433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

UL IoT Security Starter Kit helps organizations manage their cybersecurity risks

UL announced that it will now offer an Internet of Things (IoT) Security Starter Kit to help improve internal cybersecurity capabilities for a secure development life cycle (SDL), which will help empower secure product development and life cycle management. The IoT Security Starter Kit is based on SDL best practices and includes security-by-design training, an SDL gap analysis, a product security architecture review and penetration testing. Customers can customize these offerings based on their company’s … More → The post UL IoT Security Starter Kit helps organizations manage their cybersecurity risks appeared first on Help Net Security.
http://news.poseidon-us.com/SDk7wG

D2iQ DKP now available in AWS Marketplace to help customers accelerate their cloud native journey

D2iQ announced that the D2iQ Kubernetes Platform (DKP) is now available in AWS Marketplace, a digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services. With DKP, AWS customers can accelerate their cloud native journey by scaling Kubernetes deployments in production environments. Consisting of D2iQ Konvoy, Kommander, and Kaptain, DKP’s full suite of solutions provides access to … More → The post D2iQ DKP now available in AWS Marketplace to help customers accelerate their cloud native journey appeared first on Help Net Security.
http://news.poseidon-us.com/SDk1Cq

Who Is the Network Access Broker ‘Babam’?

Rarely do cybercriminal gangs that deploy ransomware gain the initial access to the target themselves. More commonly, that access is purchased from a cybercriminal broker who specializes in stealing remote access credentials — such as usernames and passwords needed to remotely connect to the target’s network. In this post we’ll look at the clues left behind by “Babam,” the handle chosen by a cybercriminal who has sold such access to ransomware groups on many occasions over the past few years.
http://news.poseidon-us.com/SDjYpK

Ondato’s AI-enabled ID forensics system detects document alterations

Ondato launched a new AI-enabled ID forensics system that makes it difficult to submit spoof documents, such as altered photos, ID papers, and deep fake videos, as part of any customer on-boarding process. The current scale of hacking and ID theft means that fraudsters have a better chance of finding a photo that matches their target scam. While these spoof documents may pass an “eye test”, Ondato’s AI algorithms notice any discrepancies in the data … More → The post Ondato’s AI-enabled ID forensics system detects document alterations appeared first on Help Net Security.
http://news.poseidon-us.com/SDfdqc

Ondato’s AI-enabled ID forensics system detects document alterations

Ondato launched a new AI-enabled ID forensics system that makes it difficult to submit spoof documents, such as altered photos, ID papers, and deep fake videos, as part of any customer on-boarding process. The current scale of hacking and ID theft means that fraudsters have a better chance of finding a photo that matches their target scam. While these spoof documents may pass an “eye test”, Ondato’s AI algorithms notice any discrepancies in the data … More → The post Ondato’s AI-enabled ID forensics system detects document alterations appeared first on Help Net Security.
http://news.poseidon-us.com/SDfdqc