood of risks and potential opportunities, a secure response coordination system, and a real-time visual representation of key stakeholders, communication channels, and narratives in an interactive report format. LetsData's goal is to enable government agencies, businesses and civil society to navigate likely risks and use these opportunities to counteract misinformation. USAID Cybersecurity for Critical Infrastructure in Ukraine Activity and Ukrainian bridge , with the support of UNIT.City , organize cybersecurity startups' participation in the 2024 SelectUSA Investment Summit.
To view or add a comment, sign in
-
Another cybersecurity startup representing Ukraine at the 2024 SelectUSA Investment Summit. Cybrex.ai is a platform that uses artificial intelligence to moderate content on user-generated content platforms, filter content based on a customized model, and analyze all types of information: text, video, photos, and analytical dashboards. Using advanced technologies, Cybrex.ai aims to help make the Internet safe, protect users, preserve the reputation of brands, and create a safe and positive environment for its users. USAID Cybersecurity for Critical Infrastructure in Ukraine Activity and Ukrainian bridge , with the support of UNIT.City , organize cybersecurity startups' participation in the 2024 SelectUSA Investment Summit.
To view or add a comment, sign in
-
On October 28, the intelligence partnership of the Five Eyes nations has launched "Secure Innovation," a security initiative aimed at safeguarding emerging technology companies from a range of threats, particularly those posed by nation-state actors. This collective guidance comes as a direct response to last year’s historic summit, which saw security leaders from Australia, Canada, New Zealand, the United Kingdom, and the United States unveil Five Shared Principles to shield tech companies from national security risks. Initially a UK-only initiative by the National Cyber Security Centre (NCSC) and the National Protective Security Authority (NPSA), Secure Innovation has now expanded to include regional guidance for all Five Eyes countries. The UK’s tech startups can access tailored action plans to assess and enhance their security practices, with more than 500 companies already having adopted these protective measures.
To view or add a comment, sign in
-
🎉 NEW PRE-SEED INVESTMENT 🎉 After being in stealth mode when the initial investment took place in November 2023, we are proud to finally announce our investment in Relock, an innovative company in the cybersecuritysector! The total pre-seed round exists of over €1 million and is led by Early Game Ventures. Re:lock has developed a high-frequency key rotation technology that secures access and data exchange against the most advanced cyberattacks and insider threats. This technology is designed to prevent cybercrime that leverages the exposure and exploitation of critical secrets, which currently account for about 80% of all successful attacks using off-the-shelf malicious tools. ❓Why we invest With the increasing frequency and sophistication of cyberattacks, Re:lock addresses an extremely relevant problem. Their fundamental encryption technology is set to become a dominant player in the field, providing security solutions for API networks, enterprise users and systems, and IoT / Medical Devices. 💡 Market and Pipeline - The cybersecurity market is complex and rapidly evolving, with many stakeholders. With their ability to safeguard many critical systems, Re:lock can capture a broad spectrum of customers. ❕ Technology - Re:lock is on its way to build a completely independent system that optimizes and secures data through their high-frequency secrets rotation engine, without any reliance on third parties. Due to the new on-the-move secret generation, when a malicious insider breaks the security layer of your API system, they would find unreadable encrypted data that is impossible to decrypt. 👥 Team - Apart from the extensive technical background of the founders, they have proven to be a strong team over the last months. Their shared vision and deep understanding of cybersecurity deep tech have impressed us, and we believe in their ability to lead the change in this critical sector. We’re excited to continue supporting Re:lock on their journey as they lead the charge towards advanced cybersecurity solutions. Interested in reading more about Re:lock? Check the link in the comments below to read the full article on our website! Bartek Boniecki Marcin Sznyra Przemek Czerklewicz Boaz van Lith Jan Domhof TU Delft, Erasmus MC, Erasmus Universiteit Rotterdam, Erasmus Trustfonds, Universiteitsfonds Delft.
