Connect with us

Technology

Highline Honored with Prestigious Business of the Year Award

Published

on

PUEBLO WEST, Colo., Nov. 19, 2024 /PRNewswire/ — On Saturday, November 16th, the Pueblo West Chamber of Commerce hosted its highly anticipated annual dinner, a celebration of community and business excellence. With an ’80s-inspired theme, the event was vibrant, well-attended, and filled with camaraderie. Among the evening’s highlights was the announcement of Highline as the recipient of the Business of the Year Award—a prestigious honor recognizing the company’s exceptional contributions to the community and its active involvement through the chamber and local initiatives.

The award was accepted by Highline CEO Rob Mills, who expressed his gratitude on behalf of the company. Joining him on stage were Sales Manager Troy English and Community Relations Specialist Emily Briggs, who have played instrumental roles in fostering Highline’s connection with the Pueblo West community.

“This award is a reflection of the collective efforts of our entire team,” said Rob Mills during his acceptance speech. “We are proud to be a part of such a dynamic and supportive community, and we remain committed to making a positive impact.”

Highline’s recognition as Business of the Year underscores its dedication to more than just delivering quality services—it highlights its passion for building lasting relationships and giving back to the communities it serves. From participating in local events to spearheading community-focused initiatives, Highline is dedicated to being a true community partner.

Congratulations to the entire Highline team for this well-deserved honor, and here’s to continued success and collaboration in the years ahead!

ABOUT HIGHLINE:

At Highline, we believe everyone should have access to the most reliable, fastest internet service at a fair price, regardless of where you live and work. Highline’s heritage companies have been in the telecommunications business for more than 126 years and have built, owned, and operated fiber networks for more than 27 years. Highline currently serves the communication and internet needs of residents and businesses in Colorado, Georgia, Kansas, Michigan, Nebraska and Texas. Highline is building 10G state-of-the-art, Fiber-to-the-Premise, lightning-fast networks to provide 1-10 Gigabit internet service to tens of thousands of homes and businesses across the country that are currently unserved, underserved and unhappily served.

Press Release Content Owners:

Highline Chief Marketing Officer: Lynn Hall
Phone #: 678-770-0059 
Email Address: Lynn.Hall@HighlineFast.com

Highline Director of Marketing: Lea Burns
Phone #: 603-785-6804
Email Address: Lea.Burns@HighlineFast.com 

Highline CEO: Rob Mills
Phone #: 404-353-8720
Email Address: Rob.Mills@HighlineFast.com

View original content to download multimedia:https://www.prnewswire.com/news-releases/highline-honored-with-prestigious-business-of-the-year-award-302310229.html

SOURCE Highline

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

ObjectSecurity Releases BinLens 3.0 for Advanced Binary Vulnerability Analysis

Published

on

By

ObjectSecurity, a recognized leader in advanced defense and industrial cybersecurity solutions, today announced the release of BinLens™ 3.0, the latest iteration of its cutting-edge binary vulnerability analysis tool.

SAN DIEGO, Nov. 19, 2024 /PRNewswire-PRWeb/ — ObjectSecurity, a recognized leader in advanced defense and industrial cybersecurity solutions, today announced the release of BinLens™ 3.0, the latest iteration of its cutting-edge binary vulnerability analysis tool.

BinLens™ takes a groundbreaking approach, leveraging advanced symbolic binary-level analysis to detect hidden and unpublished vulnerabilities, including memory-safety violations. Its superior detection accuracy dramatically lowers false-positive rate sets it apart from traditional tools.

BinLens™ addresses critical gaps in traditional cybersecurity approaches by automating the complex process of analyzing binary programs. This powerful new version provides organizations with deeper insights into vulnerabilities, enabling faster and more effective mitigation of potential threats.

BinLens™ is a bold evolution from ObjectSecurity OT.AI Platform™ 2.x, delivering a revolutionary approach to binary vulnerability analysis. Engineered to effortlessly uncover zero-day vulnerabilities with cutting-edge accuracy and minimal false positives, BinLens™ is designed for both IT and OT/ICS environments.

Leveraging advanced automation, BinLens™ streamlines traditionally labor-intensive tasks such as symbolic analysis, static analysis, disassembly, and decompilation. Unlike conventional tools that focus solely on known vulnerabilities, BinLens™ offers a proactive defense, providing organizations with unmatched flexibility through its versatile deployment options.

Conventional cybersecurity methods—such as network scans, SBOMs, and source code reviews—often fall short, detecting only known vulnerabilities and leaving critical gaps. BinLens™ takes a groundbreaking approach, leveraging advanced symbolic binary-level analysis to detect hidden and unpublished vulnerabilities, including memory-safety violations and other undefined behaviors. Its superior detection accuracy and dramatically lower false-positive rate set it apart from traditional tools.

