433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

A10 integrates Next-Gen WAF to enable multi-layered security

The last decade of digital transformation has turned most organizations today into true digital businesses. But the effectiveness and economics of cloud operating models have become top concerns. How to best secure, optimize, and automate hybrid cloud environments in the most effective manner is a significant challenge. To solve this problem, A10 Networks is announcing a combined solution of the Thunder Application Delivery Controller (ADC) and the new A10 Next-Generation Web Application Firewall (WAF), powered … More → The post A10 integrates Next-Gen WAF to enable multi-layered security appeared first on Help Net Security.
http://news.poseidon-us.com/SmtSZB

Focus business teams on delivering value while reducing incidents with Software-as-a-Service (SaaS) application monitoring

Cisco ThousandEyes monitors SaaS beyond corporate perimeter.
http://news.poseidon-us.com/SmtKyx

Most interesting products to see at RSA Conference 2023

Security professionals attending this year’s RSA Conference expect to learn about new tools, platforms, and services from the 600-plus vendors exhibiting there. That’s a lot of ground to cover, so CSO has sifted through the upcoming announcements and gathered the products and services that caught our eye here. More announcements will be made throughout the event, and CSO will update this article as their embargoes break. We’ve organized the listings by day of announcement. RSA Conference announcements, pre-event Binary Defense Phishing Response service Managed detection and response (MDR) firm Binary Defense will be showing its new Phishing Response service. Its features include email attack surface hardening, intelligence correlation, threat hunting, and investigation-based detection and remediation recommendations. Users may submit emails and phishing alerts from third-party email protection software for analysis. Findings from that analysis are then correlated with other threat intelligence, and then Binary Defense analysts look for evidence of this attack. Binary Defense is at RSAC booth 5415. To read this article in full, please click here
http://news.poseidon-us.com/Smrb16

The strong link between cyber threat intelligence and digital risk protection

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support. In fact, these changes have led to a CTI subcategory focused on digital risk protection. DRP is broadly defined as, “telemetry, analysis, processes, and technologies used to identify and mitigate risks associated with digital assets.” I’ve earlier examined ESG research on enterprise CTI programs based on. CISOs are investing here but challenges remain. I’ve also dug into the CTI lifecycle. Nearly three-quarters (74%) of organizations claim they employ a lifecycle, but many describe bottlenecks in one or several of the lifecycle phases. To read this article in full, please click here
http://news.poseidon-us.com/SmrGs0

Intruder joins Google Cloud Partner Advantage program

Intruder has joined the Google Cloud Partner Advantage program as a technology partner, giving organisations the ability to easily monitor their cloud systems for potential security breaches and vulnerabilities. As part of the collaboration, customers are able to connect Intruder to Google Cloud to synchronise assets. With the integration and as a partner, Intruder offers a cybersecurity solution to customers who are deploying numerous assets in their cloud accounts. Intruder’s vulnerability management and attack surface … More → The post Intruder joins Google Cloud Partner Advantage program appeared first on Help Net Security.
http://news.poseidon-us.com/SmqNqk

Dashlane launches Confidential SSO powered by AWS Nitro Enclaves

Dashlane has unveiled an integration of AWS Nitro Enclaves into its security architecture, starting with the launch of Dashlane Confidential SSO in public beta. Leveraging AWS Nitro Enclaves to create isolated computing environments to further protect and securely process highly sensitive data, this single sign-on (SSO) integration for businesses is the first release in a series of breakthrough security features planned over the coming months. While the combination of Dashlane and SSO already ensures reliable … More → The post Dashlane launches Confidential SSO powered by AWS Nitro Enclaves appeared first on Help Net Security.
http://news.poseidon-us.com/SmqNqj

Talon Cyber Security collaborates with Microsoft to provide ChatGPT access

Talon Cyber Security has integrated the Talon Enterprise Browser with Microsoft Azure OpenAI Service to provide enterprise-grade ChatGPT access to customers. “The productivity gains that ChatGPT enables for organizations are too game changing for us to not make an enterprise-level version of this easily available to our customers,” said Ofer Ben-Noon, CEO, Talon Cyber Security. “By embedding Microsoft Azure OpenAI Service in Talon’s Enterprise Browser, organizations can embrace ChatGPT for enterprise use in a manner … More → The post Talon Cyber Security collaborates with Microsoft to provide ChatGPT access appeared first on Help Net Security.
http://news.poseidon-us.com/SmqNpq

Five Eye nations release new guidance on smart city cybersecurity

New guidance, Cybersecurity Best Practices for Smart Cities, wants to raise awareness among communities and organizations implementing smart city technologies that these beneficial technologies can also have potential vulnerabilities. A collaboration among the Five Eye nations (Australia, Canada, New Zealand, the UK, and the US), it advises communities considering becoming smart cities to assess and mitigate the cybersecurity risks that comes with the technology. What makes smart cities attractive to attackers is the data being collected and processed. Because AI-powered systems are being used to integrate this data, these should be given special attention when checking for vulnerabilities. To read this article in full, please click here
http://news.poseidon-us.com/SmnYMK

The biggest data security blind spot: Authorization

Too many people have access to company data they don’t need. Also, too many companies focus on authentication (verifying identity) as a security measure and overlook the importance of authorization (verifying right to access). While it’s important to give employees access to the data they require to do their job, granting too much access increases the risk of data breaches. Maintaining proper authorization is particularly important when we’re facing the economic distress that comes with … More → The post The biggest data security blind spot: Authorization appeared first on Help Net Security.
http://news.poseidon-us.com/SmmkHN