433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

Ransomware Protection 3-2-1-1-0 Rule

The 3‑2‑1‑1‑0 Rule is a guiding principle to create air‑gapped, redundant and resilient data security programs that defeat ransomware. Air gaps work by storing data in isolated environments without online access. That way, there is zero possibility of data access or destruction.
http://news.poseidon-us.com/SggXWP

BrandPost: The converging future of XDR and Threat Hunting

The cybersecurity challenge for organizations of all sizes continues to get more difficult. Complex threats and a growing cybersecurity skills gap is making life harder for often overworked IT teams. Without automation, they find it difficult to process and act on a steadily increasing flow of data and security alerts from across the network.  As a result, many organizations are considering extended detection and response (XDR) tools to make better sense of incoming threat information. The market is projected to reach $2.36 billion by 2027, and small to mid-size enterprises are leading the way. To read this article in full, please click here
http://news.poseidon-us.com/SggTLc

You must build a security team. Where do you start?

Security veteran Chris Deibler, the new VP of Security at DataGrail, has been brought in to build the company’s security team to support its growth. A former Director of Security Engineering at Shopify and Director of Security at Twitch, he knows a thing or two (or 52) about successfully instituting a security organization within an enterprise, so we decided to pick his brain on the subject. [The answers have been lightly edited for clarity.] Scaling … More → The post You must build a security team. Where do you start? appeared first on Help Net Security.
http://news.poseidon-us.com/SgfL34

The Forest Service claims progress in the effort to control western wildfires

The Forest Services, part of the Agriculture Department, is in the midst of a 10-year effort to better prevent wildfires, the kinds of seemingly out-of-control blazes that have charred millions of acres out west.
http://news.poseidon-us.com/Sgd8f4

How to control complexity and cost in multicloud environments

As NNSA’s James Wolff notes, agencies now know that complexity is a way of life in the cloud. So how can agencies avoid chaos and spiraling costs? IT leaders from DISA, Energy, GSA, State and VA join Wolff to share their early winning strategies.
http://news.poseidon-us.com/SgcgyD

3 cloud trends to watch in 2023

Competing narratives converge as companies push modernization while controlling costs.
http://news.poseidon-us.com/SgcgK3

AI developed to monitor changes to the globally important Thwaites Glacier

Scientists have developed artificial intelligence techniques to track the development of crevasses — or fractures — on the Thwaites Glacier Ice Tongue in west Antarctica. A team of scientists has adapted an AI algorithm originally developed to identify cells in microscope images to spot crevasses forming in the ice from satellite images. Crevasses are indicators of stresses building-up in the glacier.
http://news.poseidon-us.com/SgcZ8Y

11 top XDR tools and how to evaluate them

Little in the modern IT world lends itself to manual or siloed management, and this is doubly true in the security realm. The scale of modern enterprise computing and modern application stack architecture requires security tools that can bring visibility into the security posture of modern IT components and integrate tightly to bring real-time threat detection, possibly even automating aspects of threat mitigation. This need has given rise to extended detection and response (XDR) tools. What is XDR and what does it do? XDR is a relatively new class of security tool that combines and builds on the strongest elements of security incident and event management (SIEM), endpoint detection and response (EDR), and even security orchestration and response (SOAR). In fact, some XDR platforms listed here are the fusion of existing tools the vendor has offered for some time. To read this article in full, please click here
http://news.poseidon-us.com/SgbPM6

DShield Sensor JSON Log Analysis, (Sun, Jan 8th)

This is a review and analysis of some of my json DShield logs for a 9-day period. For this, I created some parsers using jq [1] and MS PowerBI which I described here to parse GeoIP [2] with the script previously posted here. This is the highlights from this timeframe 5 – 13 Dec 2022:
http://news.poseidon-us.com/SgZQpV