Page 1,533«..1020..1,5321,5331,5341,535..1,5401,550..»

India: Authorities extend increased security measures and internet … – Crisis24

Event

Increased security measures continue in Punjab State as of March 20. Authorities are conducting search operations statewide since March 18 to apprehend Amritpal Singh, head of the separatist organization Waris Punjab De. Police have arrested around 78 members of the outfit. Officials have also suspended mobile internet and SMS services across Punjab until at least 12:00 March 21; further extensions are possible. Broadband internet, as well as SMS services of banks and other essential service providers are unaffected. Protests against possible arrests are also underway statewide, with the largest reported in Mohali.

Search operations will likely cause localized transport disruptions; security forces may establish checkpoints or roadblocks during search. Clashes involving protesters and security forces cannot be ruled out. Authorities may impose further restrictions, including limits on social media access and/or movement.

Keep away from locations where security personnel appear to be deploying. Leave the area at the first sign of any security disturbance. Plan accordingly for possible localized business and transport disruptions. Heed all official transport and security advisories. Avoid protests due to possible violence. Do not navigate roadblocks as a precaution. If clashes break out, leave the area immediately for a secure, nongovernmental building.

More here:
India: Authorities extend increased security measures and internet ... - Crisis24

Read More..

IDC to Explore a New Era of Cyberthreats as It Hosts Security … – IDC

Istanbul With cloud and software-as-a-service (SaaS) adoption continuing to accelerate across the Middle East, Trkiye, and Africa (META), annual spending on cybersecurity solutions in the region is set to grow at a CAGR of 9.3% over the coming years to cross the $6 billion mark in 2026. That's according to the latest forecast from International Data Corporation (IDC) as it prepares to host the Trkiye edition of its IDC Security Roadshow 2023 in Istanbul on Wednesday, March 22.

IDC's research shows that 70% of organizations across the META region are planning to invest in automated incident response over the course of 2023. Network security (56%), complete asset visibility (55%), and cloud security (52%) are set to be other major priorities as organizations work diligently to meet the challenges that come with massive technological leaps and the adoption of a digital-first approach to business.

"Over the coming few years, the pace of digital acceleration is expected to gain even more momentum, adding ever-greater layers of complexity to the threat landscape," says Nevin izmecioullar, IDC's associate vice president and country director for Trkiye. "Today, IT security professionals face numerous challenges such as the need to protect an increasingly distributed workforce, an internet that is faster than ever before, interconnectivity that is increasing in complexity, stricter government regulations, and customers looking for immersive experiences and greater security for their data.

"In an increasingly digital economy, the digital trust concept becomes paramount, and it is critical for business leaders, technology suppliers, organizations, and consumers to all understand the fundamental importance of risk, compliance, privacy, and business ethics. Traditional approaches to security, risk, and compliance are no longer enough, with issues such as data security, confidentiality, integrity, and availability all becoming key concerns."

Taking place at the Wyndham Grand Istanbul Levant, the Trkiye edition of the IDC Security Roadshow 2023 will bring together the country's foremost cybersecurity experts to showcase the very latest security innovations. The event will cover everything from threat intelligence, risk management, and digital resilience to the privacy and security implications of an increasingly remote and hybrid workplace, while also serving up essential guidance on building digital trust, automating security operations, and addressing the evolving nature of modern security challenges.

IDC's research manager for Trkiye, Yeim ztrk, will present the event's keynote, during which she will offer advice on how best to prepare for a new era of cyberthreats. "In Trkiye, companies continue to focus on data protection, data privacy, and regulatory compliance," says ztrk. "The relationship between data-driven insights and trust is critical, and companies looking to implement effective trust initiatives must aim to strengthen their overarching trust structures."

The agenda will also incorporate a series of fascinating end-user panel discussions, featuring first-hand insights from respected industry thought leaders such as:

Mahmut Kk, Cyber Security Director, Trk Telekom

Kenan Ylma, Information Security Group Coordinator, SOCAR Trkiye

Tark stner, Head of Global Information Security, Getir

Suzan Pekta Acar, Senior Security Risk Manager, Fibabanka

Nihan Namolu, Chief Information Security Officer, AgeSA Emeklilik ve Hayat

Mehmet Karadeniz, Network & Cyber Security Manager, CK Enerji

Emin slam Tatl, Cyber Security Director, Turkcell

Murathan Gemiciolu, Global Information Security Manager, Hayat Holding

Okan Erin, Information Security Director, Pazarama

Hakan Kanta, IT Director, Halkbank

smail zler, Director of Risk, Security & Compliance, Paynet

IDC would like to thank the following partners for their ongoing contribution to the 2023 edition of the IDC Security Roadshow in Trkiye: Platinum Partners: CrowdStrike, Fortinet, Check Point, KoSistem, Vodafone Business, Brandefense, Kaspersky; Gold Partners: Forcepoint, SentinelOne, Palo Alto Networks, vMind & IndeedID, Platin Biliim, Deepinfo, Mandiant & Google Cloud, Exclusive Networks, Barikat, Infosec, BGA; Silver Partners: Randori, Delinea, OpenText Cybersecurity, CyberArk, ImmuniWeb, Tenable & E-data, Cyberwise, Vectra, Demsistem & Keysight, Gatewatcher, Sonatype, Soitron & Proofpoint, Redington & Trend Micro; Networking Partner: Akamai.

To learn more the IDC Security Roadshow 2023, please click here or contact Sheila Manek at smanek@idc.com / +971 4 446 3154. You can also join the conversation on social media using the hashtag #IDCITSECURITY

About IDC

International Data Corporation (IDC) is the premier global provider of market intelligence, advisory services, and events for the information technology, telecommunications, and consumer technology markets. With more than 1,300 analysts worldwide, IDC offers global, regional, and local expertise on technology, IT benchmarking and sourcing, and industry opportunities and trends in over 110 countries. IDC's analysis and insight helps IT professionals, business executives, and the investment community to make fact-based technology decisions and to achieve their key business objectives. Founded in 1964, IDC is a wholly owned subsidiary of International Data Group (IDG), the world's leading tech media, data, and marketing services company. To learn more about IDC, please visit http://www.idc.com. Follow IDC on Twitter at @IDC and LinkedIn. Subscribe to the IDC Blog for industry news and insights.