Key Features of BinLens™ Include:

Memory Safety Detection: Identifies unsafe writes like weak pointers, stack overflows, and heap overflows to prevent data corruption, crashes, or unauthorized access.Control Flow Risk Mitigation: Detects vulnerabilities that allow user-controlled instruction pointers, safeguarding against arbitrary code execution.Array and String Violation Identification: Highlights issues such as out-of-bound array indices and externally controlled string vulnerabilities, protecting sensitive program data.Cryptographic Analysis: Evaluates encryption schemes, embedded keys, and entropy to uncover potential weaknesses in cryptographic defenses.Comprehensive Vulnerability Detection: Goes beyond published vulnerabilities, scanning for over 18,000 CVEs specific to OT/ICS binaries and nearly 140 CWEs across 30 CPU architectures.Integrated Automation: Combines tasks like disassembly, decompilation, and delta analysis into a unified “single pane of glass,” automating workflows traditionally requiring expert manual effort.Compliance Support: Maps to standards like NIST 800 and ISA/IEC 62443, helping organizations meet security and regulatory requirements.Flexible Deployment Options: Supports both on-premises (including Kubernetes clusters) and cloud environments, catering to the needs of DoD, government, and critical infrastructure sectors.

Serving a Broad Range of Users:

Red Teams, Reverse Engineers, Threat Hunters, and Vulnerability Researchers: Accelerate workflows and gain deeper insights.DevSecOps Engineers, QA Testers, and Developers: Detect vulnerabilities missed by source code analysis and integrate findings into DevSecOps pipelines.Operators, Procurement Teams: Mitigate supply chain risks by analyzing software during procurement, deployment, and patching, including legacy devices.

Availability

BinLens™ 3.0 is officially available starting today, November 15, 2024. Organizations can obtain the latest version directly from ObjectSecurity or through our network of authorized partners. For more information on licensing options or to schedule a demo, please visit ObjectSecurity BinLens at https://objectsecurity.com/binlens.

About ObjectSecurity

ObjectSecurity LLC is a trusted leader in solving complex, evolving cybersecurity and supply chain risk challenges that threaten national security and critical operations. Specializing in advanced cybersecurity solutions for both IT and OT/ICS systems, ObjectSecurity focuses on automating and streamlining security processes. With innovative tools like BinLens™, the company empowers organizations to proactively identify and mitigate vulnerabilities at their core—within software code and data.

ObjectSecurity’s holistic, proactive approach is designed to prevent cyberattacks and minimize production downtime across critical industries, including military defense, municipal smart cities, public and private transportation, energy, wastewater treatment, power utilities, manufacturing, and life sciences.

With over two decades of experience, ObjectSecurity has been a trusted provider of cybersecurity and supply chain risk management solutions to U.S. defense and federal agencies. Today, these cutting-edge technologies are commercially available to government and private sector organizations.

Headquartered in San Diego, CA, ObjectSecurity is a privately held company with a global presence.

For more information, visit

BinLens™ https://objectsecurity.com/binlens

ObjectSecurity https://objectsecurity.com

Media Contact

Dan Mathews, ObjectSecurity LLC, 1 6505153391, press@objectsecurity.com, https://objectsecurity.com

View original content to download multimedia:https://www.prweb.com/releases/objectsecurity-releases-binlens-3-0-for-advanced-binary-vulnerability-analysis-302310310.html

SOURCE ObjectSecurity LLC

Continue Reading

Technology

Hydra X Becomes the first Licensed Custodian in APAC to Provide Custody for Canton Coin

Published

on

By

SINGAPORE, Nov. 20, 2024 /PRNewswire/ — Hydra X today announced that it is the first licensed custodian in APAC to provide custody for Canton Coin, marking a significant milestone for both Hydra X and the Canton Network ecosystem. In this groundbreaking collaboration, SBIVC will become the first Canton Network ecosystem member to leverage Hydra X’s industry-leading custody services for Canton Coin.

Supporting Canton Coin will enable Hydra X’s clients across APAC, such as SBIVC, to bring regulatory-grade digital assets to market, utilizing the full potential of tokenization and Canton Network’s privacy-first architecture. Hydra X will partner with Digital Asset to integrate its tokenization utility, allowing institutional clients to securely issue and manage digital assets while maintaining full control over privacy and data sovereignty—a hallmark feature of the Canton Network.

