433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

4 alternatives to encryption backdoors, but no silver bullet

End-to-end encrypted communication has been a boon to security and privacy over the past 12 years since Apple, Signal, email providers, and other early adopters first started deploying the technology. At the same time, law enforcement authorities around the globe have pushed for technological solutions to pry open the chain of protected end-to-end encrypted content, arguing that the lack of visibility provides a haven for criminals, terrorists and child abusers to hatch their plans with impunity. In 2016, Apple prevailed in a now-famous legal standoff with FBI Director James Comey to unlock an encrypted phone used by a mass shooter in San Bernardino, California. In 2019, Attorney General William Barr revived the so-called backdoor debate to advocate some means of breaking encryption to thwart those who distribute child sexual abuse material. Last month, the UK government kicked off a PR campaign to lay the groundwork for killing off end-to-end encryption ostensibly to crack down on child sex abusers. To read this article in full, please click here
http://news.poseidon-us.com/SJb4qL

7 top challenges of security tool integration

Enterprises are frequently deploying new security tools and services to address needs and threats. A key consideration is how to integrate these various offerings—in many cases provided by different vendors—into the existing infrastructure to support a cohesive security strategy. The move to the cloud has made security integration somewhat easier, but the process can still be a major hurdle for organizations as they try to build strong protection against the latest threats. Here are some of the challenges they might face and how can they effectively address them. 1. Too many security tools A common security integration problem stems from something many organizations are doing: deploying too many security products and services. To read this article in full, please click here
http://news.poseidon-us.com/SJb4PR

7 top challenges of security tool integration

Enterprises are frequently deploying new security tools and services to address needs and threats. A key consideration is how to integrate these various offerings—in many cases provided by different vendors—into the existing infrastructure to support a cohesive security strategy. The move to the cloud has made security integration somewhat easier, but the process can still be a major hurdle for organizations as they try to build strong protection against the latest threats. Here are some of the challenges they might face and how can they effectively address them. 1. Too many security tools A common security integration problem stems from something many organizations are doing: deploying too many security products and services. To read this article in full, please click here
http://news.poseidon-us.com/SJb4PR

Westpac to accelerate cloud shift under five-year Azure deal

Looks to deliver more “digital-to-the-core” experiences.
http://news.poseidon-us.com/SJZ1Sf

Westpac to accelerate cloud shift under five-year Azure deal

Looks to deliver more “digital-to-the-core” experiences.
http://news.poseidon-us.com/SJZ1Sf

Westpac to accelerate cloud shift under five-year Azure deal

Looks to deliver more “digital-to-the-core” experiences.
http://news.poseidon-us.com/SJZ1Sf

Westpac to accelerate cloud shift under five-year Azure deal

Looks to deliver more “digital-to-the-core” experiences.
http://news.poseidon-us.com/SJZ1Sf

Westpac to accelerate cloud shift under five-year Azure deal

Looks to deliver more “digital-to-the-core” experiences.
http://news.poseidon-us.com/SJZ1Sf

web3 phishing via self-customizing landing pages, (Mon, Feb 7th)

You may not quite understand what “web3” is all about (I do not claim to do so), but it appears phishers may already use it. At least a particular web3 platform, “Skynet,” aka “slasky.net,” is already being abused. [FWIW: the page was reported to report@siasky.net] The platform is pretty much a free file hosting platform. You upload an HTML file, which will display at a particular “slasky.net” URL. Like all similar file hosting platforms, it is ready to be abused by phishing scams. Aside from being hosted on this newish platform, the JavaScript used to implement the phishing page is interesting. Not only does it customize the login dialog with the company logo, but it also replaces the entire page with a screenshot of the domain homepage.
http://news.poseidon-us.com/SJXbnW