- Industries
Industries
Explore how Accredify’s TrustTech is transforming industries! From pursuing strategic differentiation, optimising operations, to addressing industry-specific challenges, TrustTech is a simple and effective solution that empowers our clients to meet their business needs by ensuring information integrity and process efficiency.
- Solutions
Solutions
Learn more about TrustTech! As an end-to-end verification technology solution, TrustTech offers a comprehensive framework of services that enable you to create, issue, verify, and manage verifiable document easily. TrustTech also provides you with data analytics so that you can uncover strategic insights to supercharge your organisation.
- Resources
Resources
Want to learn more about Accredify and get answers to our most frequently asked questions? Here’s the place to be! Browse through our resources which include press releases, case studies, company updates, and FAQs!
- Verify
- About
About Us
Discover more about the team behind Accredify and our vision to pioneer the age of verifiable documents.
Cyber Breach Research: Advisor Goh Jing Rong Published in Journal of Cybersecurity
Accredify’s Advisor Goh Jing Rong recently had his research paper “Predictive Taxonomy Analytics (LASSO): Predicting Outcome Types of Cyber Breach” published by the Journal of Cybersecurity– a top journal published by the Oxford University Press. The paper is co-written by Goh Jing Rong, Dr. Shaun S. Wang, Yaniv Harel and Gabriel Toh, and explores the utilisation of machine learning models and natural language processing techniques into a novel state-of-the-art general framework that is successful in predicting a variety of cybersecurity breaches.
The research was done to develop a unifying framework that uses readily available data to predict cybersecurity breaches, and provides a model that practitioners can use to assess their organisations’ cyber risk posture, potential gaps and vulnerabilities, with findings that support improved decision-making in cyber risk management and selecting relevant cybersecurity controls.
The paper also sheds light on the importance of verifiable data, as accurate information is key to generating actionable outputs and useful insights from the model.