433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Culture, technical barriers hinder IT asset management

Despite a plethora of tools and best practices, many organizations still fail to properly track, budget and account for technology. 
http://news.poseidon-us.com/SKbkml

Implementing effective ways to exchange sensitive information using encryption

Digital communication, whether it is by email, phone call, SMS or video, is part of every organization’s business process, and as such requires encryption to stay secure. It’s not essential just for the sake of protecting shared data, but also because of the many data privacy regualtions organizations must adhere to. In this interview with Help Net Security, Chris Peel, VP Customer Engineering at Echoworx, who works with customers to define, develop and deliver secure … More → The post Implementing effective ways to exchange sensitive information using encryption appeared first on Help Net Security.
http://news.poseidon-us.com/SKYhjb

Implementing effective ways to exchange sensitive information using encryption

Digital communication, whether it is by email, phone call, SMS or video, is part of every organization’s business process, and as such requires encryption to stay secure. It’s not essential just for the sake of protecting shared data, but also because of the many data privacy regualtions organizations must adhere to. In this interview with Help Net Security, Chris Peel, VP Customer Engineering at Echoworx, who works with customers to define, develop and deliver secure … More → The post Implementing effective ways to exchange sensitive information using encryption appeared first on Help Net Security.
http://news.poseidon-us.com/SKYhjb

Implementing effective ways to exchange sensitive information using encryption

Digital communication, whether it is by email, phone call, SMS or video, is part of every organization’s business process, and as such requires encryption to stay secure. It’s not essential just for the sake of protecting shared data, but also because of the many data privacy regualtions organizations must adhere to. In this interview with Help Net Security, Chris Peel, VP Customer Engineering at Echoworx, who works with customers to define, develop and deliver secure … More → The post Implementing effective ways to exchange sensitive information using encryption appeared first on Help Net Security.
http://news.poseidon-us.com/SKYhjb

Implementing effective ways to exchange sensitive information using encryption

Digital communication, whether it is by email, phone call, SMS or video, is part of every organization’s business process, and as such requires encryption to stay secure. It’s not essential just for the sake of protecting shared data, but also because of the many data privacy regualtions organizations must adhere to. In this interview with Help Net Security, Chris Peel, VP Customer Engineering at Echoworx, who works with customers to define, develop and deliver secure … More → The post Implementing effective ways to exchange sensitive information using encryption appeared first on Help Net Security.
http://news.poseidon-us.com/SKYhjb

Redstor launches a service for IT service providers to protect Kubernetes environments in AWS

Redstor launched a new service aimed at transforming how managed and cloud service providers (MSPs and CSPs) protect Kubernetes environments in AWS. By adding support for Amazon Elastic Kubernetes (Amazon EKS), a managed container service for handling applications in the cloud or on-premise, Redstor partners can eliminate complex scripting and scale customer backups simply and rapidly. Redstor’s smart data management platform allows IT administrators of all levels – not just Kubernetes experts – to protect … More → The post Redstor launches a service for IT service providers to protect Kubernetes environments in AWS appeared first on Help Net Security.
http://news.poseidon-us.com/SKXxMK

Redstor launches a service for IT service providers to protect Kubernetes environments in AWS

Redstor launched a new service aimed at transforming how managed and cloud service providers (MSPs and CSPs) protect Kubernetes environments in AWS. By adding support for Amazon Elastic Kubernetes (Amazon EKS), a managed container service for handling applications in the cloud or on-premise, Redstor partners can eliminate complex scripting and scale customer backups simply and rapidly. Redstor’s smart data management platform allows IT administrators of all levels – not just Kubernetes experts – to protect … More → The post Redstor launches a service for IT service providers to protect Kubernetes environments in AWS appeared first on Help Net Security.
http://news.poseidon-us.com/SKXxMK

U.S. may have allowed ‘known or suspected terrorists’ to go undetected among resettled Afghan evacuees

Missing Afghan evacuees could pose a national security threat, according to an audit.
http://news.poseidon-us.com/SKXVC6