logo
#

Latest news with #digitalsecurity

Cosmo Announces Sale of "Digital Trust" in Strategic Portfolio Streamlining Move
Cosmo Announces Sale of "Digital Trust" in Strategic Portfolio Streamlining Move

Yahoo

time4 days ago

  • Business
  • Yahoo

Cosmo Announces Sale of "Digital Trust" in Strategic Portfolio Streamlining Move

Dublin, Ireland--(Newsfile Corp. - June 25, 2025) - Cosmo today announced the signing of an agreement to sell 'Digital Trust' to its existing customer Tinexta InfoCert, Europe's largest Certification Authority and a subsidiary of Tinexta S.p.A., a publicly listed company in Italy. The transaction is expected to close by the end of June 2025 and will generate €8.3 million in revenue for Cosmo. 'Digital Trust' provides services within the digital security sector, offering IT solutions for digital identity protection and process dematerialization for healthcare organizations. The decision to sell 'Digital Trust' is part of a broader effort to streamline the Company's portfolio and reinforce its position as a focused, performance-driven organization. Cosmo is executing a clear strategic direction – prioritizing growth in AI-powered medical devices, gastrointestinal therapeutics, dermatology, and high-value CDMO services – while actively reallocating capital to the areas with the highest impact. 'Digital Trust is not a strategic asset for Cosmo, and this transaction reflects our disciplined focus on what drives the greatest impact for patients and shareholders,' said Giovanni Di Napoli, CEO of Cosmo. 'This is another concrete step forward in positioning Cosmo for sustainable growth by strengthening our focus on innovation and operational excellence in our core markets.' Cosmo continues to execute its strategy to build a focused, innovation-driven healthcare company with global reach, leveraging its strong capabilities in R&D, AI integration, and commercial partnerships. About Cosmo Cosmo Pharmaceuticals N.V. is committed to revolutionizing healthcare and transforming people's lives by researching and developing innovative products that tackle unfulfilled healthcare demands. As a pharmaceutical company, Cosmo is active in the areas of Healthtech/AI, dermatology, gastroenterology and contract manufacturing & development. For the commercialization and distribution of its products, Cosmo collaborates with leading partners worldwide, including Medtronic and Sun Pharma. Founded in 1997, Cosmo is headquartered in Dublin (Ireland) and has offices also in San Diego (USA), and Lainate/Rome/Catania (Italy). The Company has approximately 330 employees at the end of 2024, all dedicated to making a significant impact in the field of healthcare. For more information, please visit Financial calendar Investor Day, Zurich July 1, 2025 2025 Half-Year Results and Report July 23, 2025 For further information, please contact: Cosmo Pharmaceuticals Investor Relations, About Tinexta InfoCert Tinexta Infocert, part of the Tinexta Group, is the largest Certification Authority in Europe, operating in over 20 countries. The Company provides services in digitalization, eDelivery, Digital Signature, and digital document preservation. It is an AgID-accredited operator of digital identity within the framework of SPID (Public System for the Management of Digital Identity). It aims to continue expanding internationally also through acquisitions: it holds 100% of CertEurope, the largest Certification Authority in France; 51% of Camerfirma, one of the main certification authorities in Spain; and 16.7% of Authada, an innovative German Identity Provider. DisclaimerSome of the statements in this press release may be forward-looking statements or statements of future expectations based on currently available information. Such statements are naturally subject to risks and uncertainties. Factors such as the development of general economic conditions, future market conditions, unusual catastrophic loss events, changes in the capital markets and other circumstances may cause the actual events or results to be materially different from those anticipated by such statements. Cosmo does not make any representation or warranty, express or implied, as to the accuracy, completeness or updated status of such statements. Therefore, in no case whatsoever will Cosmo and its affiliate companies be liable to anyone for any decision made or action taken in conjunction with the information and/or statements in this press release or for any related damages. Attachments PDF - English To view the source version of this press release, please visit Sign in to access your portfolio

Master UniFi's Zone-Based Firewall Rules for Ultimate Network Security
Master UniFi's Zone-Based Firewall Rules for Ultimate Network Security

