433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Through T-REX, DoD seeks to fill technology gaps

Lt. Col. Matt Limeberry, the commander of the RAPTR Task Force in DoD’s research and engineering office, said testing emerging IT tools helps buy down risk. The post Through T-REX, DoD seeks to fill technology gaps first appeared on Federal News Network.
http://news.poseidon-us.com/TMpgV0

Through T-REX, DoD seeks to fill technology gaps

Lt. Col. Matt Limeberry, the commander of the RAPTR Task Force in DoD’s research and engineering office, said testing emerging IT tools helps buy down risk. The post Through T-REX, DoD seeks to fill technology gaps first appeared on Federal News Network.
http://news.poseidon-us.com/TMpgSC

Through T-REX, DoD seeks to fill technology gaps

Lt. Col. Matt Limeberry, the commander of the RAPTR Task Force in DoD’s research and engineering office, said testing emerging IT tools helps buy down risk. The post Through T-REX, DoD seeks to fill technology gaps first appeared on Federal News Network.
http://news.poseidon-us.com/TMpgQ3

Government shutdown looms as Congress returns after monthlong August recess

The annual spending battle will dominate September’s agenda, with conversations among Republicans about changing the chamber’s rules to stop stalling tactics. The post Government shutdown looms as Congress returns after monthlong August recess first appeared on Federal News Network.
http://news.poseidon-us.com/TMpYnP

KillChainGraph: Researchers test machine learning framework for mapping attacker behavior

A team of researchers from Frondeur Labs, DistributedApps.ai, and OWASP has developed a new machine learning framework designed to help defenders anticipate attacker behavior across the stages of the Cyber Kill Chain. The work explores how machine learning models can forecast adversary techniques and generate structured attack paths. Combining ATT&CK with the kill chain The Cyber Kill Chain, introduced by Lockheed Martin, breaks down attacks into seven stages: reconnaissance, weaponization, delivery, exploitation, installation, command and … More → The post KillChainGraph: Researchers test machine learning framework for mapping attacker behavior appeared first on Help Net Security.
http://news.poseidon-us.com/TMp4Rh

AIDEFEND: Free AI defense framework

AIDEFEND (Artificial Intelligence Defense Framework) is an open knowledge base dedicated to AI security, providing defensive countermeasures and best practices to help security pros safeguard AI and machine learning systems. Practicality is at the core of AIDEFEND. The framework is designed to be “highly actionable,” with the goal of not only raising awareness of threats but also providing clear playbooks to defend against them. “Each technique and subtechnique is mapped to concrete threats cataloged in … More → The post AIDEFEND: Free AI defense framework appeared first on Help Net Security.
http://news.poseidon-us.com/TMnyyl

Boards are being told to rethink their role in cybersecurity

Boards of directors are being told that cybersecurity is now central to business resilience and growth, and that they must engage more directly in the way their organizations manage risk. A new report from Google Cloud’s Office of the CISO lays out three areas where board oversight is becoming especially important: ransomware, cyber-enabled fraud, and the intersection of innovation and cybersecurity. Ransomware is shifting to identity and help desks The report describes how ransomware attacks … More → The post Boards are being told to rethink their role in cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TMnyy5

Cybersecurity signals: Connecting controls and incident outcomes

There is constant pressure on security leaders to decide which controls deserve the most attention and budget. A new study offers evidence on which measures are most closely linked to lower breach risk and how organizations should think about deploying them. Marsh McLennan’s Cyber Risk Intelligence Center (CRIC) analyzed thousands of organizations’ responses to its Cyber Self-Assessment and compared them with claims data. The findings highlight which controls matter most for lowering breach likelihood. Incident … More → The post Cybersecurity signals: Connecting controls and incident outcomes appeared first on Help Net Security.
http://news.poseidon-us.com/TMnxLW