433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

TSP’s modernization project set to launch June 1 after transition period

After a brief pause on investment changes, Thrift Savings Plan participants will get a host of new features starting in June.
http://news.poseidon-us.com/SR3rxz

TSP changes: The freeze before the thaw!

Investors in the federal Thrift Savings Plan have until noon EDT today to make changes in their account allocations.
http://news.poseidon-us.com/SR3nvr

Verizon 2022 DBIR: External attacks and ransomware reign

There has been an alarming rise (13%) in ransomware breaches – a jump greater than the past 5 years combined, Verizon Business has revealed in its 2022 Data Breach Investigations Report (2022 DBIR). Verizon Business 2022 DBIR: Key findings Verizon has been issuing its yearly DBIR report for the last 15 years, providing the security practitioners and executives around the world a glimpse into the global trends and patterns related to cyber incidents and data … More → The post Verizon 2022 DBIR: External attacks and ransomware reign appeared first on Help Net Security.
http://news.poseidon-us.com/SR1nrF

Elevation of Privilege is the #1 Microsoft vulnerability category

BeyondTrust announced the release of a report which includes the latest annual breakdown of Microsoft vulnerabilities by category and product, as well as a six-year trend analysis, providing a holistic understanding of the evolving threat landscape. The report analyzes data from security bulletins publicly issued by Microsoft throughout the previous year. Microsoft groups vulnerabilities that apply to one or more of their products into the following main categories: Remote Code Execution, Elevation of Privilege, Security … More → The post Elevation of Privilege is the #1 Microsoft vulnerability category appeared first on Help Net Security.
http://news.poseidon-us.com/SR105G

Can we trust the cybersecurity of the energy sector?

A research published by DNV reveals that energy executives anticipate life, property, and environment-compromising cyberattacks on the sector within the next two years. The report finds that more than four-fifths of professionals working in the power, renewables, and oil and gas sectors believe a cyberattack on the industry is likely to cause operational shutdowns (85%) and damage to energy assets and critical infrastructure (84%). 74% expect an attack to harm the environment while 57% anticipate … More → The post Can we trust the cybersecurity of the energy sector? appeared first on Help Net Security.
http://news.poseidon-us.com/SR0xV9

ACMA asks telcos for better support for the vulnerable

Helping the sector meet Telecommunications Consumer Protection Code obligations.
http://news.poseidon-us.com/SR09sX

7 machine identity management best practices

Machine identities are a large, and fast-growing part of the enterprise attack surface. The number of machines—servers, devices, and services—is growing rapidly and efforts to secure them often fall short. Cybercriminals and other threat actors have been quick to take advantage. Cyberattacks that involved the misuse of machine identities increased by 1,600% over the last five years, according to a report released last spring by cybersecurity vendor Venafi. Research firm Gartner named machine identity as one of the top cybersecurity trends of the year, in a report released last fall. In 2020, 50% of cloud security failures resulted from inadequate management of identities, access, and privileges, according to another Gartner report. In 2023, that percentage will rise to 75%. To read this article in full, please click here
http://news.poseidon-us.com/SQy2C9

Paying the ransom is not a good recovery strategy

Businesses are losing the battle when it comes to defending against ransomware attacks, according to a Veeam report, which found that 72% of organizations had partial or complete attacks on their backup repositories, dramatically impacting the ability to recover data without paying the ransom. 80% of successful attacks targeted known vulnerabilities — reinforcing the importance of patching and upgrading software. Almost all attackers attempted to destroy backup repositories to disable the victim’s ability to recover … More → The post Paying the ransom is not a good recovery strategy appeared first on Help Net Security.
http://news.poseidon-us.com/SQxHCb

How confident are CISOs about their security posture?

Proofpoint released its annual Voice of the CISO report, which explores key challenges facing chief information security officers (CISOs). While the world’s CISOs spent 2021 coming to terms with new ways of working, many now feel much more in control of their environment: 48% feel that their organization is at risk of suffering a material cyber attack in the next 12 months, down from 64% last year. But feeling prepared for a cyber attack is … More → The post How confident are CISOs about their security posture? appeared first on Help Net Security.
http://news.poseidon-us.com/SQxDv5