IDC in the Middle East, Turkey, and Africa

For the Middle East, Turkey, and Africa region, IDC retains a coordinated network of offices in Riyadh, Nairobi, Lagos, Johannesburg, Cairo, and Istanbul, with a regional center in Dubai. Our coverage couples local insights with international perspectives to provide a comprehensive understanding of markets in these dynamic regions. Our market intelligence services are unparalleled in depth, consistency, scope, and accuracy. IDC Middle East, Africa, and Turkey currently fields over 130 analysts, consultants, and conference associates across the region. To learn more about IDC MEA, please visit http://www.idc.com/mea. You can follow IDC MEA on Twitter at @IDCMEA.

"); tb_show("Share the image", "#TB_inline?height=200&width=600&inlineId=embedDialog", null); } function calculateContainerHeight(attachmentId) { var img = $("img[src*=" + attachmentId + "]"); if (img === undefined) { return 600; } else { img = img[0]; } var iframeHeight; if (img.naturalWidth

Excerpt from:
IDC to Explore a New Era of Cyberthreats as It Hosts Security ... - IDC

Read More..

TikTok Pushed by U.S. to Resolve National Security Concerns – The New York Times

WASHINGTON The Biden administration wants TikToks Chinese ownership to sell the app or face a possible ban, TikTok said on Wednesday, as the White House hardens its stance toward resolving national security concerns about the popular video service.

The new demand to sell the app was delivered to TikTok in recent weeks, two people with knowledge of the matter said. TikTok is owned by the Chinese internet company ByteDance.

The move is a significant shift in the Biden administrations position toward TikTok, which has been under scrutiny over fears that Beijing could request Americans data from the app. The White House had been trying to negotiate an agreement with TikTok that would apply new safeguards to its data and eliminate a need for ByteDance to sell its shares in the app.

But the demand for a sale coupled with the White Houses support for legislation that would allow it to ban TikTok in the United States hardens the administrations approach. It harks back to the position of former President Donald J. Trump, who threatened to ban TikTok unless it was sold to an American company.

TikTok said it was weighing its options and was disappointed by the decision. The company said its security proposal, which involves storing Americans data in the United States, offered the best protection for users.

If protecting national security is the objective, divestment doesnt solve the problem: A change in ownership would not impose any new restrictions on data flows or access, Maureen Shanahan, a spokeswoman for TikTok, said in a statement.

TikToks chief executive, Shou Zi Chew, is scheduled to testify before the House Energy and Commerce Committee next week. He is expected to face questions about the apps ties to China, as well as concerns that it delivers harmful content to young people.

A White House spokeswoman declined to comment, as did a spokeswoman for the Treasury Department, which has led the negotiations with TikTok. The Justice Department also declined to comment. The demand for a sale was reported earlier by The Wall Street Journal.

TikTok, with 100 million U.S. users, is at the center of a battle between the Biden administration and the Chinese government over tech and economic leadership, as well as national security. President Biden has waged a broad campaign against China with enormous funding programs to increase domestic production of semiconductors, electric vehicles and lithium batteries. The administration has also banned Chinese telecommunications equipment and restricted U.S. exports of chip-manufacturing equipment to China.

The fight over TikTok began in 2020 when Mr. Trump said he would ban the app unless ByteDance sold its stake to an American company, a move recommended by a group of federal agencies known as the Committee on Foreign Investment in the United States, or CFIUS.

How Times reporters cover politics.We rely on our journalists to be independent observers. So while Times staff members may vote, they are not allowed to endorse or campaign for candidates or political causes. This includes participating in marches or rallies in support of a movement or giving money to, or raising money for, any political candidate or election cause.

The Trump administration eventually appeared to reach a deal for ByteDance to sell part of TikTok to Oracle, the U.S. cloud computing company, and Walmart. But the potential transaction never came to fruition.

CFIUS staff and TikTok continued to negotiate a deal that would allow the app to operate in America. TikTok submitted a major draft of an agreement which TikTok has called Project Texas in August. Under the proposal, the company said it would store data belonging to U.S. users on server computers run by Oracle inside the United States.

TikTok officials have not heard back from CFIUS officials since they submitted their proposal, the company said.

In that vacuum, concerns about the app have intensified. States, schools and Congress have enacted bans on TikTok. Last year, a company investigation found that Chinese-based employees of ByteDance had access to the data of U.S. TikTok users, including reporters.

Brendan Carr, a Republican on the Federal Communications Commission, said the administrations new demand was a good sign that the White House was taking a harder line.

There is bipartisan consensus that we cant compromise on U.S. national security when it comes to TikTok, and so I hope the CFIUS review now quickly concludes in a manner that safeguards U.S. interests, Mr. Carr said.

The White House last week backed a bipartisan Senate bill that would give it more power to deal with TikTok, including by banning the app. If it passed, the legislation would give the administration more leverage in its negotiations with the app and potentially allow it to force a sale.

Any effort to ban the app or force its sale could face a legal challenge. Federal courts ultimately ruled against Mr. Trumps attempt to block the app from appearing in Apples and Googles app stores. And the American Civil Liberties Union recently condemned legislation to ban the app, saying it raises concerns under the First Amendment.

Continued here:
TikTok Pushed by U.S. to Resolve National Security Concerns - The New York Times

Read More..

How to Fix the Windows Media Creation Tool Error Code … – Make Tech Easier

The Windows Media Creation Tool is a user-friendly way to upgrade your Windows version from Windows 10 to Windows 11 or even upgrade older Windows versions. But the tool is known to suffer from the error code 0x80072F8F 0x20000, which leaves users scratching their heads over the cause of the problem. This guide sheds light on what could be behind this error and how you can fix it.

Tip: is the System Cooling Policy missing from your Windows computer? Learn what to do about it.

The 0x80072F8F 0x20000 error code is a fairly frequent occurrence when using the Windows Media Creation Tool, with the following prompt appearing on the screen: Were not sure what happened, but were unable to run this tool on your PC. If you continue experiencing problems, reference the error code when contacting customer support. Error code: 0x80072F8F 0x20000.

There can be various reasons for your system not being able to run the tool properly. These are:

Before implementing the fixes described below, make sure that your system meets the minimum requirements to upgrade to the next version. Additionally, your Internet connection needs to be stable, and you should run the Media Creation Tool as an administrator.

Transport Layer Security or TLS 1.1 and 1.2 are internet security protocols that ensure data is encrypted when transferred over networks. TLS was created as an upgrade to Secure Socket Layer (SSL) protocols but was later developed as a separate protocol. TLS 1.2 is the latest TLS version, but both TLS 1.2 and TLS 1.1 need to be enabled to make the Media Creation Tool work as intended.