To view or add a comment, sign in
-
𝐂𝐲𝐩𝐒𝐞𝐜'𝐬 𝐏𝐡𝐲𝐬𝐢𝐜𝐚𝐥 𝐎𝐩𝐞𝐫𝐚𝐭𝐢𝐨𝐧𝐬 #𝟐 - 𝐂𝐞𝐧𝐭𝐫𝐚𝐥𝐢𝐳𝐞𝐝 𝐒𝐞𝐜𝐮𝐫𝐢𝐭𝐲 𝐇𝐮𝐛 Our for 2025 planned centralized security hub is a cornerstone of CypSec’s mission to advance cybersecurity across multiple domains. This hub is not just a facility but a fully integrated environment where technology manufacturing, security engineering, and joint operations come together. Within these dedicated spaces, we drive innovation in security devices, health tech solutions, and networking technologies. By centralizing our operations, we ensure that every step of the development process, from initial research to final distribution, maintains the highest standards of security and efficiency. This centralization allows us to foster deeper collaboration with our partners and clients, enabling us to rapidly respond to emerging security challenges. It also provides a controlled setting where we can focus on refining our technologies and strategies, ensuring that our solutions are both effective and resilient. The hub is designed to support ongoing advancements and to serve as a foundation for future growth, reflecting our commitment to building a more secure digital landscape. #Cybersecurity #ResearchAndDevelopment #TechInnovation #SecurityEngineering #DigitalSecurity #CyberSecurityStartup #Business #Tech #Technology
To view or add a comment, sign in
-
Nation-states are watching your technology startup. So are your competitors. Thankfully, you're not alone in securing your innovations: the Five Eyes intelligence alliance has launched #SecureInnovation, a shared security guidance initiative from Australia, Canada, New Zealand, the United Kingdom, and the United States made for technology startups and investors in this space. The guidance for technology companies covers 5 key principles: 1. 🎯 KNOW THE THREATS - Understand that if you are developing technology that is dual-use, is disruptive, or is in a critical technology area - you and your company are a target, whether from organised crime, commercial competitors, and even foreign intelligence. 2. 🛡️ SECURE YOUR ENVIRONMENT - Having a security lead is vital. Having conversations about security can sometimes be challenging, so appointing someone whose sole focus is security can be invaluable. - Ensure that your business meets and exceeds cybersecurity standards - these standards are entry point, not the final destination. 3. 🔒 SECURE YOUR PRODUCTS - Ensure that your cybersecurity measures are sufficient for protecting your trade secrets. - Products must be built secure from the beginning, not secured at the end. An example of this is opting to use memory safe programming languages. Most programming languages today are memory safe, with notable exceptions including C, C++, and Assembly. 4. 🤝 SECURE YOUR PARTNERSHIPS - Make use of open source intelligence to assess investors, your supply chain, and partners. - If you come into contact with someone suspicious, even if you're unsure - make use of ASIO's NITRO portal. - Join the Australian Signals Directorate's Australian Cyber Security Centre partnership program for the latest advice on cyber threats. 5. 🚀 SECURE YOUR GROWTH - This can be done by continuing to engage with advice from National Counterintelligence and Security Center, Defence Australia, Australian Signals Directorate and similar organisations. Find the full guidelines on secure innovation here: https://lnkd.in/gfVJ9Fmv Learn more about memory safety: https://lnkd.in/dGgq54AF Learn the signs of hostile intelligence activity: https://lnkd.in/gcGcU4tR
To view or add a comment, sign in
-
🚀 Breaking News in Cybersecurity Arena Another titan emerges from stealth mode, and this one's worth keeping your eyes on: Meet MIND – where DLP finally gets the intelligence upgrade it deserves. Why am I excited? Two words: Eran Barak. The same visionary who revolutionized security automation (SOAR) by building Hexadite (acquired by Microsoft in 2017) is back with an even more ambitious mission. Here's what caught my attention: 🎯 MIND is tackling one of security's most frustrating challenges: making DLP and insider risk management actually work 🤖 They're putting data protection on autopilot with AI-driven context awareness (because let's face it, manual data classification is so 2010) 🎮 The platform promises to do for data security what Hexadite did for SOAR – automate the tedious and amplify the strategic Based in Seattle, MIND is positioning itself to solve what keeps CISOs up at night: protecting sensitive data without drowning their