Cybersecurity
Search documents
Unisys Announces Dates for Third-Quarter 2025 Financial Results and Conference Call
Prnewswire· 2025-10-22 12:00
Core Points - Unisys is set to release its third-quarter 2025 financial results on November 5, 2025, after the market closes [1] - A conference call to discuss the results will take place on November 6, 2025, at 8 a.m. EST [1] - The conference call will be accessible via a live webcast on the Unisys Investor Website and through specific phone numbers for domestic and international callers [2] Financial Communication - A replay of the conference call will be available shortly after the event on the Unisys Investor Website and through designated phone numbers until November 20, 2025 [3] - The company emphasizes its commitment to transparency and communication with investors [3] Company Overview - Unisys is a global technology solutions company that provides services in cloud, AI, digital workspace, applications, and enterprise computing [4] - The company has a long history of helping clients innovate and unlock their potential, having been in operation for over 150 years [4]
DFIN to Announce Third-Quarter Results and Host Investor Conference Call on October 29, 2025
Prnewswire· 2025-10-22 12:00
Core Insights - Donnelley Financial Solutions (DFIN) will hold a conference call on October 29, 2025, at 9:00 a.m. Eastern time to discuss its third-quarter fiscal year 2025 financial results and provide a business update [1][2]. Financial Reporting - DFIN's third-quarter financial report will be released before the market opens on October 29, 2025, via a filing with the SEC on Form 8-K and will also be available on the company's investor relations website [3]. Company Overview - DFIN is a leading global provider of compliance and regulatory software and services, focusing on investment company regulatory compliance, capital markets transactions, and financial reporting throughout the corporate lifecycle [4].
Datavault AI (NasdaqCM:DVLT) Conference Transcript
2025-10-21 18:32
Summary of Datavault AI Conference Call - October 21, 2025 Company Overview - **Company**: Datavault AI (NasdaqCM:DVLT) - **Business Model**: Datavault AI transforms data into cash, similar to how Bloomberg operates with financial data. The company provides a software platform that helps organizations manage and understand their data from its inception [1][2] Core Products and Innovations - **DataScore**: A proprietary tool that scores data based on personally identifiable information (PII), emphasizing the importance of privacy and cybersecurity [2] - **DataValue**: A system that quantifies data in monetary terms, allowing organizations to understand the value of their data assets [4] - **Verify U**: A blockchain-based credential verification system aimed at preventing fraud in educational credentials, which is described as a significant business opportunity [11][20] Market Position and Strategy - **Patents and Monopoly**: The company holds a robust patent portfolio, claiming a 20-year monopoly in its field, which it uses to exclude competitors [6][7] - **Partnerships**: Datavault AI has established significant partnerships, particularly with IBM, enhancing its technological capabilities and market reach [18][19] - **NASDAQ Access**: The company has secured exclusive access to the NASDAQ financial framework, allowing it to tokenize various assets beyond stocks and bonds [19][20] Financial Projections - **Revenue Forecast**: Anticipated revenues for 2026 are projected between $40 million to $50 million, contingent on future acquisitions [27] - **Funding Status**: The company is fully funded with $150 million raised and is not seeking additional capital [26] Industry Context - **Cybersecurity Focus**: Emphasizes the critical nature of cybersecurity in managing data assets, with a strong stance against working with companies that do not prioritize data security [5][6] - **Tokenomics and Real-World Assets (RWA)**: Datavault AI positions itself as a leader in the tokenization of real-world assets, aiming to dominate the market through innovative financial solutions [20] Additional Insights - **Market Dynamics**: The CEO expresses confidence in the company's growth potential, likening its trajectory to that of Amazon in its early days [29] - **Acquisition Strategy**: The company is open to acquiring other firms that align with its business model, indicating a proactive approach to growth [31] Conclusion Datavault AI is positioned as a pioneering force in the data monetization space, leveraging advanced technology and strategic partnerships to capitalize on the growing importance of data management and cybersecurity in the digital economy. The company's innovative products and strong patent portfolio provide a competitive edge in a rapidly evolving market.