Geeky Gadgets

time18-06-2025

  • Geeky Gadgets

Master UniFi's Zone-Based Firewall Rules for Ultimate Network Security

Have you ever wondered how to strike the perfect balance between network security and ease of management? For many, configuring firewalls can feel like navigating a maze of technical jargon and endless rule sets. But UniFi's new zone-based firewall rules aim to change that. By introducing a more intuitive and granular approach to managing traffic, this system enables users to create secure, organized networks without the headache of overly complex setups. Whether you're safeguarding a home network or managing enterprise-level infrastructure, these tools promise to simplify configurations while significantly enhancing security. In this step-by-step primer, SpaceRex breaks down everything you need to know about UniFi's latest innovation. From understanding the core structure of zone-based firewalls to crafting precise rules that protect your most critical assets, this guide will help you unlock the full potential of this powerful system. Along the way, you'll discover how to isolate vulnerable devices, reduce your network's attack surface, and maintain seamless functionality—all without sacrificing control. Ready to rethink how you manage your network? Let's explore how these tools can transform your approach to digital security. UniFi Zone Firewall Overview Why Zone-Based Firewall Rules Matter The transition to a zone-based firewall structure introduces several critical advantages for network administrators. By organizing your network into logical zones, this system allows for more precise and efficient management of traffic. Key benefits include: Enhanced traffic control: Apply rules at the interface level to manage data flow with precision. Apply rules at the interface level to manage data flow with precision. Improved visualization: Easily configure and manage zones and rules through a user-friendly interface. Easily configure and manage zones and rules through a user-friendly interface. Reduced attack surface: Limit unnecessary access between zones to strengthen overall security. This approach not only simplifies network management but also establishes clear boundaries between different types of traffic, making sure a more secure and organized digital environment. Understanding the Zone-Based Firewall Structure UniFi's zone-based firewall organizes your network into predefined and customizable zones, each tailored to specific purposes. The default zones include: Internal: Trusted networks, such as office or home environments, where devices communicate freely. Trusted networks, such as office or home environments, where devices communicate freely. Hotspot: Guest networks designed to isolate visitors from internal resources, making sure privacy and security. Guest networks designed to isolate visitors from internal resources, making sure privacy and security. DMZ: External-facing services like web or email servers that require limited access to internal systems. In addition to these default zones, you can create custom zones to address unique requirements. For example, you might isolate IoT devices to prevent them from accessing sensitive resources or segment critical servers for added protection. This structure allows you to group devices and services logically, making sure efficient traffic management and enhanced security. New Unifi Zone Firewall Rules Setup Guide 2025 Watch this video on YouTube. Enhance your knowledge on cybersecurity by exploring a selection of articles and guides on the subject. Granular Rule Creation for Enhanced Control One of the standout features of UniFi's zone-based firewall is its ability to define highly specific traffic rules between zones. This level of granularity enables you to: Block untrusted devices: Prevent unauthorized devices from accessing internal resources. Prevent unauthorized devices from accessing internal resources. Restrict access: Limit office network access to specific servers or services based on operational needs. Limit office network access to specific servers or services based on operational needs. Permit essential services: Allow critical services like HTTP or SMB while blocking unnecessary traffic. Rules can be customized using parameters such as source, destination, and port, giving you precise control over how data flows through your network. This flexibility ensures that your network remains secure while maintaining the functionality required for day-to-day operations. Strengthening Security with Zone-Based Rules The new firewall system significantly enhances security by limiting unnecessary communication between zones. Sensitive resources, such as servers, security cameras, or databases, can be isolated and protected with detailed configurations. By blocking unauthorized traffic, you minimize the risk of exploitation and ensure a safer environment for your devices and data. This proactive approach to security reduces the likelihood of breaches and helps maintain the integrity of your network. Customization and Advanced Features UniFi's zone-based firewall offers extensive customization options to meet the diverse needs of different network environments. Some of the advanced features include: Device-specific rules: Tailor security settings to individual devices or services for maximum protection. Tailor security settings to individual devices or services for maximum protection. Traffic logging: Monitor activity and troubleshoot issues by analyzing logged data. Monitor activity and troubleshoot issues by analyzing logged data. Connection filtering: Manage return traffic and filter connections based on status for improved control. These features allow you to adapt the firewall system to your specific requirements, whether you're managing a small home network or a complex enterprise environment. The ability to fine-tune settings ensures that your network remains both secure and efficient. Best Practices for Effective Configuration To maximize the benefits of UniFi's zone-based firewall, consider implementing the following best practices: Start with essential rules: Focus on core security measures to maintain functionality while protecting your network. Focus on core security measures to maintain functionality while protecting your network. Organize logically: Arrange rules in a clear hierarchy, placing allow rules before block rules to avoid conflicts. Arrange rules in a clear hierarchy, placing allow rules before block rules to avoid conflicts. Keep it simple: Avoid overly complex configurations to reduce the risk of errors and ensure manageability. By following these strategies, you can strike a balance between robust security and ease of use, making sure that your network remains both protected and user-friendly. Real-World Use Cases The versatility of the zone-based firewall system makes it suitable for a wide range of scenarios. Some practical applications include: Guest network isolation: Prevent guest devices from accessing internal networks to protect sensitive resources. Prevent guest devices from accessing internal networks to protect sensitive resources. Service-specific access: Allow specific services, such as file sharing or web browsing, while blocking others to maintain control. Allow specific services, such as file sharing or web browsing, while blocking others to maintain control. Server protection: Safeguard critical servers from unauthorized access while allowing necessary communication for operations. These examples demonstrate how the system can effectively address diverse security challenges, making it a valuable tool for both personal and professional use. Advantages Over the Previous System The new zone-based firewall introduces several improvements over its predecessor, including: Intuitive interface: Simplifies rule creation and debugging, making it accessible to users of all skill levels. Simplifies rule creation and debugging, making it accessible to users of all skill levels. Enhanced visualization: Provides a clear overview of zones and rules for better management and oversight. Provides a clear overview of zones and rules for better management and oversight. Greater flexibility: Supports complex deployments and unique network setups with ease. These enhancements make the system a powerful solution for securing and optimizing your network, whether you're a seasoned IT professional or a tech-savvy home user. By adopting UniFi's zone-based firewall rules, you can create a secure, efficient, and adaptable network environment tailored to your specific needs. Media Credit: SpaceRex Filed Under: Guides, Hardware Latest Geeky Gadgets Deals Disclosure: Some of our articles include affiliate links. If you buy something through one of these links, Geeky Gadgets may earn an affiliate commission. Learn about our Disclosure Policy.