Follow the steps below to ensure TLS 1.1 and TLS 1.2 are enabled in the registry:

Good to know: did the latest Windows update break some functionality on your PC? We can show you how to fix it.

Sometimes outdated Windows installations can be the reason youre experiencing issues with the Media Creation Tool. Another Windows update-related issue could be that important services are not running properly. Follow the steps below to resolve each of the these issues:

If the previous fixes didnt work, you can try eliminating any programs that are in conflict with the Media Creation Tool. For this, youll need to perform a clean boot to disable all non-necessary services, then run the Media Creation Tool again. Follow the steps below to do so:

Tip: learn how to add portable apps to your Windows startup for greater convenience.

The SoftwareDistribution folder is where Windows stores temporary Windows Update files. By emptying the folder and forcing Windows to update, you can sometimes fix issues that the system is having while accessing Windows Update files.

Another fix you can try is modifying the Auto Update folder in the registry by adding an entry that allows you to upgrade your Windows version. This fix has been known to resolve the 0x80072F8F 0x20000 error for many users. Follow the steps below to do so:

Good to know: fiddling with your registry often? It may be a good idea to learn how to back up your registry.

Yes, there are multiple other ways to upgrade to Windows 11 if youre having issues with the Media Creation Tool or dont prefer using it for some reason. You can download the Windows 11 Installation Assistant or the Windows 11 ISO from the Windows 11 download page. While the former can be run like an application in the Windows 10 environment, the latter can be used to create a bootable disc or mounted within the Windows 10 environment.

If youve tried several fixes with no success, you can reset your corrupted Windows 11 or 10 installation to get rid of persistent errors and issues. Our guide linked above will help you reset or reinstall Windows without losing your important data. You can choose to do a soft reset and keep your files while fixing most of the common issues. If a reset doesnt work, you can choose to reinstall Windows to resolve the most deep-rooted OS issues.

Windows 11 requires users to have TPM 2.0, a hardware-based security chip that protects the security and privacy of your data. Many users arent able to upgrade to Windows 11 due to this limitation and may be faced with errors because of it. Check whether your system has TPM 2.0 and enable it. Alternatively, bypass the TPM 2.0 requirement on Windows 11 entirely without compromising your system.

Image credit: Unsplash. All screenshots by Tanveer Singh.

Tanveer hunts far and wide for PC Hardware and Gaming ideas to write about. An MBA in Marketing, he has been writing on Technology, Gaming, and Marketing for over 5 years now. When not scouring the web, he can be found trying to identify the next big Altcoin, running for his life in GTFO, or wrecking karts in Smash Karts.

Subscribe to our newsletter!

Our latest tutorials delivered straight to your inbox

Read this article:
How to Fix the Windows Media Creation Tool Error Code ... - Make Tech Easier

Read More..

If TikTok is safe and why it has been banned from UK Government … – inews

TikTokhas been banned from UK Government phones after a security review.

Cabinet Office minister Oliver Dowden announced the move on Thursday, saying it would take effect immediately.

The Prime Minister, Rishi Sunak, had been under pressure from senior MPs to follow the US and the EU in barring the video-sharing app from official devices.

TikTok, which is owned by Chinese internet company ByteDance, said it was disappointed with the decision and said bans were based on fundamental misconceptions and driven by wider geopolitics.

Heres what you need to know about TikToks safety, and why the Government has decided to ban it.

The concerns around TikToks safety are centred around is being owned by ByteDance.

As a company based in China, ByteDance is required to share user data with the authorities if requested.

TikTok has often insisted it is not sharing data with the Chinese government, but it is unclear how it would be able to resist if requested to do so.

The apps data sharing has been the subject of a number of investigations. A BuzzFeed report from June 2022, based on leaked recordings of internal TikTok meetings, told how China-based ByteDance employees accessed non-public data about US TikTok users.

A TikTok spokesperson responded by saying the company had talked openly about its attempts to limit employees access to US user data, and BuzzFeeds report showed TikTok was doing what it said it was going to.

TikTok harvests a significant amount of data from its users in order to optimise their For You pages with its algorithm.

As soon as you start using TikTok, the company starts building a profile about you, including everything from your hobbies to your political leanings.

As internet security company NordVPN explains, there are two main issues people may have with this.

First is a first principles issue. Should a corporation have that kind of insight into your personal life? Are you comfortable with TikTok assessing and deducing (often with remarkable accuracy) your sexuality, political leanings, or health conditions? it says.

The second problem is a more practical one. When large corporations gather huge quantities of data about their users, it only takes one data breach for that information to fall into the wrong hands. Hackers are eager to steal valuable data from online businesses, and theres no guarantee that social media giants are actually capable of keeping your private details safe.

Ultimately, it is up to individual users to decide how comfortable they are sharing their data with companies like TikTok, and to understand the potential risks around it.

Mr Dowden said banning TikTok from Government phones would be good cyber hygiene amid a risk to sensitive Government data.

Ministers and officials are still able to use the app on their personal devices.

He said it was a prudent and proportionate step following advice from our cyber security experts as he noted risks around how sensitive information can be accessed by TikTok.

The security of sensitive Government information must come first, so today we are banning this app on Government devices. The use of other data-extracting apps will be kept under review, the minister said.

But he said there will be limited exemptions on some Government devices made on a case by case basis where the video-sharing app is required for work purposes.

Downing Street said there was no plan to delete the No 10 account.

The Cabinet Office said the ban was being imposed because TikTok users are required to hand over data including contacts, user content and geolocation data.

Former Conservative party leader Sir Iain Duncan Smith was among those demanding that ministers and senior civil servants should be told to remove TikTok from their personal phones as well.

Private phones are used for communications and I honestly dont believe that whatever the complaints are, that the reality is that these private phones will never be used for Government business, he told the House of Commons.

They will be, they are, and there is no way of stopping that to some degree.

Nadine Dorries, who frequently posted on TikTok while serving as Boris Johnsons culture secretary, tweeted: My phone is personal. Today I removed TikTok and I think all MPs should do likewise.

But Grant Shapps, the Energy Security Secretary, made clear he will continue to use it on his personal phone while taking security precautions.

Posting on the app, he said: Ive never used TikTok on Government devices and can hereby confirm I will NOT be leaving TikTok anytime soon!

