433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

Zero Trust Cyber Exchange: Navy tech team says identity services underpin move to zero trust

The Department of the Navy is creating identity services to support organizations and users across the Navy and Marine Corps — but also that will integrate with zero trust efforts across DoD. We talk to a trio of leaders focused on this work during the Zero Trust Cyber Exchange.
http://news.poseidon-us.com/SSrWhh

Claroty appoints Heather Young as RVP Public Sector Sales

Claroty announced the appointment of Heather Young as regional vice president of public sector sales. Young will lead Claroty engagements in the public sector that are focused on safeguarding U.S. critical infrastructure systems. This appointment comes on the heels of multiple initiatives by Claroty to partner with the U.S. government to strengthen the nation’s critical infrastructure security: OT Cyber Coalition: In April 2022, Claroty joined a diverse group of cybersecurity leaders to launch the Operational … More → The post Claroty appoints Heather Young as RVP Public Sector Sales appeared first on Help Net Security.
http://news.poseidon-us.com/SSrQXm

Sophanny Schwartz joins Ascent Solutions as Managing Director of Human Resources

Ascent Solutions announced the appointment of Sophanny Schwartz as Managing Director of Human Resources. Schwartz brings over 20 years of global human resource experience in technology, consulting, manufacturing and retail, including her last role at Schwan’s Company as the Vice President of HR Global Supply Chain, Logistics and Strategic Capital Investments and spent over a decade at Accenture. “Ascent is experiencing explosive growth,” JD Harris, CEO, said. “Sophanny has an incredible wealth of experience in … More → The post Sophanny Schwartz joins Ascent Solutions as Managing Director of Human Resources appeared first on Help Net Security.
http://news.poseidon-us.com/SSrND0

Cyware completes SOC 2 Type 2 Compliance for data security

Cyware announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security (“applicable trust services criteria”) set forth in TSP section 100, Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, Trust Services Criteria). The achievement highlights the company’s commitment to the highest levels of data security. SOC 2 is a reporting framework created by the American Institute of Certified … More → The post Cyware completes SOC 2 Type 2 Compliance for data security appeared first on Help Net Security.
http://news.poseidon-us.com/SSrN9v

Zero Trust Cyber Exchange: Service mesh plays integral role in zero trust runtime security

There are certain strategies, features and frameworks that agencies can adopt that will get them closer to zero trust. One of the most effective is the service mesh architecture.
http://news.poseidon-us.com/SSp05Z

USPS hiring strategy helped reduce overtime last holiday season, IG finds

The Postal Service’s workforce and facility strategy to prepare for last year’s peak holiday operations led to higher performance and less overtime.
http://news.poseidon-us.com/SSny9G

Senator wants former and possibly current marijuana use to not count against clearance-seekers

In today’s Federal Newscast, new legislation would make it easier for security clearance applicants to overcome a history of using marijuana.
http://news.poseidon-us.com/SSn4m6

5 social engineering assumptions that are wrong

Social engineering is involved in the vast majority of cyberattacks, but a new report from Proofpoint has revealed five common social engineering assumptions that are not only wrong but are repeatedly subverted by malicious actors in their attacks. Commenting on the report’s findings, Sherrod DeGrippo, Proofpoint’s vice president threat research and detection, stated that the vendor has attempted to debunk faulty assumptions made by organizations and security teams so they can better protect employees against cybercrime. “Despite defenders’ best efforts, cybercriminals continue to defraud, extort and ransom companies for billions of dollars annually. Security-focused decision makers have prioritized bolstering defenses around physical and cloud-based infrastructure, which has led to human beings becoming the most relied upon entry point for compromise. As a result, a wide array of content and techniques continue to be developed to exploit human behaviors and interests.” To read this article in full, please click here
http://news.poseidon-us.com/SSmSb9