teams in alerts or stifling business innovation. Here's my take: When someone who successfully sold their security automation company to Microsoft comes back to tackle DLP, you pay attention. The problem space is massive, the timing is perfect (hello, AI revolution!), and the team knows how to execute. Congratulations to Eran Barak, Tyson Hempel, Dor Amitai, Itai Schwartz, Hod Bin Noon, and the entire MIND team on the launch! Looking forward to seeing how you revolutionize data security. Announcement Reuters: https://lnkd.in/gRhBEkbV Credits: The O.G Security Startup Savants YL Ventures #Cybersecurity #Innovation #DataSecurity #DLP #TechNews #SecurityStartup #CyberSabra Thoughts on this emerging player in our space? Drop your takes below 👇 P.S Views expressed are my own and do not reflect the opinions or beliefs of my Employer
To view or add a comment, sign in
-
🎉 We are beyond excited to share this amazing news about NS Edge, cybersecurity startup & #TechceleratorAlumnus, founded in the US in 2020 by a mixed Romanian-American team! 🎉 They announced on Ziarul Financiar IT Generation that the team is in talks to secure €2.5 million in funding to expand into Central and Eastern Europe and the US market. The company aims to work with large companies or government agencies that have large volumes of data. "We are a solution intended to be B2B, B2Enterprise, or B2Government, and our approach to current customer solutions is to come in and help them, make them better. Our customers don't need to drop what they already have in place to use NS EDGE.", says Alexandru Cioflan. NS EDGE connects to existing infrastructure and can work in parallel with other cybersecurity solutions. 👏 Congrats, Alexandru Cioflan, James E. Harris, Alina Stefan & Team! 👇 We invite you to watch the interview in the link below.👇 As we mentioned before, NS Edge announced this month that they implemented a PoC with S.N.G.N. Romgaz S.A. and they presented the news during the "NS EDGE CYBERSECURITY SHOWCASE" event, a first use case of our CleanTech Nexus Accelerator project, which we launched in partnership with the Ministerul Energiei Romania and the Ministry of Energy of the Republic of Moldova! ✅ Apply at https://lnkd.in/dzHXJxHt to discover innovation challenges and explore POCs with energy players in Romania and the Republic of Moldova, benefiting from the support of Israeli and Norwegian partners. #NSEdge #CleanTech #CleanTechNexusAccelerator #Innovation #Cybersecurity
ZF IT Generation. Start-up Pitch. Alina Ştefan, chief strategy officer şi Alexandru Cioflan, co-CEO, cofondator, NS EDGE - start-up de cybersecurity: Ţintim o rundă de investiţii de 2,5 mil. euro pentru expansiune în regiune şi pe piaţa din SUA
zf.ro
To view or add a comment, sign in
-
Publication alert: "Understanding #LocalGovernment #CybersecurityPolicy: A Concept Map and Framework," coauthored with Sk Tahsin Hossain, Kien Nguyen Thanh and Yue Xu, is published in Information MDPI. #Cybersecurity is crucial for local governments, which manage sensitive data and critical infrastructure. Our study reviews existing cybersecurity policies, assessing their alignment with the 🇺🇸 National Institute of Standards and Technology's #CybersecurityFramework 2.0. The study provides a comprehensive analysis and propose a cybersecurity policy framework to guide local governments in strengthening their cybersecurity measures. Read the full-text open article here: https://lnkd.in/gvBYUwHz Let’s work together to enhance cybersecurity in our local governments and build safer #SmartCities! QUT (Queensland University of Technology) QUT Engineering, Architecture and Built Environment QUT Urban AI Hub
To view or add a comment, sign in
-
Five things remarkable CTOs should never do: 1. Ignore emerging technologies Remarkable CTOs must keep an eye on new developments (AI, for instance) and analyze how they can be used to disrupt their current business model. 2. Underestimate security Ignoring cyber threats and not strengthening security can have an internal and external impact. 3. Resist change When you’re in tech, the only constant is change. CTOs must adapt to new processes, team structures, and technology to help their company stay competitive in a dynamic landscape. 4. Fail to prioritize compliance People say failing to plan is planning to fail, which makes sense in this scenario. 5. Overlook scalability As a company grows, so should its tech. How? Architecting solutions that scale with demand. What did I miss?
To view or add a comment, sign in
365 followers