The rest is here:
If TikTok is safe and why it has been banned from UK Government ... - inews

Read More..

Demystifying the Top 5 Myths About Cloud Computing Security – SentinelOne

Three years ago, during the global pandemic, businesses worldwide shifted their focus to delivering services digitally, supported by remote workforces and virtual environments. Many of these businesses hastily spun up cloud infrastructures to bolster critical aspects of their operations.

Threat actors saw an opportunity during this time and data breaches and cyberattacks targeting the cloud rose alongside cloud adoption. Now, leaders are shifting their focus again: This time to implement better strategies to secure the cloud infrastructures that carried them through the pandemic.

With so many myths and misconceptions surrounding cloud security, it is essential for business leaders to separate fact from fiction regarding how to secure the cloud. In this post, we debunk the top five myths about cloud computing security to help CISOs, CIOs, and other business leaders make informed decisions for their organization.

If one were to believe the stories and opinions circulating around many technical, business, and security-focused media, it might seem that the cloud is inherently insecure. These stories tend to zero in on one aspect of cloud computing: that because it is accessible from anywhere in the world with an internet connection, it is vulnerable to cyberattacks and data breaches.

It is impossible to guarantee complete security against cyber threats. Even with advanced security measures in place, such as encryption and firewalls, there is always a possibility that an attacker can bypass these defenses and gain unauthorized access to sensitive data.

While it is true that clouds can be vulnerable to cyberattacks, it is the responsibility of Cloud Service Providers (CSPs) to ensure that the underlying machines are consistently updated and hardened against possible threats. In addition, CSPs offer various built-in security features to simplify cloud security management, such as S3 Block Public Access. By leveraging such features, DevOps engineers can effectively mitigate risks and secure their cloud infrastructure.

In fact, CSPs invest heavily in security measures to protect their customers data. These measures include encryption, firewalls, and multi-factor authentication (MFA), among other tools. As a result, CSPs often employ more advanced security measures than the average organization. They have dedicated security teams whose sole focus is to detect and respond to security threats and continuously improve their security posture. These security teams have access to the latest threat intelligence and are constantly monitoring their clouds for potential security breaches.

One of the most persistent myths surrounding CSPs themselves is that they have unrestricted access to customer data. This myth has been fueled by examples of high-profile data breaches and incidents of unauthorized access, which have raised concerns about customer privacy and security in the cloud industry.

Though providers do need access to customer infrastructure to provide adequate services, they are bound by strict and extensive data privacy laws to ensure the confidentiality and security of that data. Cloud providers also proactively combat and mitigate risks by investing heavily in security measures and specialized teams to monitor and manage data security.

Despite the security measures, it is worth keeping in mind that customers have little control over their data once it is in the cloud, and although general malfeasance is unlikely given the obligations and regulations providers must adhere to, businesses should be aware that providers may be subject to government surveillance or other legal demands for customer data, which can compromise customer privacy and security.

The myth that cloud computing is too expensive is often perpetuated by those who focus solely on the initial costs of implementation.

Focusing on this initial, one-time cost, however, overlooks the long-term savings and benefits that cloud computing provides. By outsourcing infrastructure maintenance to cloud providers, companies can save money on hardware, software, and staffing.

CSPs also offer scalable infrastructure that can be easily adjusted to meet changing business needs, eliminating the need for companies to maintain large, unused infrastructure. Flexible pricing models allow companies to pay only for the services they use, resulting in significant cost savings.

When organizations partner with CSPs, they can rely on their expertise and resources to get top-notch security, disaster recovery, and backup services. These services are usually difficult and expensive for many organizations to evaluate, manage, and maintain on their own.

The reality of understanding and using technology like cloud computing is that there is a learning curve for small businesses. The misconception, though, is that cloud is only for big businesses. Cloud computing is frequently lauded for its elasticity and has become an important technology for businesses of all sizes. It offers numerous benefits, such as scalability and cost-effectiveness.

While it may be true that some small businesses with limited budgets can struggle to justify the ongoing costs of cloud services, most reliable CSPs now offer affordable pricing plans that can be scaled up or down as needed.

It is also important for small businesses to evaluate what exactly they are looking to gain from cloud computing. The cloud offers a wide variety of services, ranging from basic file storage to big data analysis, data security, testing and development, and more. The cloud also provides small businesses with data security and disaster recovery options previously only available to large companies. In short, small businesses can leverage the cloud to compete with larger enterprises on a level playing field.

Leveraging all cutting edge technologies may be too expensive for small businesses, but they can still use the cloud to access enterprise-level technology without investing heavily in hardware and infrastructure. They can leverage cloud-based software and applications to manage business operations such as accounting, inventory, and customer relationship management.

Despite its rapid adoption across all industry verticals in recent years, there is still a persistent myth that cloud computing is not compliant with industry regulations and standards. This misconception has led many businesses to avoid adopting cloud technology, fearing that it could put them at risk of non-compliance.

The truth is that cloud computing can actually enhance compliance to regulations and standards by providing robust security measures and data protection. CSPs have invested heavily in ensuring their systems comply with various regulations and standards, such as HIPAA and GDPR, to provide their clients with peace of mind.

Cloud technology enables businesses to easily track and monitor compliance with regulatory requirements by offering real-time visibility into data management and access. This feature allows businesses to easily identify and address any non-compliance issues, thus reducing the risk of penalties or legal consequences.

As organizations continue to adopt cloud technologies, they will need to implement the right security solution to defend against cloud-based risks and help protect the greater cloud surface and all data and assets connected to it.

Many organizations place their trust in SentinelOnes Singularity Cloud to ensure they can continue growing their business safely in the cloud. Singularity Cloud works by distributing autonomous endpoint protection across all environments, including public, private, and hybrid clouds to detect complex threats at the virtual machine (VM) level and Kubernetes pod level with no need for human detection. It also provides runtime protection of containerized workloads and kills unauthorized processes in real-time.

SentinelOne helps organizations improve their cloud security strategy without the risk of compromising agility or availability. Learn more about Singularity Cloud by booking a demo or contacting us today.

It is crucial for organizational leaders tasked with securing the cloud to understand the myths and misconceptions surrounding cloud computing security. Those who can separate fact from fiction are set up to gain far more from cloud computing and use it to accelerate their business and support their customers in a safe and sustainable way.