X @Bloomberg
Bloomberg· 2025-10-21 14:31
RT Bloomberg Live (@BloombergLive)"The great demand we're witnessing right now because of attacks on critical infrastructure - from airports to manufacturing in the US and EMEA,"@ArmisSecurity's Yevgeny Dibrov reveals the growing demand cybersecurity organisations are currently facing at #BloombergTech. https://t.co/cATkXUz7p9 ...
Verizon says “We Got You” this Cybersecurity Awareness Month
Globenewswire· 2025-10-21 12:00
Introducing new security solutions, including Digital Secure Home and a refreshed Verizon Protect App, for more control over your home, devices and digital lifeNEW YORK, Oct. 21, 2025 (GLOBE NEWSWIRE) -- This Cybersecurity Awareness Month, Verizon is giving you a greater sense of protection at home and on the go with the introduction of the new Digital Secure Home service, along with a major refresh of the Verizon Protect app. “Our customers trust us to connect them to the things and people they love the m ...
Securing the AI Frontier: Irregular Founder Dan Lahav
Sequoia Capital· 2025-10-21 09:00
There was a scenario where there was an agent on agent interaction. It was a critical security task. That was the simulation that they were in, but after working for a while, one of the models decided that they've worked enough.And they and they should stop. It did not stop there. It convinced the other model that they should both take a break.So the model did social engineering on the other model to another model. But now try to think about a situation where you actually as an enterprise are delegating an ...
仅差30秒,8年开发者险遭“面试劫”:测试代码暗中“藏毒”,回车一下就可能“倾家荡产”
3 6 Ke· 2025-10-21 07:28
Core Insights - The article discusses a sophisticated phishing attack targeting developers, where the attacker impersonated a blockchain company executive to lure a developer into executing malicious code during a fake job interview [1][15]. Group 1: Attack Methodology - The attack began with a seemingly legitimate LinkedIn message from an individual claiming to be the Chief Blockchain Officer of a company called Symfa, inviting the developer to participate in a remote interview [2][4]. - The attacker created a convincing profile with a complete work history, numerous connections, and motivational posts, which lowered the developer's suspicion [2][4]. - The developer was asked to complete a coding test via a Bitbucket link, which appeared to be a standard technical interview process [9][10]. Group 2: Technical Details of the Attack - The malicious code was cleverly embedded within normal business logic, making it difficult to detect without thorough inspection [15][16]. - The code utilized obfuscation techniques, such as hiding a remote URL within a byte array, to evade basic keyword detection [12][15]. - An automatic expiration mechanism was set for the malicious URL, reducing the risk of traceability after the attack [12][15]. Group 3: Psychological Manipulation - The attack exploited common developer habits and expectations, such as familiarity with take-home tests and the authority of LinkedIn profiles, which created a false sense of security [15][16]. - Time pressure was applied by requesting the coding test to be completed quickly, which could lead developers to skip essential security checks [11][15]. - The overall presentation of the company and the professionalism of the communication reinforced the attack's credibility [4][15]. Group 4: Recommendations for Developers - Developers are advised to run unknown code in isolated environments, such as Docker or virtual machines, to prevent potential damage [16][17]. - Static and dynamic analysis of code should be performed before execution, utilizing AI tools or manual checks for suspicious patterns [16][17]. - Verification of the hiring party's authenticity is crucial, as a legitimate LinkedIn profile does not guarantee trustworthiness [16][17]. - Developers should remain skeptical of any pressure to execute code, as it serves as a warning sign of potential threats [16][17].
