433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

NAB backs fintech Banked

Makes first investment in the fintech’s latest funding round.
http://news.poseidon-us.com/Sctfbt

The top technology conferences to attend in 2023

From leadership to cloud and software events, here are some of the must-attend conferences for technology leaders next year.
http://news.poseidon-us.com/ScsQcb

ISC Stormcast For Wednesday, November 16th, 2022 https://isc.sans.edu/podcastdetail.html?id=8260, (Wed, Nov 16th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/ScrJnv

Neobank Up eyes Slack canvas

Hopes to jump on the beta list.
http://news.poseidon-us.com/ScqZf5

Biden picks 233 civil service leaders for the 2022 Presidential Rank Awards

President Joe Biden picked 233 federal employees across 33 agencies as winners of the 2022 Presidential Rank Awards.
http://news.poseidon-us.com/ScqRsl

Meta’s new kill chain model tackles online threats

In April 2014, Lockheed Martin revolutionized the cyber defense business by publishing a seminal white paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. This document sparked a new wave of thinking about digital adversaries, specifically, nation-state advanced persistent threat groups (APTs). The authors of the paper argued that by leveraging the knowledge of how these adversaries operate, cyber defenders “can create an intelligence feedback loop, enabling defenders to establish a state of information superiority which decreases the adversary’s likelihood of success with each subsequent intrusion attempt.” This so-called kill chain model could “describe phases of intrusions, mapping adversary kill chain indicators to defender courses of action, identifying patterns that link individual intrusions into broader campaigns, and understanding the iterative nature of intelligence gathering form the basis of intelligence-driven computer network defense.” To read this article in full, please click here
http://news.poseidon-us.com/ScpJcX