Now that digital transformation has become a keystone to staying competitive, cloud computing provides the foundation for this evolution and enables businesses to deliver a higher level of customer value in their industries. By demystifying the common misunderstandings surrounding cloud security, businesses make informed strategies and move towards an effective transformation effort.

Singularity Cloud

Simplifying security of cloud VMs and containers, no matter their location, for maximum agility, security, and compliance.

Link:
Demystifying the Top 5 Myths About Cloud Computing Security - SentinelOne

Read More..

ABCAM PLC: Final results for the year ended 31 December 2022 – PR Newswire

15% Reported Revenue Growth & 8% Constant Exchange Rate Revenue Growth: Demand for Abcam In-house Products Continues

CAMBRIDGE, England and WALTHAM, Mass. , March 20, 2023 /PRNewswire/ -- Abcam plc (Nasdaq: ABCM) ('Abcam', the 'Group' or the 'Company'), a global leader in the supply of life science research tools, today announces its results for the year ended 31 December 2022 (the 'period').

SUMMARY PERFORMANCE

Year-End 31 December

2022

m

2021

m

Revenue

361.7

315.4

Gross profit margin, %

Adjusted gross profit margin, %

74.8%

75.5%

71.2%

72.2%

Operating profit margin, %

Adjusted operating profit margin, %

Diluted (loss) / earnings per share ('EPS')()

(2.8%)

21.1%

(0.037)

2.3%

19.2%

0.019

Adjusted diluted earnings per share ('EPS') ()

0.249

0.206

Return on Capital Employed ('ROCE'), %

8.9%

7.6%

FULL YEAR FINANCIAL HIGHLIGHTS[1]

[1] These results include discussion of alternative performance measures which include revenues calculated at Constant Exchange Rates (CER) and adjusted financial measures. CER results are calculated by applying prior period's actual exchange rates to this period's results. Adjusted financial measures are reconciled to the most directly comparable measure prepared in accordance with IFRS in note 3 to the financial statements.

BUSINESS HIGHLIGHTS

FY23 OUTLOOK

The Company anticipates reported revenues of approximately 420 million to 440 million, representing 15% to 20% constant exchange rate revenue growth, combined with lower operating expense growth, resulting in adjusted operating profit margin expansion.

FY2024 GOAL

The Company is reiterating its 2024 revenue goals of 450m-525m with adjusted operating profit margins of greater than 30%.

Commenting on the performance, Alan Hirzel, Abcam's Chief Executive Officer, said:

"Our team is dedicated to supporting life science discovery, and the translation of discovery to social impact. In the last ten years, our business has grown revenue at double digit rates because of the trust the market has in our team, our innovation, and our brand. As we look ahead, we can be confident that we have and continue to build a sustainable and profitable growth company. I am grateful to everyone at Abcam for their ongoing efforts through this exciting period. I also thank our customers and partners bringing Abcam into their labs and giving us all the opportunity to demonstrate our company's role in making progress happen together."

Analyst and investor meeting and webcast:

Abcam will host a conference call and webcast for analysts and investors today at 12:00 GMT/ 08:00 EDT. For details, and to register, please visit corporate.abcam.com/investors/reports-presentations

A recording of the webcast will be made available on Abcam's website, corporate.abcam.com/investors

The information communicated in this announcement contains inside information for the purposes of Article 7 of the Market Abuse Regulation (EU) No. 596/2014.

For further information please contact:

Abcam

+ 44 (0) 1223 696 000

Alan Hirzel, Chief Executive Officer

Michael Baldock, Chief Financial Officer

Tommy Thomas, Vice President, Investor Relations

About Abcam plc

As an innovator in reagents and tools, Abcam's purpose is to serve life science researchers globally to achieve their mission faster. Providing the research and clinical communities with tools and scientific support, the Company offers highly validated antibodies, assays, and other research tools to address important targets in critical biological pathways.

Already a pioneer in data sharing and ecommerce in the life sciences, Abcam's ambition is to be the most influential company in life sciences by helping advance global understanding of biology and causes of disease, which, in turn, will drive new treatments and improved health.

Abcam's worldwide customer base of approximately one million life science researchers' uses Abcam's antibodies, reagents, biomarkers, and assays. By actively listening to and collaborating with these researchers, the Company continuously advances its portfolio to address their needs. A transparent program of customer reviews and datasheets, combined with industry-leading validation initiatives, gives researchers increased confidence in their results.

Founded in 1998 and headquartered inCambridge, UK, the Company has served customers in more than 130 countries. Abcam's American Depositary Shares (ADSs) trade on the Nasdaq Global Select Market (Nasdaq: ABCM).

For more information, please visitwww.abcam.comorwww.abcamplc.com

Forward-Looking Statements

This announcement contains forward-looking statements within the meaning of the Private Securities Litigation Reform Act of 1995. In some cases, you can identify forward-looking statements by the following words: "may," "might," "will," "could," "would," "should," "expect," "plan," "anticipate," "intend," "seek," "believe," "estimate," "predict," "potential," "continue," "contemplate," "possible" or the negative of these terms or other comparable terminology, although not all forward-looking statements contain these words. They are not historical facts, nor are they guarantees of future performance. Any express or implied statements contained in this announcement that are not statements of historical fact may be deemed to be forward-looking statements, including, without limitation, statements regardingAbcam'sportfolio and ambitions, and our future results of operations and financial position such as our outlook for FY2023 and performance goals for FY2024are neither promises nor guarantees, but involve known and unknown risks and uncertainties that could cause actual results to differ materially from those projected, including, without limitation: challenges in implementing our strategies for revenue growth in light of competitive challenges; the development of new products or the enhancement of existing products, and the need to adapt to significant technological changes or respond to the introduction of new products by competitors to remain competitive; our customers discontinuing or spending less on research, development, production or other scientific endeavors; failing to successfully identify or integrate acquired businesses or assets into our operations or fully recognize the anticipated benefits of businesses or assets that we acquire; the ongoing COVID 19 pandemic, including variants, continues to affect our business, including impacts on our operations and supply chains; failing to successfully use, access and maintain information systems and implement new systems to handle our changing needs; cyber security risks and any failure to maintain the confidentiality, integrity and availability of our computer hardware, software and internet applications and related tools and functions; failing to successfully manage our current and potential future growth; any significant interruptions in our operations; our products failing to satisfy applicable quality criteria, specifications and performance standards; failing to maintain and enhance our brand and reputation; ability to react to unfavorable geopolitical or economic changes that affect life science funding; failing to deliver on transformational growth projects; our dependence upon management and highly skilled employees and our ability to attract and retain these highly skilled employees; and as a foreign private issuer, we are exempt from a number of rules under the U.S. securities laws and Nasdaq corporate governance rules and are permitted to file less information with the SEC than U.S. companies, which may limit the information available to holders of our American Depositary Shares ("ADS"); and the other important factors discussed under the caption "Risk Factors" inAbcam'sAnnual Report on Form 20-F for the year ended December 31, 2022 ("Annual Report") with theU.S.Securities and Exchange Commission ("SEC") on March 20, 2023, which is available on the SEC website at http://www.sec.gov, as such factors may be updated from time to time inAbcam'ssubsequent filings with the SEC. Any forward-looking statements contained in this announcement speak only as of the date hereof and accordingly undue reliance should not be placed on such statements.Abcamdisclaims any obligation or undertaking to update or revise any forward-looking statements contained in this announcement,whether as a result of new information, future events or otherwise, other than to the extent required by applicable law.

