
Akari Saito
Encryption & Privacy ConsultantIn an era where digital threats are a constant concern, Bharti Airtel has proactively devised a solution with its AI-powered fraud detection system. The system is designed to combat the escalating cyber threats that put mobile and broadband users at risk, especially in high-threat regions such as Delhi-NCR. Within a remarkable span of just 43
Zama, a pioneering company in the realm of data encryption, achieved a remarkable milestone by becoming the first unicorn enterprise specializing entirely in fully homomorphic encryption (FHE). This achievement was cemented by a valuation surpassing $1 billion following an impressive $57 million Series B funding round, led by Blockchange Ventures
The integration of advanced AI agents into enterprise workflows, touted as the next frontier in business efficiency, has sparked broader discussions regarding its inherent risks, particularly around its security vulnerabilities. As companies increasingly embed AI into processes like IT ticketing systems, the focus intensifies on protocols like
In today's rapidly evolving digital landscape, the complexity of managing identities has expanded beyond humans to include machine identities. Vernon Yai, a renowned expert in privacy protection and data governance, sheds light on the critical aspects of identity and access management for non-human identities. His insights delve into the risks
In the fast-evolving world of cybersecurity, Vernon Yai stands out as a leading expert in privacy protection and data governance. His innovative approaches to safeguarding sensitive information have positioned him as a thought leader in the field. With his deep insights into risk management, Vernon helps organizations navigate the complexities of
The digital landscape has become increasingly perilous for Android users due to the growing prevalence of banking Trojans that now threaten millions of devices. These malicious software programs are evolving at an unprecedented pace, targeting users' financial data and personal information. The sophistication of these Trojans has outpaced