433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

There’s one big population the Department of Government Efficiency might be overlooking

The Department of Government Efficiency, or DOGE, might be overlooking another source of savings: government contractors outnumbering federal employees. The post There’s one big population the Department of Government Efficiency might be overlooking first appeared on Federal News Network.
http://news.poseidon-us.com/THPMTj

A NOAA grant program aims at coastal resiliency

A grant program of the National Oceanic and Atmospheric Administration aims to help the resilience of coastal cities and towns. The post A NOAA grant program aims at coastal resiliency first appeared on Federal News Network.
http://news.poseidon-us.com/THPGnG

Critical SimpleHelp vulnerabilities fixed, update your server instances!

If you’re an organization using SimpleHelp for your remote IT support/access needs, you should update or patch your server installation without delay, to fix security vulnerabilities that may be exploited by remote attackers to execute code on the underlying host. The vulnerabilities SimpleHelp is relatively popular remote support/access software that has also occasionally been used by cyber attackers. The solution is mostly used by technical services firms and organizations’ IT help desk and technical support … More → The post Critical SimpleHelp vulnerabilities fixed, update your server instances! appeared first on Help Net Security.
http://news.poseidon-us.com/THPFGr

Concentric AI helps organizations gain a complete understanding of their data

Concentric AI introduced new Private Scan Manager functionality in its Semantic Intelligence data security governance platform, which enables data scans to be processed within organizations’ own environments. Highly regulated organizations, such as those in financial services, healthcare, and government, often require all data processing to remain on site for data security reasons, to better protect intellectual property, and to comply with industry or government regulations. With this launch, organizations now for the first time have … More → The post Concentric AI helps organizations gain a complete understanding of their data appeared first on Help Net Security.
http://news.poseidon-us.com/THPFDS

John Ratcliffe, Trump’s CIA pick, tells senators the agency is ‘not where we’re supposed to be’

Ratcliffe told lawmakers the nation’s spy agencies must do better when it comes to using technology like artificial intelligence to confront adversaries. The post John Ratcliffe, Trump’s CIA pick, tells senators the agency is ‘not where we’re supposed to be’ first appeared on Federal News Network.
http://news.poseidon-us.com/THP89z

Biden cyber EO seeks proof of security from software vendors

The new cybersecurity executive order seeks to put teeth behind the secure software development standards that federal vendors are supposed to be following. The post Biden cyber EO seeks proof of security from software vendors first appeared on Federal News Network.
http://news.poseidon-us.com/THP53B

This fast and agile robotic insect could someday aid in mechanical pollination

New insect-scale microrobots can fly more than 100 times longer than previous versions. The new bots, also significantly faster and more agile, could someday be used to pollinate fruits and vegetables.
http://news.poseidon-us.com/THP3S7

Immigration courts miss a crucial metric for tracking immigrants

A congressional audit found that the Justice Department, which operates immigration courts, lacks data on whether noncitizens have shown up for their hearings. The post Immigration courts miss a crucial metric for tracking immigrants first appeared on Federal News Network.
http://news.poseidon-us.com/THP1PX

Contrast Security AVM identifies application and API vulnerabilities in production

Contrast Security released Application Vulnerability Monitoring (AVM), a new capability of Application Detection and Response (ADR). AVM works within applications to find application and API vulnerabilities in production and correlate those vulnerabilities with attacks. Accurately identifying the issues in production with AVM results in lower overall cyber risk. Currently, companies are missing vulnerabilities in production because they are using traditional technologies like DAST, SCA, and SAST. AVM provides an alternative, allowing SecOps and DevOps teams … More → The post Contrast Security AVM identifies application and API vulnerabilities in production appeared first on Help Net Security.
http://news.poseidon-us.com/THP13m

Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them?

A threat actor has leaked configuration files (aka configs) for over 15,000 Fortinet Fortigate firewalls and associated admin and user credentials. The collection has been leaked on Monday and publicized on an underground forum by the threat actor that goes by “Belsen_Group”, supposedly as a free offering to solidify the name of the group in the forum users’ memory. The leaked 1.6 GB archive contains folders ordered by country, and inside each are folders named … More → The post Configuration files for 15,000 Fortinet firewalls leaked. Are yours among them? appeared first on Help Net Security.
http://news.poseidon-us.com/THP12R