433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (656) 236-3022

Confronting the growing drone threat

There is a solid rationale for prioritizing safe, secure and controlled RF cyber-based counter-UAS technology as decision makers consider future standards. The post Confronting the growing drone threat first appeared on Federal News Network.
http://news.poseidon-us.com/TH7Jtr

Confronting the growing drone threat

There is a solid rationale for prioritizing safe, secure and controlled RF cyber-based counter-UAS technology as decision makers consider future standards. The post Confronting the growing drone threat first appeared on Federal News Network.
http://news.poseidon-us.com/TH7JkM

D.C. Mayor Bowser and President-elect Trump meet about underutilized federal buildings

Bowser said her recent meeting with Trump centered on the federal workforce and underutilized federal buildings. The post D.C. Mayor Bowser and President-elect Trump meet about underutilized federal buildings first appeared on Federal News Network.
http://news.poseidon-us.com/TH7JWG

Goodware Hash Sets, (Thu, Jan 2nd)

In the cybersecurity landscape, we all need hashes! A hash is the result of applying a special mathematical function (a “hash function”) that transforms an input (such as a file or a piece of text) into a fixed-size string or number. This output, often called a “hash value,” “digest,” or “checksum,” uniquely represents the original data. In the context of this diary, hashes are commonly used for data integrity checks. There are plenty of them (MD5, SHA-1, SHA-2, SHA-256, …), SHA256 being the most popular for a while because older like MD5 are considered as broken because researchers have demonstrated practical collision attacks.
http://news.poseidon-us.com/TH7CQV

ROI remains elusive for enterprise AI plans despite progress

Most businesses that have yet to obtain returns on their investments expect to see dollar savings within three years, an IBM report found. 
http://news.poseidon-us.com/TH79l1

How enterprise cloud architects can drive adoption

The complexity of cloud requires at least one accountable architectural leader to guide companies through transformation.
http://news.poseidon-us.com/TH79jt

The Ransomware Solution Your CISO will Love

Discover how to build a unified front across ITOps and SecOps in the fight against ransomware.
http://news.poseidon-us.com/TH756Q

Maximize Your Microsoft Investment: Single-Solution Data Protection for the Microsoft Cloud eBook

We’ve experienced a seismic shift in how work gets done, as organizations everywhere transform their businesses, standardize on new remote workforce models, and accelerate their cloud adoption.
http://news.poseidon-us.com/TH753R

ESG Report: Analyzing the Economic Impact of Commvault® Cloud

TechTarget’s Enterprise Strategy Group (ESG) analyzed the economic benefits of cyber resilience with Commvault Cloud and concluded the unified platform provides substantial value to IT and Security teams in terms.
http://news.poseidon-us.com/TH751p

Solution Brief: Change the Rules for SAP HANA Data Protection with Commvault® Cloud

As enterprises increasingly adopt SAP HANA to speed business process transformation and modernize IT, they need peace of mind that their mission-critical data is protected against the threat of data loss or attack. Download the solution brief to learn how Commvault® Cloud delivers enterprise-grade data protection as a simple cloud-delivered solution.
http://news.poseidon-us.com/TH751n