Use of Non-IFRS Financial Measures

To supplement our audited financial results prepared in accordance with International Financial Reporting Standards ("IFRS") we present Adjusted Operating Profit, Adjusted Operating Profit Margin, Return on Capital Employed ("ROCE"), Adjusted Diluted Earnings per Share, Total Constant Exchange Rate Revenue ("CER revenue"), Adjusted Selling, General and Administrative expenses, Adjusted Research & Development expenses, and Free Cash Flow, which are financial measures not prepared in accordance with IFRS ("non-IFRS financial measures"). We believe that the presentation of these non-IFRS financial measures provide useful information about our operating results and enhances the overall understanding of our past financial performance and future prospects, allowing for greater transparency with respect to key measures used by management in its financial and operational decision making. These non-IFRS financial measures are supplemental in nature as they include and/or exclude certain items not included and/or excluded in the most directly comparable IFRS financial measures and should not be considered in isolation, or as a substitute for, financial measures prepared in accordance with IFRS. Further, other companies may calculate these non-IFRS financial measures differently than we do, which may limit the usefulness of those measures for comparative purposes.

Management believes that the presentation of (a) Adjusted Operating Profit, Adjusted Operating Profit Margin, ROCE, and Adjusted Diluted Earnings per Share, provide useful information to investors and others as management regularly reviews these measures as important indicators of our operating performance and makes decisions based on them, (b) CER revenue provides useful information to investors and others as management regularly reviews this measure to identify period-on-period or year-on-year performance of the business and makes decisions based on it, and (c) Adjusted Selling, General and Administrative expenses and Adjusted Research & Development expenses provide useful information to investors and others as management regularly reviews these measures to identify period-on-period or year-on-year performance of the business and makes decisions based on it, and (d) Free Cash Flow provides useful information to investors and others because management regularly reviews this measure as an important indicator of how much cash is generated by business operations, excluding capital related items, and provides an indication of the amount of cash available for discretionary investing or financing after removing capital related items, and makes decisions based on it. Please see "Non-IFRS Financial Measures" for a reconciliation of non-IFRS financial measures to their most directly comparable IFRS financial measures.

We define:

Management is unable to present quantitative reconciliations of Adjusted Operating Profit, Adjusted Operating Profit Margin, and CER revenue to their respective most directly comparable IFRS financial measures of Operating Profit, Operating Profit Margin and Reported Revenue on a forward-looking basis, because items that impact these IFRS financial measures are not within our control and/or cannot be reasonably predicted. Such information may have a significant, and potentially unpredictable, impact on our future financial results.

Year-end management report

Introduction

We are pleased with the continued progress of our business over the last 12 months and the way our people have responded to the evolving impact of COVID-19. Indeed, the challenges presented since the pandemic began over three years ago have served to highlight the resilience of both our employees and our business, as well as the role Abcam and its customers have in advancing critical life science research. We are convinced more than ever that by continuing to develop our technologies, people, and capabilities, and focusing on customer needs, we can extend our market leadership, sustain durable growth, and become an increasingly influential partner within our industry.

Demand for our products, and particularly Abcam's in-house developed products, continued to increase as customers continued to focus on their research, enabling greater productivity. Whilst the global pandemic once again impacted revenues we estimate that overall lab activity is now approaching pre-COVID levels in the Americas and EMEA, our largest geographical markets representing nearly 70% of total sales.

In the year ended 31 December 2022, demand for our products continued but revenue growth was interrupted by the implementation of an Oracle Cloud ERP system and COVID-19 headwinds in China. The combination of these factors impacted revenues by approximately 30 million on a reported basis resulting in total revenues increasing 8% CER (15% reported) to 361.7 million. On a reported basis, we incurred a net loss of 8.5 million impacted by 18.3 million impairment charge on an asset held for sale; and diluted EPS declined to -3.7p. On an adjusted basis, adjusted operating profit increased 26%, to 76.3 million (2021: 60.4m), and adjusted diluted EPS increased 21% to 24.9p (2021: 20.6p).

Despite the recent disruptions, the opportunities for growth in our markets remain, and we are committed to our customers and their long-term success thereby driving our future growth. As we near completion of our five-year strategic plan, we thank our approximately 1,800 employees for their ongoing commitment in the delivery of our plans they are fundamental to the Group's future success.

We continue to have a strong balance sheet (net debt of 30.6 million), and we are focused on investments in attractive organic and inorganic growth opportunities, as they arise.

Looking forward, with our expanding capabilities, financial position and market opportunities for growth, the Group is well-placed to sustain long-term value creation.

Financial review

Year ended 31 December

Reported revenues

Change in reported revenues

%

CER growth

%

2022

m

2021

m

Catalogue revenue regional split

Americas

147.2

114.8

28%

16%

EMEA

87.1

82.3

6%

6%

China

60.3

57.2

Read more from the original source:
ABCAM PLC: Final results for the year ended 31 December 2022 - PR Newswire

Read More..

Cyber War: A Stealthy Contest – Spiceworks News and Insights

With mounting geopolitical tensions in Europe, Andy Norton, European cyber risk officer at Armis, uses data from the State of Cyberwarfare and Trends Report 2022-2023 to discuss the scope of the cybersecurity implications and how organizations can prevent attacks.

Over one year has passed since Russia announced the start of a special military operation on Ukrainian territory. Amid geopolitical tensions, economic problems, and social debates, major repercussions have arisen both in the Old Continent and in the rest of the world. Amidst this complex backdrop, another battle has also stealthily emerged: cyber warfare.

