433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

AI spending to grow faster than IT budgets next year, executives say

“Enterprises are continuing to focus on cost optimization and efficiency programs to fund transformation and customer experience enabled by AI,” ISG’s Michael Dornan said.
http://news.poseidon-us.com/TGgsKY

TPM 2.0: The new standard for secure firmware

Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM 2.0 specification from the Trusted Computing Group (TCG). Manufacturers attach a Trusted Platform Module (TPM) to a device to help users and administrators authenticate its identity, to generate and store encryption keys, and to ensure platform integrity. Before the TPM specification was updated, users and administrators could only assume the TPM was working correctly because … More → The post TPM 2.0: The new standard for secure firmware appeared first on Help Net Security.
http://news.poseidon-us.com/TGggx6

Who handles what? Common misconceptions about SaaS security responsibilities

In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common misconceptions do you encounter about the distribution of responsibilities in a cloud environment, and how do these misunderstandings increase security risks? SaaS providers and their customers both care deeply about security, compliance, and meeting global regulations. However, SaaS is still relatively … More → The post Who handles what? Common misconceptions about SaaS security responsibilities appeared first on Help Net Security.
http://news.poseidon-us.com/TGgYmx

What makes for a fulfilled cybersecurity career

In this Help Net Security video, Richard Hummel, NETSCOUT’s Director of Threat Intelligence, talks about his journey into cybersecurity and offers insight for those that are interested in pursuing it as a career. The post What makes for a fulfilled cybersecurity career appeared first on Help Net Security.
http://news.poseidon-us.com/TGgYmn

Top cybersecurity books for your holiday gift list

The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book can provide both knowledge and inspiration. To help with ideas on what to give, we’ve compiled a list of cybersecurity books to consider. Security Yearbook 2024: A History and Directory of the IT Security Industry Author: Richard Stiennon In the book, you’ll find a comprehensive directory of cybersecurity vendors, updated for 2024, complete with headquarters … More → The post Top cybersecurity books for your holiday gift list appeared first on Help Net Security.
http://news.poseidon-us.com/TGgYlh

Proactive Defense for Critical Infrastructure: OPSWAT

As cyber threats grow more sophisticated, OPSWAT leads the charge in safeguarding critical infrastructure with a prevention-first approach, securing industries vital to society through innovative technologies like its MetaDefender platform.
http://news.poseidon-us.com/TGgYSd

Businesses plagued by constant stream of malicious emails

36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – and 2.3% of those contained malicious content, totalling 427.8 million emails. Once again, phishing remains the most prevalent form of attack, responsible for a third of all cyber-attacks in 2024. This was confirmed by the analysis of 55.6 billion emails, … More → The post Businesses plagued by constant stream of malicious emails appeared first on Help Net Security.
http://news.poseidon-us.com/TGgWzS

ISC Stormcast For Monday, December 9th, 2024 https://isc.sans.edu/podcastdetail/9246, (Mon, Dec 9th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TGgVpH

CURLing for Crypto on Honeypots, (Mon, Dec 9th)

I get a daily report from my honeypots for Cowrie activity [1], which includes telnet and SSH sessions attempted on the honyepot. One indicator I use to find sessions of interest is the number of commands run. Most of the time there are about 20 commands run per session, but a session with over 1,000 commands run in a session is unexpected.
http://news.poseidon-us.com/TGgTHh