Taiwan’s successful combat against COVID-19 enabled the 6th CYBERSEC to be held as scheduled from August 11th to 12th, attracting more than 6,000 participants. Taiwan, as the first country globally to host a large cyber security conference and keep the industry functioning normally since the outbreak, has garnered much international attention. The attendance of President Tsai Ing-wen at the conference again highlighted Taiwan’s devotion to developing its cyber security industry and to establishing a cyber security system and industry chain that the world can trust in.
see moreThis year’s ACCS Virtual consists of the integration of online multimedia and online business matching activities through the virtual sales expansion platform. There will be more than 30 Taiwanese cyber security providers who will be exhibiting their products and solutions in ACCS Virtual. You are welcomed to take this opportunity to deepen the interactions with Taiwanese providers and strengthen the information security abilities at the same time; and also to create a safer digital world through this win-win business cooperation.
There has long been controversy lying in software-based security versus hardware-based security. In the coming decades, hardware-based security is no longer an option but a must. While in the evolving threat landscape, how we achieve cost-efficient operations based on hardware-based security requires proficient know-how and approaches. The speech aims to pinpoint the best practice to reduce operation costs, enhance performance and safeguard intellectual properties in employing hardware-based security. Extraordinary viewpoints based on experiences rather than knowledge will definitely help business and governmental entities pave the way for a secured yet painless business development.
Watch NowMany people know threat intelligences can be used to enhance security, but only few of them realizes an intelligence-driven real time defense system. Some tries to do it by importing IoCs, malicious IP/domain objects extracted from the intelligence, to NGFW or IPS but fail because of insufficient capacity to carry a long IoC list that usually includes millions of objects. PacketX GRISM is an advanced network visibility platform with a built-in intelligence-driven defense function that can detect or block the cyber attack according to the a massive IoC list. We would like to introduce how PacketX leverage the power of threat intelligence to build the security frontline.
Watch NowIntroduction of BlockChain Security Corp. and its solutions.. Blockchain Sign is a one-stop platform helping businesses with online document signing and auditing contracts. Users are allowed to sign on-screen using online web addition as well as mobile app, helping organizations save significant time handling complicate paper printing, signing and scanning process. The platform provides end-to-end document signing, biometric authentication, permanent preservation on blockchain. Together, these features make signing process more efficient by making use of cryptographic encryption, face recognition, two-factor authentication and blockchain technology.
Watch NowIntroduction to HyperG Smart Security. How HyperG helps to identify to various cyber threats and attacks and protect protect smart devices and operating systems from unknown threats.
Watch NowX-FORT provides a comprehensive endpoint security solution includes DLP, DRM, and ITAM. It prevents confidential information from breaching or losing, and provides the management tools of applications, computer assets, and remote control.
Watch NowThe Key Management System(RKMS) 2.0 from Ruiting is a system for managing cryptographic keys, including generation/authorization/life cycle/auditing on those critical keys. It provide key management, cryptographic functions and security policy enforcement. RKMS 2.0 works with PKCS#11 libraries provided by HSM vendors to provide operations like encryption, decryption, sign, verify to applications which rely on critical keys.
Watch NowSatisfaction
Will visit again
Appreciate matchmaking