Connect with us

Technology

Tribe Property Technologies Announces Timing of Third Quarter Financial Results Video Conference Call

Published

on

VANCOUVER, BC, Nov. 19, 2024 /CNW/ – Tribe Property Technologies Inc. (TSXV: TRBE) (TCQB: TRPTF) (“Tribe” or the “Company”), a leading provider of technology-enabled property management solutions, is pleased to announce the Company will release its third quarter financial results for the period ended September 30, 2024, on Thursday, November 28, 2024.

The Company will also host a conference call to discuss the results on the same day at 1:00 pm ET (10:00 am PT). The call will be hosted by Joseph Nakhla, Chief Executive Officer, and Angelo Bartolini, Chief Financial Officer.

Related earnings release materials will be available on the Company’s SEDAR profile at www.sedarplus.com and Tribe’s website at https://tribetech.com/investors/.

Webinar Details:

Date:

November 28, 2024

Time:

1:00 pm ET (10:00 am PT)

Webinar Registration: 

https://bit.ly/TRBE-Q324-webinar

Dial-in:

+1 778 907 2071 (Vancouver local)

+1 647 374 4685 (Toronto local)

Click here to find local numbers

Meeting ID #:

870 7609 6115

Please connect 5 minutes prior to the conference call to ensure time for any software download that may be required.

About Tribe Property Technologies

Tribe is a property technology company that is disrupting the traditional property management industry. As a rapidly growing tech-forward property management company, Tribe’s integrated service-technology delivery model serves the needs of a much wider variety of stakeholders than traditional service providers. Tribe seeks to acquire highly accretive targets in the fragmented North American property management industry and transform these businesses through streamlining and digitization of operations. Tribe’s platform decreases customer acquisition costs, increases retention, and allows for the addition of value-added products and services through the platform. Visit tribetech.com for more information.

Tribe Property Technologies Inc.
“Joseph Nakhla”
Chief Executive Officer

Cautionary Statement on Forward-Looking Information

Neither the TSX Venture Exchange nor its Regulation Services Provider (as that term is defined in the policies of the TSX Venture Exchange) accepts responsibility for the adequacy or accuracy of this release.

This news release contains certain statements which constitute forward-looking statements or information under applicable Canadian securities laws, including statements relating to the expected financial results and the Company’s goals and strategy. Such forward-looking statements are subject to numerous known and unknown risks, uncertainties, and other factors, some of which are beyond the Company’s control, which could cause actual results or events to differ materially from those stated, anticipated or implied in the forward-looking statements. These risks and uncertainties include changes to applicable laws or the regulatory sphere in which the Company operates, general economic and capital markets conditions, and stock market volatility. Although the Company believes that the forward-looking statements in this news release are reasonable, they are based on factors and assumptions, based on currently available information, concerning future events, which may prove to be inaccurate. As such, readers are cautioned not to place undue reliance on the forward-looking statements, as no assurance can be provided as to plans, operations, results, levels of activity or achievements. The forward-looking statements contained in this news release are made as of the date of this news release and, except as required by applicable law, the Company does not undertake any obligation to publicly update or to revise any of the forward-looking statements, whether because of new information, future events or otherwise.

SOURCE Tribe Property Technologies Inc.

Continue Reading
Click to comment

Leave a Reply

Your email address will not be published. Required fields are marked *

Technology

ObjectSecurity Releases BinLens 3.0 for Advanced Binary Vulnerability Analysis

Published

on

By

ObjectSecurity, a recognized leader in advanced defense and industrial cybersecurity solutions, today announced the release of BinLens™ 3.0, the latest iteration of its cutting-edge binary vulnerability analysis tool.

SAN DIEGO, Nov. 19, 2024 /PRNewswire-PRWeb/ — ObjectSecurity, a recognized leader in advanced defense and industrial cybersecurity solutions, today announced the release of BinLens™ 3.0, the latest iteration of its cutting-edge binary vulnerability analysis tool.

BinLens™ takes a groundbreaking approach, leveraging advanced symbolic binary-level analysis to detect hidden and unpublished vulnerabilities, including memory-safety violations. Its superior detection accuracy dramatically lowers false-positive rate sets it apart from traditional tools.

BinLens™ addresses critical gaps in traditional cybersecurity approaches by automating the complex process of analyzing binary programs. This powerful new version provides organizations with deeper insights into vulnerabilities, enabling faster and more effective mitigation of potential threats.

BinLens™ is a bold evolution from ObjectSecurity OT.AI Platform™ 2.x, delivering a revolutionary approach to binary vulnerability analysis. Engineered to effortlessly uncover zero-day vulnerabilities with cutting-edge accuracy and minimal false positives, BinLens™ is designed for both IT and OT/ICS environments.