2025 Beijing Cyber Security Conference Opens, Focusing on Security Breakthroughs in the AI Era
2025 Beijing Cyber Security Conference Opens, Focusing on Security Breakthroughs in the AI Era

Malay Mail

time09-06-2025

  • Business
  • Malay Mail

2025 Beijing Cyber Security Conference Opens, Focusing on Security Breakthroughs in the AI Era

The 2025 Beijing Cyber Security Conference BEIJING, CHINA - Media OutReach Newswire - 9 June 2025 - On June 5, the Main Forum on Digital Security of the Global Digital Economy Conference 2025 (GDEC 2025), along with the 2025 Beijing Cyber Security Conference (BSC 2025), officially opened in Beijing. Under the theme "Security Breakthrough: Reshaping Built-in Security Systems", the conference brings together stakeholders from government, industry, academia, and research institutions to explore strategic breakthroughs for the cybersecurity industry in the age of artificial Xinchao, Deputy Secretary-General of the Beijing Municipal People's Government, stated in his speech that the construction of the Beijing National Cybersecurity Industrial Park has made phased progress. The Haidian Park, Tongzhou Park, and the Information Innovation Park in the Beijing Economic-Technological Development Area have together registered over 740 enterprises. The park has launched a national-level public cybersecurity service platform and has emerged as a leading national platform for China's cybersecurity industry. Going forward, Beijing, as a hub for international scientific and technological innovation, will promote breakthroughs in core technologies, enhance digital security application capabilities, speed up the development of standards systems, and foster a vibrant industrial ecosystem, laying a solid security foundation for the healthy development of emerging industries, new business models, and innovative Xiangdong, Vice Chairman of the All-China Federation of Industry and Commerce and Chairman of Qi-Anxin Group, emphasized that as intelligent agents and vertical AI applications proliferate rapidly, cybersecurity has reached a critical juncture requiring decisive breakthroughs. According to him, reshaping data aggregation models, security operations models, and ecosystem cooperation models are three major pathways for the security industry to reconstruct its framework and achieve transformation."Enhancement of AI capabilities does not equate to an improvement in security capabilities," noted Zeng Yi, Dean of the Beijing Institute of AI Safety and Governance. He pointed out that AI security threats are becoming increasingly complex, evolving from basic threats to composite and sophisticated Zhiguo, Executive Deputy Director of the Expert Advisory Committee of the Internet Society of China, remarked that artificial intelligence is not only a key technological domain in the global competition over cybersecurity but also a strategic asset in gaining the initiative in cyberspace. He called for a systematic approach to address complex risks and the construction of a more agile, intelligent, and collaborative security at the conference underscored the importance of an ecosystem based on the principles of coexistence, mutual prosperity, and shared success, which plays a critical role in overcoming key technological challenges, promoting industrial synergy, and co-building the cybersecurity ecosystem. They expressed hope that the Beijing Cyber Security Conference would continue to serve as a platform to drive the modernization of the national cybersecurity year's conference features cutting-edge technology forums, specialized competitions, international collaboration sessions, and, for the first time, a satellite venue in the Macao Special Administrative Region. Over a dozen sub-forums were held from June 5 to 6, covering topics such as smart energy security, data security, and AI large model application #GDEC2025 The issuer is solely responsible for the content of this announcement.

