433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

CACI wins $5.7 billion award to start privatizing Air Force network management

The ten-vendor team led by CACI will be responsible for “Wave 1” of the Air Force’s EITaaS rollout, focusing on end-user devices, IT service management and support services.
http://news.poseidon-us.com/SXXPvP

Changing cyber insurance guidance from Lloyd’s reflects a market in turmoil

Rising ransomware attacks and higher payout demands have battered the insurance industry, leaving many organizations exposed and vulnerable. 
http://news.poseidon-us.com/SXX8cs

5 open-source vulnerability assessment tools to try out

A vulnerability assessment is a methodical examination of network infrastructure, computer systems, and software with the goal of identifying and addressing known security flaws. Once the vulnerabilities are pinpointed, they are classified based on how critical it is to fix/mitigate them sooner rather than later. Usually, the vulnerability scanning tool also provides instructions on how to remediate or mitigate the discovered flaws. Security teams can use the findings of a vulnerability assessment to better understand … More → The post 5 open-source vulnerability assessment tools to try out appeared first on Help Net Security.
http://news.poseidon-us.com/SXWYth

Traceable AI debuts API testing product for its security platform

Traceable AI today announced the general availability of xAST, an API security testing solution, as part of its API Security Platform. The new feature set, after extensive beta testing with some of the company’s larger customers, is available for immediate use, and builds on the Traceable’s existing visibility and risk analysis features. The idea is to reduce the impact of potential API vulnerabilities early in the software development process, by making it easy to actively test an API that has made it through development but before it goes into production. Traceable uses an “in-app” approach to API testing, which means it’s observing the behavior of software while it’s actually running, as opposed the “contract” model, which merely analyzes which behaviors an API should exhibit. To read this article in full, please click here
http://news.poseidon-us.com/SXWQFZ

Service members and their families have a new vaccine option

In today’s Federal Newscast: Service members and their families have a new option when it comes to COVID-19 vaccinations. The clock is ticking on the Small Business Innovation Research program. And no test for you, as the free gifts to your mailbox come to an end.
http://news.poseidon-us.com/SXTN5D

Multi-stage crypto-mining malware hides in legitimate apps with month-long delay trigger

Researchers have discovered a new multi-stage malware delivery campaign that relies on legitimate application installers distributed through popular software download sites. The malicious payload delivery, which includes a cryptocurrency mining program, is done in stages with long delays that can add up to almost a month. “After the initial software installation, the attackers delayed the infection process for weeks and deleted traces from the original installation,” researchers from security firm Check Point Software Technologies said in a new report. “This allowed the campaign to successfully operate under the radar for years.” To read this article in full, please click here
http://news.poseidon-us.com/SXT3H1

DDoS activity launched by patriotic hacktivists is on the rise

Radware released a report revealing that the number of malicious DDoS attacks climbed by 203% compared to the first six months of 2021. This Help Net Security video provides information about the rise of DDoS activity launched by patriotic hacktivists. The post DDoS activity launched by patriotic hacktivists is on the rise appeared first on Help Net Security.
http://news.poseidon-us.com/SXSrwT

How automation can solve application development challenges

Security Compass has published the results of a research study examining developer views on application security, including the challenges and opportunities they face in their secure development efforts. In order for software developers and security teams to effectively collaborate and ensure that a company’s software products are secure, developers need automated, current, relevant, and actionable JITT training embedded into their development tools and processes. The research found that while most developers believe their enterprise has … More → The post How automation can solve application development challenges appeared first on Help Net Security.
http://news.poseidon-us.com/SXSD8y

Outdated infrastructure not up to today’s ransomware challenges

A global research commissioned by Cohesity reveals that nearly half of respondents say their company depends on outdated, legacy backup and recovery infrastructure to manage and protect their data. In some cases, this technology is more than 20 years old and was designed long before today’s multicloud era and onslaught of sophisticated cyberattacks plaguing enterprises globally. Challenges pertaining to outdated infrastructure could easily be compounded by the fact that many IT and security teams don’t … More → The post Outdated infrastructure not up to today’s ransomware challenges appeared first on Help Net Security.
http://news.poseidon-us.com/SXSCKN

Pathway to FADGI Compliance

Where are you on the path to FADGI compliance? A deadline to shift from paper to electronic records, as mandated by NARA and OMB, underscores the need for agencies to implement a broad digitization strategy. Download our exclusive ebook for expert advice on how to do that from EPA, GPO, the Library of Congress and NARA.
http://news.poseidon-us.com/SXQHR2