Leveraging advanced automation, BinLens™ streamlines traditionally labor-intensive tasks such as symbolic analysis, static analysis, disassembly, and decompilation. Unlike conventional tools that focus solely on known vulnerabilities, BinLens™ offers a proactive defense, providing organizations with unmatched flexibility through its versatile deployment options.

Conventional cybersecurity methods—such as network scans, SBOMs, and source code reviews—often fall short, detecting only known vulnerabilities and leaving critical gaps. BinLens™ takes a groundbreaking approach, leveraging advanced symbolic binary-level analysis to detect hidden and unpublished vulnerabilities, including memory-safety violations and other undefined behaviors. Its superior detection accuracy and dramatically lower false-positive rate set it apart from traditional tools.

Key Features of BinLens™ Include:

Memory Safety Detection: Identifies unsafe writes like weak pointers, stack overflows, and heap overflows to prevent data corruption, crashes, or unauthorized access.Control Flow Risk Mitigation: Detects vulnerabilities that allow user-controlled instruction pointers, safeguarding against arbitrary code execution.Array and String Violation Identification: Highlights issues such as out-of-bound array indices and externally controlled string vulnerabilities, protecting sensitive program data.Cryptographic Analysis: Evaluates encryption schemes, embedded keys, and entropy to uncover potential weaknesses in cryptographic defenses.Comprehensive Vulnerability Detection: Goes beyond published vulnerabilities, scanning for over 18,000 CVEs specific to OT/ICS binaries and nearly 140 CWEs across 30 CPU architectures.Integrated Automation: Combines tasks like disassembly, decompilation, and delta analysis into a unified “single pane of glass,” automating workflows traditionally requiring expert manual effort.Compliance Support: Maps to standards like NIST 800 and ISA/IEC 62443, helping organizations meet security and regulatory requirements.Flexible Deployment Options: Supports both on-premises (including Kubernetes clusters) and cloud environments, catering to the needs of DoD, government, and critical infrastructure sectors.

Serving a Broad Range of Users:

Red Teams, Reverse Engineers, Threat Hunters, and Vulnerability Researchers: Accelerate workflows and gain deeper insights.DevSecOps Engineers, QA Testers, and Developers: Detect vulnerabilities missed by source code analysis and integrate findings into DevSecOps pipelines.Operators, Procurement Teams: Mitigate supply chain risks by analyzing software during procurement, deployment, and patching, including legacy devices.

Availability

BinLens™ 3.0 is officially available starting today, November 15, 2024. Organizations can obtain the latest version directly from ObjectSecurity or through our network of authorized partners. For more information on licensing options or to schedule a demo, please visit ObjectSecurity BinLens at https://objectsecurity.com/binlens.

About ObjectSecurity

ObjectSecurity LLC is a trusted leader in solving complex, evolving cybersecurity and supply chain risk challenges that threaten national security and critical operations. Specializing in advanced cybersecurity solutions for both IT and OT/ICS systems, ObjectSecurity focuses on automating and streamlining security processes. With innovative tools like BinLens™, the company empowers organizations to proactively identify and mitigate vulnerabilities at their core—within software code and data.

ObjectSecurity’s holistic, proactive approach is designed to prevent cyberattacks and minimize production downtime across critical industries, including military defense, municipal smart cities, public and private transportation, energy, wastewater treatment, power utilities, manufacturing, and life sciences.

With over two decades of experience, ObjectSecurity has been a trusted provider of cybersecurity and supply chain risk management solutions to U.S. defense and federal agencies. Today, these cutting-edge technologies are commercially available to government and private sector organizations.

Headquartered in San Diego, CA, ObjectSecurity is a privately held company with a global presence.

For more information, visit

BinLens™ https://objectsecurity.com/binlens

ObjectSecurity https://objectsecurity.com

Media Contact

Dan Mathews, ObjectSecurity LLC, 1 6505153391, press@objectsecurity.com, https://objectsecurity.com

View original content to download multimedia:https://www.prweb.com/releases/objectsecurity-releases-binlens-3-0-for-advanced-binary-vulnerability-analysis-302310310.html

SOURCE ObjectSecurity LLC

Continue Reading

Technology

Hydra X Becomes the first Licensed Custodian in APAC to Provide Custody for Canton Coin

Published

on

By

SINGAPORE, Nov. 20, 2024 /PRNewswire/ — Hydra X today announced that it is the first licensed custodian in APAC to provide custody for Canton Coin, marking a significant milestone for both Hydra X and the Canton Network ecosystem. In this groundbreaking collaboration, SBIVC will become the first Canton Network ecosystem member to leverage Hydra X’s industry-leading custody services for Canton Coin.

Supporting Canton Coin will enable Hydra X’s clients across APAC, such as SBIVC, to bring regulatory-grade digital assets to market, utilizing the full potential of tokenization and Canton Network’s privacy-first architecture. Hydra X will partner with Digital Asset to integrate its tokenization utility, allowing institutional clients to securely issue and manage digital assets while maintaining full control over privacy and data sovereignty—a hallmark feature of the Canton Network.

