Taiwan’s successful combat against COVID-19 enabled the 6th CYBERSEC to be held as scheduled from August 11th to 12th, attracting more than 6,000 participants. Taiwan, as the first country globally to host a large cyber security conference and keep the industry functioning normally since the outbreak, has garnered much international attention. The attendance of President Tsai Ing-wen at the conference again highlighted Taiwan’s devotion to developing its cyber security industry and to establishing a cyber security system and industry chain that the world can trust in.
see moreThis year’s ACCS Virtual consists of the integration of online multimedia and online business matching activities through the virtual sales expansion platform. There will be more than 30 Taiwanese cyber security providers who will be exhibiting their products and solutions in ACCS Virtual. You are welcomed to take this opportunity to deepen the interactions with Taiwanese providers and strengthen the information security abilities at the same time; and also to create a safer digital world through this win-win business cooperation.
CYBAVO provides Next Generation ID-based Key Management for blockchain keys built upon strong encryption and authentication technologies. On the one hand, CYBAVO offers a complete suite of solutions for secure blockchain private key management, including a secure cryptocurrency custody and management platform for enterprise which unifies institutional-level security with online-banking usability; CYBAVO also offers a keyless crypto wallet SDK and an enterprise blockchain solution.
Watch NowAs the intrusion methods of connected devices are constantly updated, the difficulty of test technology and labor costs are getting higher and higher. How to conduct a complete internal security test is the focus of global IoT and industrial control equipment manufacturers. To this end, Onward Security has invested in the research and development of security test tools many years ago, hoping to help manufacturers solve product security problems with automated tools. It introduced HERCULES SecFlow and SecDevice, which are automated product security assessment platforms aimed to help firms implement DevSecOps.
Watch NowANCHOR has 3 security goals of privileged access management that includes Privileged Access Life-cycle Management, APT Attacks Prevention, and Threat Alert. To cope with the requirements for Work from Home in the period of COVID-19, we also developed an optional module for adopting Endpoint management rapidly. All-in-one, Secure, Convenience, Pro-active and State-of-the-art PAM product is always the motto of ANCHOR product development.
Watch Now1. M.O.C (Monitoring and Operation Center)-M.O.C is an integrated cybersecurity operation service run by SOAR mechanism and ITIL methodology. MOC is able to correlate log and event from various audit and monitoring systems and provide integrated analysis to clients. We aim to provide high-level system management service in a more economical way and hopes to expand to overseas markets. 2. H.E.I.S(Human Error Insight System)-According to the research, each office worker receives an average of 60 e-mails per day, and about 20% of the emails are phishing or spam mail. That means each worker will receive over 2000 risky e-mails in a year. What should we do to enhance employees’ cyber-awareness, and get capability to identify hackers’approach?
Watch NowLeading in serving the public sector in Taiwan, the Cybersecurity Technology Institute (CSTI) is aimed at providing technology solutions and services for its clients in confronting with emerging security challenges in cyberspace. As the traditional defense equipment has no longer provided enough ability in preventing potential threats. CSTI is going to introduce two technology applications for emerging threats: SecBuzzer ESM (Enterprise Security Management) and DTM (Detection Tagging Mitigation).
Watch NowBGP itself is a trustful based protocol, so everyone can be trusted, BGP announcements are genuine and no security mechanisms are employed in standard BGP. We implement a security extension for SD-BGP that consists of three modules, TCP authentication module, Prefix validation module and AS path validation module to protect BGP session from different perspective.
Watch NowSatisfaction
Will visit again
Appreciate matchmaking