“SBIVC is excited to be the first Canton Network ecosystem member to leverage Hydra X’s industry-leading custody services for Canton Coin. Hydra X’s strong track record in regulatory compliance and security makes it an ideal partner for this initiative. This partnership is a crucial step in delivering the secure, privacy-preserving infrastructure that is required to foster confidence in digital assets for institutional players across APAC,” said Eiichiro So, CEO of SBIVC.

“Becoming the first licensed custodian in APAC to support Canton Coin is a significant achievement for Hydra X,” said Ng Wee Hao, COO of Hydra X. “This partnership with Digital Asset and SBIVC enables us to leverage the full power of the Canton Network’s privacy and security features, reinforcing our commitment to providing secure, regulatory-compliant solutions.  Our clients can now confidently navigate the digital assets space, supported by a scalable solution that meets the highest regulatory standards.”

About Hydra X:

Hydra X is a regulated capital markets infrastructure company, developing technology and financial services to power the next generation of tokenized financial markets. Its comprehensive solutions span the entire capital markets lifecycle, from securitization, primary issuance and secondary trading, to custody and settlement.

As a regulated digital asset custodian licensed by the Monetary Authority of Singapore, Hydra X provides institutional-grade custodial services for a broad range of digital assets, including security tokens and digital payment tokens, and is one of the largest security token custodians in APAC.

For more information, visit our website or Linkedin.

View original content to download multimedia:https://www.prnewswire.com/apac/news-releases/hydra-x-becomes-the-first-licensed-custodian-in-apac-to-provide-custody-for-canton-coin-302309323.html

SOURCE Hydra X

Continue Reading

Technology

Cargobase Secures SOC 2 Compliance For Leading Spot Freight Automation & Transportation Management System (TMS)

Published

on

By

SINGAPORE, Nov. 20, 2024 /PRNewswire/ — Cargobase, a logistics technology platform for enterprise shippers, today announced that it has achieved SOC 2 Type II compliance, specifically meeting the Security, Availability and Confidentiality (SAC) Trust Services Criteria. This independent verification underscores Cargobase’s commitment to data security, system reliability and the protection of sensitive information, reinforcing the company’s dedication to setting industry benchmarks in secure logistics solutions. This attestation complements Cargobase’s ISO 27001 certification, further strengthening the foundation of trust our customers rely on.

“We’re proud to announce that Cargobase has achieved SOC 2 Type II compliance, demonstrating our commitment to data security and meeting the evolving needs of our clients. Recognizing the growing importance of this requirement within the industry, we’ve invested in robust security measures to provide our customers with the confidence and assurance they require,” said Wiebe Helder, CEO at Cargobase.

“In the dynamic world of logistics and supply chain management, large volumes of sensitive data are exchanged daily,” said Arnout Wagenaar, Chief Strategy Officer at Cargobase. “Data security is paramount for our customers, who entrust us with information critical to their operations. Achieving SOC 2 Type II compliance underscores our unwavering commitment to data integrity and protection, thus building trust with our partners and allowing us to better serve the needs of enterprise shippers worldwide.”

Understanding SOC 2 Compliance

The SOC 2 framework is a globally recognized standard developed by the American Institute of CPAs (AICPA). It focuses on Trust Services Criteria, including Security, Availability and Confidentiality to ensure that systems are protected from unauthorized access, reliably available to customers and employees, and that sensitive information remains confidential.

What is SOC 2 Type II Compliance?

Obtaining a SOC 2 report involves a CPA audit to attest to an organization’s security controls. It aims to determine whether the controls put in place are designed correctly.

Type I reports evaluate an organization’s controls at a single point in time, whereas a Type II report examines how well those controls perform over a period of time (typically 3-12 months).

What it means for our customers

This achievement reaffirms Cargobase’s position as a trusted partner for enterprise shippers worldwide. By prioritizing data security, we empower our clients to navigate the complexities of global logistics with peace of mind.

ABOUT CARGOBASE

Founded in Singapore in 2013, Cargobase is a global logistics software company whose mission is to simplify logistics for all. Its solution: “Logistics Software That Works”.

The Cargobase platform is designed for shippers to manage their local, regional or global supply chains across all freight modes, giving logistics professionals the visibility and control to make better decisions from day one.

Cargobase TMS is used in 50 countries by leading enterprise shippers across Automotive, Semiconductor, Oil & Gas and Industrial Machinery sectors. Cargobase has offices in Singapore, Malaysia, Netherlands, Mexico, and the United States.

For more information, visit www.cargobase.com.

View original content:https://www.prnewswire.com/apac/news-releases/cargobase-secures-soc-2-compliance-for-leading-spot-freight-automation–transportation-management-system-tms-302309324.html

SOURCE Cargobase Pte Ltd

Continue Reading

Trending