433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

BrandPost: Keeping your retail business safe from the cyber grinches

It’s not just retailers looking forward to the holiday shopping season; it’s also a time of plenty for cunning cybercriminals. While security and IT teams are working harder to manage online traffic spikes, maintain corporate operations and much more during this busy period, bad actors are taking the opportunity to launch targeted attacks. There are many actions merchants can and should take to improve their cybersecurity, safeguard their brand, and provide their customers with a safer shopping experience over this busy shopping season – and beyond. And even though it might not be feasible with the holiday shopping season already in full swing to make major changes to your security strategy or implement new technology, there are still many things that retailers can do using existing resources to anticipate threats better and avoid disruption. To read this article in full, please click here
http://news.poseidon-us.com/SfTPhH

NIST Drafts Revised Guidelines for Digital Identification in Federal Systems

The draft publication features updates intended to help fight online crime, preserve privacy and promote equity and usability.
http://news.poseidon-us.com/SfTNbF

VMware Security Updates, (Fri, Dec 16th)

VMware released the following security updates from important to critical:
http://news.poseidon-us.com/SfT6SG

BrandPost: How to Choose Security Technology That Works

The role of a security practitioner is difficult. From operational workflow changes to accommodating the latest application requirement impacting policies, it’s a relentless wave of actions to ensure that users, environments, and data are protected as effectively as possible. After all, that’s management of the attack surface. This role becomes even more daunting when selecting a new technology to deploy in your network environment. If every product and technology your organization considered worked equally well, choosing a new technology would be more straightforward. However, some technology decisions are made based on too few data points, too little input, and, worst of all, no definitive proof that this thing you are buying works as promised. To read this article in full, please click here
http://news.poseidon-us.com/SfQR0x

NIST Retires SHA-1 Cryptographic Algorithm

The venerable cryptographic hash function has vulnerabilities that make its further use inadvisable.
http://news.poseidon-us.com/SfQCM2

Microsoft’s EU data boundary plan to take effect Jan. 1

The plan, which covers Microsoft products and services such as Azure, Power BI, Dynamics 365 and Office 365, will allow customers to store and process their customer data within the EU.
http://news.poseidon-us.com/SfPnLB

What’s new in the crucial and long-running FedRAMP program

Cloud computing became a major technology strategy for the government more than 10 years ago. To help agencies ensure cloud security, the GSA set up a program called FedRAMP, Federal Risk and Authorization Management Program. The basic idea was, a vendor with FedRAMP certification for one agency could be trusted by other agencies for a given product. The program has come a long way.
http://news.poseidon-us.com/SfMKkY

Enabling Greater Digital Personalization with Graph

Graph technology can be used to improve data processing in various ways, such as enabling greater Digital personalization.
http://news.poseidon-us.com/SfMGtF