Artificial Intelligence | News | Insights | AiThority
[bsfp-cryptocurrency style=”widget-18″ align=”marquee” columns=”6″ coins=”selected” coins-count=”6″ coins-selected=”BTC,ETH,XRP,LTC,EOS,ADA,XLM,NEO,LTC,EOS,XEM,DASH,USDT,BNB,QTUM,XVG,ONT,ZEC,STEEM” currency=”USD” title=”Cryptocurrency Widget” show_title=”0″ icon=”” scheme=”light” bs-show-desktop=”1″ bs-show-tablet=”1″ bs-show-phone=”1″ custom-css-class=”” custom-id=”” css=”.vc_custom_1523079266073{margin-bottom: 0px !important;padding-top: 0px !important;padding-bottom: 0px !important;}”]

Thunder Shield Security Unveils Custos, A Revolutionary Cybersecurity Solution

Thunder Shield Security (TSS), a Taiwanese information security service provider, announced Custos, its next-generation scanning platform equipped with artificial intelligence and machine learning to proactively combat cyber threats and safeguard organisations.

AiThority Interview Insights: AiThority Interview with Gijs van de Nieuwegiessen, VP of Automation at Khoros

Custos streamlines cybersecurity with a comprehensive toolkit, including a URL fuzzer, website, network, TCP, UDP, SSL, WordPress and Drupal scanners, and Custos Strike, TSS’s proprietary automatic penetration testing tool. This unified platform is tailored for effortless implementation, catering to businesses of all sizes with diverse cybersecurity requirements.

1)    Comprehensive Cybersecurity Platform: Custos presents a unified cybersecurity approach where Custos Strike, TSS’s automatic penetration testing tool, is a critical component among various scanning tools. The platform seamlessly integrates functions like URL fuzzing and website vulnerability scanning (for websites, networks, TCP, UDP, SSL, WordPress, and Drupal) into a single solution, streamlining workflows for penetration testers and organisations.

2)    Advanced Attack Graphs with AI Machine Learning Capabilities: Custos Strike goes beyond by generating attack graphs and utilising artificial intelligence and machine learning techniques to detect potential patterns that signify new, previously undiscovered, or zero-day vulnerabilities. It also uncovers fresh attack vectors and conducts simulated attacks, precisely identifying critical vulnerabilities that demand immediate attention.

3)    Enhanced Efficiency and Accuracy: Custos empowers ethical hackers and organisations to comprehensively identify vulnerabilities, elevate security stances, optimise resource allocation, and fulfil compliance requirements. It streamlines penetration testing, reducing the time required from days to a single day or less.

Related Posts
1 of 41,206

4)    Reducing False Alarms with Machine Learning: At Custos’ core, machine learning fine-tunes threat detection by significantly reducing false alarms, ensuring a laser focus on genuine security risks.

Custos is poised to emerge as an indispensable component of every organisation’s IT security strategy in the dynamic landscape of cyber threats. The platform is scheduled for release by the end of 2023, with positive early feedback from beta testers, including web development company Perfect Co. Ltd., highlighting its potential as a transformative cybersecurity tool.

Read More about Interview AiThority: AiThority Interview with Keri Olson, VP at IBM IT Automation

TSS welcomes collaboration and investment from European Union partners to bolster its upcoming growth phases through capital infusion or pertinent expertise. Particularly, TSS seeks partnerships with companies holding cybersecurity credentials (such as OSCP or CEH certifications) or connections to technology-savvy firms.

Leo Lu, CEO of TSS, remarked, “Our relentless pursuit of innovation at TSS has led us to develop Custos. We are confident that it has the potential to disrupt the cybersecurity industry, making online security more accessible and effective for businesses and individuals. With Custos, we are not just protecting data; we are safeguarding the future of digital trust.”

 Latest AiThority Interview Insights : AiThority Interview with Matthew Tillman, Co-Founder and CEO at OpenEnvoy

 [To share your insights with us, please write to sghosh@martechseries.com] 

Comments are closed.