Have you received scam texts about an unpaid toll? You are not alone.
Have you received scam texts about an unpaid toll? You are not alone.

Washington Post

time04-06-2025

  • General
  • Washington Post

Have you received scam texts about an unpaid toll? You are not alone.

Text scams are the cockroaches of our digital lives — resilient and repulsive. With summer travel season starting and families hitting the road, I suspect many people will start seeing more scam toll and ticket text messages. On my phone, I have seen an increase in threats that I could face large penalties and even jail time. Others have been warned their vehicles could be impounded.

Govt reviewing laws, focus on role of parents to prevent child abuse
Govt reviewing laws, focus on role of parents to prevent child abuse

Free Malaysia Today

time02-06-2025

  • General
  • Free Malaysia Today

Govt reviewing laws, focus on role of parents to prevent child abuse

Law and institutional reform minister Azalina Othman Said with her Uzbek counterpart, justice minister Akbar Tashkulov, signing the memorandum of understanding on the exchange of legal expertise, among others. (Facebook pic) PUTRAJAYA : The government is reviewing several existing legal provisions to introduce clearer and stronger obligations for parents and guardians, in its effort to prevent abuse and sexual assault of children. Law and institutional reform minister Azalina Othman Said said the move would include proposing amendments to make it mandatory for parents and guardians to monitor their children's online activities, as well as to participate in digital safety awareness and education programmes actively. 'This approach reflects the principle of shared responsibility in safeguarding future generations from the growing threat of sexual crimes in the digital age,' she said in a statement issued today. Azalina said this in her keynote address, titled 'Creating a Safer Digital Future: Malaysia's Legislative Approach to Online Child' on the first day of the Tashkent Law Spring International Legal Forum 2025 in Uzbekistan, where she is currently on an official visit. In her address, Azalina also highlighted Malaysia's legislative initiatives aimed at strengthening online child protection laws and called on the international legal community to embrace a shared moral duty in addressing crimes against children. She emphasised the importance of ensuring that perpetrators of such offences are brought to justice without exception, underlining that protecting children in the digital space requires global cooperation and collective will. During the visit, Azalina also had the opportunity to hold a bilateral meeting with her counterpart, Uzbek Justice Minister Akbar Tashkulov, on May 30, with the meeting yielding meaningful results when both parties agreed to sign a new memorandum of understanding (MoU). 'This MoU will be in effect for three years and covers important aspects such as the exchange of legal expertise, cooperation in the reform of justice institutions and strengthening the capacity of the judicial systems of both countries. 'This move is very significant in supporting efforts towards a more responsive and dynamic legal system,' she said. In addition, Azalina also received a courtesy visit from the Head of Division and Senior Counsellor, Directorate of Public Governance, Organisation for Economic Co-operation and Development (OECD), Dr Tatyana Teplova. She said the meeting marked the beginning of strategic cooperation between Malaysia and the OECD, particularly in the aspects of strengthening the justice system, upholding the rule of law and improving the country's digital governance. 'I also expressed my desire for Malaysia to obtain the support of OECD expertise in implementing legal harmonisation with international standards, without disregarding local realities and the government's aspirations for sustainable institutional reform,' she said.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store