Monday, June 24, 2019

KeySupreme at CES 2019

When one thinks of security and authentication, what often comes to mind may be passwords to email or logins to websites. However, when taking into account all other forms of authentication we use on a daily basis, such as...
TechCrunch Disrupt is the world’s leading authority in debuting revolutionary startups, introducing game-changing technologies and discussing what’s top of mind for the tech industry’s key innovators. Disrupt SF 2018 gathered the best and brightest entrepreneurs, investors, hackers, and tech...
Google Campus Seoul- August 9th, 2018 KeySupreme is gathered government officials, C-level executives, investors, academics, hackers, entrepreneurs, security enthusiasts to discuss about the state of cybersecurity in Korea and worldwide, where they showcased some spectacular cyber-attack simulations, and unveiled its...
Details Event Plan: 6:30-7:00 PM : Effective Networking - Pizza and Beer 7:00 PM : Host Presentation : Dino De Cespedes 7:00-7:30 PM :Keynote by Keith Trippie 1) Workforce: Cyber Security’s Riskiest Domain 2) Future Business Model of IT and Cyber 7:30-7:40 PM : Q&A 7:40-7:50 PM...
It is not a hidden fact that more and more businesses are facing the devastating consequences related to cybersecurity today. As the internet helps individuals connect with each other, it simultaneously creates more opportunities for hackers to take advantage...
In computing, authentication is the process or action of verifying the identity of a user or process. Nowadays that our life is almost fully digital, this process is gaining utmost relevance. According to the Verizon’s 2018...
Invincibility lies in the defense, the possibility of victory in the attack. -Sun Tzu (The Art of War)   A cyber  attack is a malicious and deliberate attempt by an individual or organization to breach the information system of another individual or...
Thursday evening at WeWork in Seoul, members of the KeySupreme team discussed the current state of authentication, some of its commonly exploited flaws, and ways users (everyone) can protect themselves and their information. To understand how we've arrived at...