WidePoint (NYSEAM:WYY) Conference Transcript
2025-10-20 20:32
Summary of WidePoint Corporation Conference Call (October 20, 2025) Company Overview - **Company Name**: WidePoint Corporation (NYSEAM: WYY) - **Founded**: 1997 - **Business Model**: Mobility as a Service (MaaS) with a focus on cybersecurity solutions delivered via a SaaS model - **Management**: Current management team in place since 2017, stabilizing the company for growth and profitability [5][6] Financial Performance - **Top Line Revenue**: Closed 2024 with $142 million, a 35% increase compared to 2023 [7][32] - **Market Capitalization**: Approximately $56 million [7] - **Recurring Revenue**: 95% recurring revenues with a contract backlog of $265 million [6] - **Cash Position**: $6.8 million in cash at the end of Q2 2025 [6][32] - **EBITDA**: Positive for 32 consecutive quarters; free cash flow positive for 7 consecutive quarters [7][32] - **Growth Strategy**: Focus on enhancing competitive advantage through investments in solution sets and pursuing higher-margin contracts [24][25] Market Opportunity - **Addressable Market Size**: Approximately $36 billion, including federal, state, and local governments, as well as large enterprises [6][8] - **Cybersecurity Demand**: Increased due to rising cybersecurity threats and the need for secure remote work solutions [8][9] Key Solutions and Differentiators - **Core Offerings**: - Identity Management - Managed Mobility - Data Analytics - IT as a Service [9][12] - **Unique Selling Proposition**: - Most secure multi-factor authentication solution, quantum computing resistant, and has never been hacked [10][11][17] - FedRAMP authorized, allowing the company to store, process, and transmit federal government data in the cloud [14][31] - **Device as a Service (DaaS)**: New business model offering bundled hardware, software, and services for predictable pricing [20] Contract Wins and Government Relationships - **Significant Contracts**: - $500 million DHS CWMS 2.0 contract with an additional $250 million ceiling increase [22][30] - Pursuing NASA SEWP contracts and recompeting for CWMS 3.0 with a ceiling of $3 billion [23][31] - **Long-term Relationships**: Established presence with the Department of Homeland Security, having worked on contracts for approximately 20 years [22][30] Competitive Landscape - **FedRAMP Authorization**: A significant differentiator that few competitors possess, providing a competitive edge in securing government contracts [14][31] - **Market Position**: Positioned as a vendor of choice for mobility and cybersecurity solutions due to certifications and accreditations [26][27] Future Outlook - **Growth Projections**: Continued focus on organic and inorganic growth strategies, with expectations for improved profitability in 2025 and beyond [34] - **Financial Targets**: Aiming for 50% gross margins by 2026, excluding carrier services revenue [39][40] Additional Insights - **Customer Base**: Includes large, stable enterprises requiring extensive mobile workforces [29] - **Cost Savings**: Demonstrated ability to save clients 15-40% on telecom costs, enhancing value proposition [30] This summary encapsulates the key points discussed during the WidePoint Corporation conference call, highlighting the company's financial performance, market opportunities, unique solutions, significant contracts, competitive advantages, and future growth strategies.
X @1inch
1inch· 2025-10-20 18:09
DeFi projects need to work together on security - or they’re leaving the door open for state-sponsored hackers.1inch CLO Orest Gavriliak @OrestGavryliak breaks down the situation in this month’s Cyber Defense Magazine.Check out the link to download 👇https://t.co/6xn6chDmad ...
Microsoft seen delivering solid quarter as AI, security drive growth – BofA
Proactiveinvestors NA· 2025-10-20 18:05
Group 1 - Proactive provides fast, accessible, informative, and actionable business and finance news content to a global investment audience [2] - The news team covers medium and small-cap markets, as well as blue-chip companies, commodities, and broader investment stories [3] - Proactive has bureaus and studios in key finance and investing hubs including London, New York, Toronto, Vancouver, Sydney, and Perth [2] Group 2 - The company is focused on sectors such as biotech and pharma, mining and natural resources, battery metals, oil and gas, crypto, and emerging digital and EV technologies [3] - Proactive adopts technology to enhance workflows and improve content production [4] - All content published by Proactive is edited and authored by humans, ensuring adherence to best practices in content production and search engine optimization [5]