<  All articles

UA.SC 2019: Evgen Verzun Defines Cybersecurity Criteria for Secure Solutions for 2020 and Beyond

UA.SC 2019: Evgen Verzun Defines Cybersecurity Criteria for Secure Solutions for 2020 and Beyond

November 14, 2019, Evgen Verzun, CTO of StealthMail, attended UA SC 2019 in Kyiv, Ukraine. UA SC Conference is an annual cybersecurity event where key security experts and business owners share their experience building comprehensive corporate cybersecurity solutions.

Evgen Verzun addressed the Conference outlining cyberattack trends, identifying security risks and emphasizing the dramatic impact Business Email Compromise (BEC) attacks have had on businesses worldwide in 2019. For reference, BEC-attack losses reported to the FBI were around a $215 million mark in 2015, and by 2019 reported domestic and international loss crossed a $26 billion mark. 

As part of the report, Evgen Verzun looked beyond the conventional concept of addressing the issue of BEC-attacks. He and his engineering team determined latent email vulnerabilities, which are not only the underlying cause of BEC-attacks, but also an open door criminals use to execute over 90% of their malicious attacks on businesses.

For businesses seeking to address the issues, Evgen Verzun defined cybersecurity criteria, which cybersecurity solutions have to meet in order to withstand all kinds of aforementioned attacks: 

  • Encryption must be performed on the client’s device.
  • Data must be encrypted—on a device, in transit, and at rest.
  • Only the client company controls both storage and encryption keys.
  • Data must be transmitted through secure information channels.

StealthMail solution, developed by Evgen Verzun and his team of experts, was also demonstrated at the event. StealthMail closely follows every cybersecurity criteria identified in the report and runs on patented technology initially engineered for use in a professional mission-critical environment, which, for the first time ever, is now being made available for corporate use.

To learn more about the StealthMail solution, visit StealthMail.com today.


We use cookies to improve your experience