In fact, during the period from September to November 2022 alone, a 15% increase in suspicious activity by threat actorsOpens a new window was detected on the Armis Asset Intelligence and Security platform. The noteworthy uptick in threat activity fuelled by criminal groups such as Conti, Killnet, Energetic Bear and more is a clear indication that organizations need to take the threat of cyber warfare seriously.

Without a doubt, the risk is real and has been a catalyst to conversations about cybersecurity and potential risks from cyberwarfare in high places and entities. During the World Economic Forum in Davos, the Global Cybersecurity Outlook 2023Opens a new window report was released indicating that nearly half (45%) of business decision-makers and an almost equal number of cybersecurity executives (46%) believe that a catastrophic cyber event is very likely to occur in the next two years.

Though it might not make for optimistic reading, these results follow a similar pattern to those of the Armis State of Cyberwarfare and Trends Report: 2022-2023Opens a new window , which showed 57% of UK organizations have stopped or stalled digital transformation projects due to the threat of cyberwarfare. Perhaps this fear is justified since, as a result of the conflict on the continent, there has been a significant upturn in cyberattacks in the region, with 42% of companies claiming to have had to report an incident of cyberwarfare to authorities. These seem to affect public administration and healthcare institutions in particular.

Furthermore, Gartner analysts predict that by 2025, cyberattackers will have weaponized operational technology (OT) environments with the capability to harm or kill people. And while this may seem extreme to us, there is a perceived evolution from reconnaissance and espionage to the kinetic use of cyber warfare tools, which, while not yet deployed with lethal intent, have been detected.

The possibility that a national or even global cyber blackout could have a catastrophic impact on individual economies or the global economy has been hotly debated by experts since the Wannacry incident in 2017 and concern continues to rise due to the potential of these attacks as a strategic means in the context of cyber warfare. Indeed the ransomware attacks suffered by the NHS late last year and the attack that, up until recently, plagued the Royal Mail Postal Services rest of world services for months.

The effects of these attacks on critical services are still being felt, with the already stressed NHS struggling to catch up on missed appointments and rescheduling due to weeks of system downtime. Royal Mail, until recently, could not process any items to ship overseas and may feel the effects of the attack for some time to come, as the LockBit gang responsible has continued to leak documents containing employee personal information on the Dark Web.

From this data and other information, it can be concluded that the risk of companies falling victim to a cyberattack triggered in the course of a cyber war is increasing. Despite this, there are still many organizations worldwide one-third of the total, according to the study that do not take the threat of cyber warfare seriously.

In recent years, there have been an increasing number of attacks against business entities of all kinds, regardless of their size or the sector in which they operate. Numerous attacks on authorities or even companies by geopolitically motivated hacktivists show how the behaviors of cybercriminals are constantly evolving and that they are finding various ways to circumvent traditional detection and response systems.

In tandem with the increased threat activity of cybergangs, the attack surface is expanding since the incorporation of numerous connected devices into the environments of practically every industry sector. This digital transformation combined with the pandemic and the teleworking model has meant the deployment of all kinds of assets in enterprise networks, both managed laptops, smartphones, smartwatches, etc. and unmanaged Industrial Internet of Things (IIoT) devices, operational technology (OT), etc. Unfortunately, every connected asset is also a potential entry point into the enterprise network.

This increased attack surface requires the implementation of an effective cybersecurity strategy to protect the infrastructure and investments to drive these implementations.

See more: How to Ensure Security for IoT Edge Device Processors

Depending on the type of organization, enterprises should be mapping cybersecurity programs to a cybersecurity framework (CSF), such as NIS, Cyber Essentials, ISO 27001 and more. Whichever is chosen, a key element to compliance is to be able to prove the organization has an adequate risk analysis. This risk analysis should be based on an understanding of all the critical assets that comprise the essential function of the business.

For most organizations, this can be problematic, as an up-to-date and accurate asset register is either non-existent, out of date, maintained manually or partially at best. Having real-time visibility over these assets and their associated risks is therefore an essential first step to any security program, as it vastly reduces the number of entry points attackers can exploit to gain a foothold in an organization.

More than a year after the outbreak of war in the Ukraine, and in the midst of a growing number of threats, it is essential that companies not only invest in cybersecurity solutions, but also take steps to make cybersecurity a priority in their day-to-day work, spend time training their employees in this area and maintain an attitude of constant vigilance in the face of threats.

Using a CSF and industry-specific regulations to help guide this process ensures that cybersecurity programs can not only be validated by recognized best practices, but also inform business leaders on what measures are appropriate and proportionate when it comes to their risk appetites. This will be the most effective way to prepare, ensuring critical services dont become pawns in escalating instances of cyber warfare.

How are you strengthening your security posture to prepare for the cyber war we are amidst? Share with us on FacebookOpens a new window , TwitterOpens a new window , and LinkedInOpens a new window .

Image Source: Shutterstock

Link:
Cyber War: A Stealthy Contest - Spiceworks News and Insights

Read More..

The Arbitrum Foundation Announces DAO Governance for the … – PR Newswire

The launch of the DAO Governance marks a significant milestone in the decentralization of the Arbitrum One and Arbitrum Nova networks, becoming the first EVM rollup technology to achieve Stage 1 decentralization

NEW YORK, March 16, 2023 /PRNewswire/ -- The Arbitrum Foundation today announced the launch of DAO governance for the Arbitrum One and Arbitrum Nova networks, a massive leap forward in the decentralization of the two networks. Alongside the DAO governance structure, The Arbitrum Foundation also announced an upcoming drop of $ARB to users of the Arbitrum ecosystem on Thursday, March 23.

Late last year, Vitalik Buterin proposed a 3 stage schema for decentralizing rollups, and with today's announcement Arbitrum has now become the first EVM rollup ever to achieve Stage 1. The milestone signifies an important achievement for both Arbitrum networks and for the state of Ethereum scaling more broadly.

The $ARB token will facilitate the decentralization of the Arbirum network, and the $ARB airdrop will place the governance token in the hands of the users who are actively participating in the Arbitrum ecosystem. Users can visit gov.arbitrum.foundation and follow the prompts for eligibility details and to claim their share in governance. The majority of the $ARB supply will be under the control of the Arbitrum community via The Arbitrum Foundation, accelerating growth of the ecosystem organically. $ARB token holders will govern The Arbitrum Foundation through the Arbitrum DAO.