“SBIVC is excited to be the first Canton Network ecosystem member to leverage Hydra X’s industry-leading custody services for Canton Coin. Hydra X’s strong track record in regulatory compliance and security makes it an ideal partner for this initiative. This partnership is a crucial step in delivering the secure, privacy-preserving infrastructure that is required to foster confidence in digital assets for institutional players across APAC,” said Eiichiro So, CEO of SBIVC.

“Becoming the first licensed custodian in APAC to support Canton Coin is a significant achievement for Hydra X,” said Ng Wee Hao, COO of Hydra X. “This partnership with Digital Asset and SBIVC enables us to leverage the full power of the Canton Network’s privacy and security features, reinforcing our commitment to providing secure, regulatory-compliant solutions.  Our clients can now confidently navigate the digital assets space, supported by a scalable solution that meets the highest regulatory standards.”

About Hydra X:

Hydra X is a regulated capital markets infrastructure company, developing technology and financial services to power the next generation of tokenized financial markets. Its comprehensive solutions span the entire capital markets lifecycle, from securitization, primary issuance and secondary trading, to custody and settlement.

As a regulated digital asset custodian licensed by the Monetary Authority of Singapore, Hydra X provides institutional-grade custodial services for a broad range of digital assets, including security tokens and digital payment tokens, and is one of the largest security token custodians in APAC.

For more information, visit our website or Linkedin.

View original content to download multimedia:https://www.prnewswire.com/apac/news-releases/hydra-x-becomes-the-first-licensed-custodian-in-apac-to-provide-custody-for-canton-coin-302309323.html

SOURCE Hydra X

Continue Reading

Technology

Cargobase Secures SOC 2 Compliance For Leading Spot Freight Automation & Transportation Management System (TMS)

Published

on

By

SINGAPORE, Nov. 20, 2024 /PRNewswire/ — Cargobase, a logistics technology platform for enterprise shippers, today announced that it has achieved SOC 2 Type II compliance, specifically meeting the Security, Availability and Confidentiality (SAC) Trust Services Criteria. This independent verification underscores Cargobase’s commitment to data security, system reliability and the protection of sensitive information, reinforcing the company’s dedication to setting industry benchmarks in secure logistics solutions. This attestation complements Cargobase’s ISO 27001 certification, further strengthening the foundation of trust our customers rely on.

“We’re proud to announce that Cargobase has achieved SOC 2 Type II compliance, demonstrating our commitment to data security and meeting the evolving needs of our clients. Recognizing the growing importance of this requirement within the industry, we’ve invested in robust security measures to provide our customers with the confidence and assurance they require,” said Wiebe Helder, CEO at Cargobase.

“In the dynamic world of logistics and supply chain management, large volumes of sensitive data are exchanged daily,” said Arnout Wagenaar, Chief Strategy Officer at Cargobase. “Data security is paramount for our customers, who entrust us with information critical to their operations. Achieving SOC 2 Type II compliance underscores our unwavering commitment to data integrity and protection, thus building trust with our partners and allowing us to better serve the needs of enterprise shippers worldwide.”

Understanding SOC 2 Compliance

The SOC 2 framework is a globally recognized standard developed by the American Institute of CPAs (AICPA). It focuses on Trust Services Criteria, including Security, Availability and Confidentiality to ensure that systems are protected from unauthorized access, reliably available to customers and employees, and that sensitive information remains confidential.

What is SOC 2 Type II Compliance?

Obtaining a SOC 2 report involves a CPA audit to attest to an organization’s security controls. It aims to determine whether the controls put in place are designed correctly.

Type I reports evaluate an organization’s controls at a single point in time, whereas a Type II report examines how well those controls perform over a period of time (typically 3-12 months).

What it means for our customers

This achievement reaffirms Cargobase’s position as a trusted partner for enterprise shippers worldwide. By prioritizing data security, we empower our clients to navigate the complexities of global logistics with peace of mind.

ABOUT CARGOBASE

Founded in Singapore in 2013, Cargobase is a global logistics software company whose mission is to simplify logistics for all. Its solution: “Logistics Software That Works”.

The Cargobase platform is designed for shippers to manage their local, regional or global supply chains across all freight modes, giving logistics professionals the visibility and control to make better decisions from day one.

Cargobase TMS is used in 50 countries by leading enterprise shippers across Automotive, Semiconductor, Oil & Gas and Industrial Machinery sectors. Cargobase has offices in Singapore, Malaysia, Netherlands, Mexico, and the United States.

For more information, visit www.cargobase.com.

View original content:https://www.prnewswire.com/apac/news-releases/cargobase-secures-soc-2-compliance-for-leading-spot-freight-automation–transportation-management-system-tms-302309324.html

SOURCE Cargobase Pte Ltd

Continue Reading

Trending