433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Secrets to Keeping Your Multi-Cloud Environments Secure

The cloud is a lot of good things, but one thing it definitely isn’t is ransomware-proof. Don’t leave the safety of your cloud data up to chance. Read this Digital Dialogue to learn the biggest mistakes development teams make when they’re first building their applications, why cloud-native security needs a fresh approach, the top six threats to a cloud environment (hint: they’re all coming from inside the house), and more.
http://news.poseidon-us.com/SBMFLK

Cheap and free cybersecurity training: 8 ways to build skills without breaking the bank

Every organization wants to keep its employees’ cybersecurity skills up to date, but for many, the cost of advanced formal trainings can break the budget. At the SANS Institute, for instance, considered by many to be the gold standard for professional trainings, courses can cost more than $5,000 per person. At high profile conferences like Black Hat, even one- or two-day sessions can range to close to $4,000. But those aren’t the only options out there. In fact, experts say, there are plenty of high-quality ways to boost security skills without breaking the bank. Their suggestions fell into two broad categories: making use of your own internal resources to ensure that cybersecurity knowledge is shared throughout your organization and finding low-cost external resources, either in addition to or as part of your internal efforts. To read this article in full, please click here
http://news.poseidon-us.com/SBLmzP

5 ways to maximize the value of data analytics

It’s one thing to gather large amounts of data and apply analytics to it; lots of organizations are doing that. It’s another thing entirely to gain optimum business value from that data and analysis. To read this article in full, please click here(Insider Story)
http://news.poseidon-us.com/SBJnLH

Microsoft Points to Inadequate Service Provider Protections Against Nobelium Attacks

Microsoft on Monday highlighted delegated administrative privileges with service providers as being a major organizational security hole that’s being targeted by the “Nobelium” advanced persistent threat (ATP) group.
http://news.poseidon-us.com/SBHfXZ

Scale Computing partners with Acronis to deliver Business Resilience System for MSPs

Scale Computing and Acronis jointly announce the availability of Business Resilience System (BRS) for MSPs, purpose built for Acronis Cyber Protect Cloud – an easily scalable Business Resilience appliance that allows for instant recovery of all critical workloads in an environment, regardless of where those workloads are running. This hybrid cloud platform delivers MSPs everything they need to ensure clients avoid downtime, lost revenue, and fallout from cyber attacks. Tightly integrated with Acronis Cyber Protect … More → The post Scale Computing partners with Acronis to deliver Business Resilience System for MSPs appeared first on Help Net Security.
http://news.poseidon-us.com/SBHdPD

Scale Computing partners with Acronis to deliver Business Resilience System for MSPs

Scale Computing and Acronis jointly announce the availability of Business Resilience System (BRS) for MSPs, purpose built for Acronis Cyber Protect Cloud – an easily scalable Business Resilience appliance that allows for instant recovery of all critical workloads in an environment, regardless of where those workloads are running. This hybrid cloud platform delivers MSPs everything they need to ensure clients avoid downtime, lost revenue, and fallout from cyber attacks. Tightly integrated with Acronis Cyber Protect … More → The post Scale Computing partners with Acronis to deliver Business Resilience System for MSPs appeared first on Help Net Security.
http://news.poseidon-us.com/SBHdPD

Conti Ransom Gang Starts Selling Access to Victims

The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim shaming blog, where confidential files stolen from victims may be published or sold. But sometime over the past 48 hours, the cybercriminal syndicate updated its victim shaming blog to indicate that it is now selling access to many of the organizations it has hacked.
http://news.poseidon-us.com/SBH8Xl

Conti Ransom Gang Starts Selling Access to Victims

The Conti ransomware affiliate program appears to have altered its business plan recently. Organizations infected with Conti’s malware who refuse to negotiate a ransom payment are added to Conti’s victim shaming blog, where confidential files stolen from victims may be published or sold. But sometime over the past 48 hours, the cybercriminal syndicate updated its victim shaming blog to indicate that it is now selling access to many of the organizations it has hacked.
http://news.poseidon-us.com/SBH8Xl

Checking in on the year-end checklist, and it’s not pretty

No, there hasn’t been much progress on several pressing issues, including a need to secure full-year agency funding and avert (another) government shutdown, a deal with the debt ceiling (again) and a whole host of other legislative work.
http://news.poseidon-us.com/SBF4F5