Steven Goldfeder, CEO and Co-Founder of Offchain Labscommented: "We are extraordinarily excited for the official launch of The Arbitrum Foundation and DAO governance and to see Arbitrum One become the first EVM rollup to advance to Stage 1 decentralization, a tremendous milestone for both Arbitrum and Ethereum. Through the community airdrop, the delegation process, and the introduction of the Security Council, community participation and control is at the forefront of today's announcement, and the requirements for receiving a share of Arbitrum governance have been crafted meticulously, optimizing for the longevity of the ecosystem and community. Looking ahead, we're moving closer and closer toward a decentralized financial system, with the Arbitrum technology at the very forefront of that.."

To facilitate effective community governance, users will be able to delegate voting power to individuals they view as effective stewards of their values. Delegates will be expected to vote on proposals that pass through the Arbitrum DAO in a way that represents the token-holders who have assigned their voting power to them. The Arbitrum DAO will have the power to control key decisions at the core protocol level, from how the chain's technology is upgraded to how the revenue from the chain can be used to support the ecosystem. Those interested in becoming a delegate are encouraged to visit the governance forum and apply.

Crucially, Arbitrum's governance will be self-executing, meaning that the DAO's votes will directly have the power to effect and execute its on-chain decisions, and not rely on an intermediary to carry out those decisions. Self-executing governance is a critical milestone for decentralization and giving the community the power to govern the chain, and Arbitrum is leading the way as the first L2 to launch self-executing governance.

The Arbitrum Foundation also announced the creation of the Arbitrum Security Council, a 12-member multisig of highly regarded community members designed to ensure the security of the chains and be able to act quickly in the event of a security vulnerability. The decision-making powers of the Security Council are determined by a smart contract that will require multiple secure signatures by its members in order to implement any changes to the protocol. In case of emergency, the Arbitrum Security Council will be able to act quickly but this will require participation from 9 of the 12 members. The Arbitrum DAO will be the ultimate governing body over the Arbitrum Security Council, with elections for the Council being held twice annually.

The introduction further reinforces Arbitrum's focus on decentralization by giving the community the ability to play a more active role in Arbitrum governance and have a say over what occurs within the ecosystem.

Arbitrum is the leading Layer 2 (L2) scaling solution for Ethereum, boasting the highest Total Value Locked (TVL) across all L2 networks with approximately $3.61B, 55% market share across all rollups, and the Arbitrum One network recently surpassed Ethereum daily transactions on two occasions.

For more information, please visit the Arbitrum blog: http://arbitrumfoundation.medium.com/

About Offchain LabsOffchain Labs is a venture-backed and Princeton-founded company that was the initial developers of Arbitrum, a suite of secure scaling solutions for Ethereum. Arbitrum's technologies instantly scale dApps, significantly reducing costs and increasing speed, without sacrificing Ethereum's security. Porting contracts to Arbitrum requires no code changes or downloads as Arbitrum is fully EVM compatible. Offchain Labs also maintains Prsym, the leading Ethereum consensus client.

About The Arbitrum FoundationThe Arbitrum Foundation has a mission to help support and grow the Arbitrum network and its community while remaining at the forefront of blockchain adoption. The Foundation oversees the $ARB token and governance structure as well as the Arbitrum Security Council, a 12-member multisig of well regarded community members designed to ensure the security of the chains.

Media contact: Dillon Arace, [emailprotected]

SOURCE Arbitrum Foundation

More:

The Arbitrum Foundation Announces DAO Governance for the ... - PR Newswire

Read More..

Decentralization: In Togo, Yoto III municipality adopts a CFA4 billion … – Togo First

REFORMS OVERVIEW

STARTING A BUSINESS (more info)

At the fifteenth position, worldwide, and first in Africa, under the Starting a Business index of the 2020 Doing Business ranking, Togo sustains its reformative dynamics with more reforms.

ENFORCING CONTRACTS (more info)

Compared to some years ago when it was one of the lowest rankers under the Doing Business Enforcing Contracts indicator, Togo, leveraging many efforts to improve its business climate, was able to jump significantly on the index in the recent years... .

CONTRACT EXECUTION (more info)

Creation of special chambers of commerce for small debts Creation of chambers of commerce at the Court of Appeal Civil and commercial cases now handled by distinct clerks Establishment of commercial courts in Lom and Kara Lawyers and bailiffs now have access to the FORSETI COMMERCIAL platform A maximum period of 100 days was fixed to settle a commercial dispute .

TRADING ACROSS BORDERS (more info)

In comparison to previous years,Togo has significantly improved its ranking under theTrading across borders indicator by adopting multiple reforms that focus mainly on the digitization and reduction in delays, for import and export procedures related to import and export.

In comparison to previous years, Togo has significantly improved its ranking on the Trading across borders index by adopting multiple reforms that focus mainly on the digitalization and reduction in delays, for import and export procedures related to import and export.

CONSTRUCTION PERMIT (more info)

After moving from the 133rd to 127th place under the 2020 Doing Business construction permit index, Togo intends to reiterate this feat in the coming edition of the global ranking. To this end, it has introduced this year multiple reforms.

GETTING ELECTRICITY (more info)

Over the past two years, Togos ranking under the Doing Business Getting electricity and water indicator has increased consistently. Owing this performance to multiple reforms aimed at making it easier for businesses to access power and water, Lom plans to introduce even more reforms this year to keep up its improvements.

REGISTERING A PROPERTY (more info)

Out of all the 'Doing Business indicators, Property Registration is where Togo has improved the most since 2018. Indeed, after spending years in the lowest part of this ranking, the country now seeks to beat Rwanda which is the best performer on this index in Africa. To do so, Lom has been introducing many reforms, with the latest batch implemented this year.

PUBLIC PROCUREMENT(more info)

From professionalization to digitization, through legislative regulations, Togos public procurement framework is constantly being modernized. Several reforms have been implemented to improve the sector much to the benefit of the private sector, which is the focus of the National Development Plan.

PAYING TAXES AND DUTIES (more info)

To improve its business environment, Togo introduced some important reforms related to the payment of tax and duties. From the replacement of some taxes to the cancellation of others through exemptions, the country has only one objective: offer the most attractive tax framework to investors and economic operators. To achieve this, the authorities relied on digitization.

Continued here:

Decentralization: In Togo, Yoto III municipality adopts a CFA4 billion ... - Togo First

Read More..