433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Security leaders relying more heavily on MSPs amid talent crunch

The cyber skills gap is driving a significant increase in reliance on external managed service providers, according to the Neustar International Security Council (NISC). 89% of security professionals participating in the survey, conducted in March 2022, said their organizations had somewhat (45%) or greatly (44%) increased their reliance on external providers due to the ongoing talent shortage. Survey participants were most likely to be currently seeking to hire individuals with cloud security skills (64%), followed … More → The post Security leaders relying more heavily on MSPs amid talent crunch appeared first on Help Net Security.
http://news.poseidon-us.com/SPRh1r

Security leaders relying more heavily on MSPs amid talent crunch

The cyber skills gap is driving a significant increase in reliance on external managed service providers, according to the Neustar International Security Council (NISC). 89% of security professionals participating in the survey, conducted in March 2022, said their organizations had somewhat (45%) or greatly (44%) increased their reliance on external providers due to the ongoing talent shortage. Survey participants were most likely to be currently seeking to hire individuals with cloud security skills (64%), followed … More → The post Security leaders relying more heavily on MSPs amid talent crunch appeared first on Help Net Security.
http://news.poseidon-us.com/SPRh1r

Security leaders relying more heavily on MSPs amid talent crunch

The cyber skills gap is driving a significant increase in reliance on external managed service providers, according to the Neustar International Security Council (NISC). 89% of security professionals participating in the survey, conducted in March 2022, said their organizations had somewhat (45%) or greatly (44%) increased their reliance on external providers due to the ongoing talent shortage. Survey participants were most likely to be currently seeking to hire individuals with cloud security skills (64%), followed … More → The post Security leaders relying more heavily on MSPs amid talent crunch appeared first on Help Net Security.
http://news.poseidon-us.com/SPRh1r

Security leaders relying more heavily on MSPs amid talent crunch

The cyber skills gap is driving a significant increase in reliance on external managed service providers, according to the Neustar International Security Council (NISC). 89% of security professionals participating in the survey, conducted in March 2022, said their organizations had somewhat (45%) or greatly (44%) increased their reliance on external providers due to the ongoing talent shortage. Survey participants were most likely to be currently seeking to hire individuals with cloud security skills (64%), followed … More → The post Security leaders relying more heavily on MSPs amid talent crunch appeared first on Help Net Security.
http://news.poseidon-us.com/SPRh1r

Security leaders relying more heavily on MSPs amid talent crunch

The cyber skills gap is driving a significant increase in reliance on external managed service providers, according to the Neustar International Security Council (NISC). 89% of security professionals participating in the survey, conducted in March 2022, said their organizations had somewhat (45%) or greatly (44%) increased their reliance on external providers due to the ongoing talent shortage. Survey participants were most likely to be currently seeking to hire individuals with cloud security skills (64%), followed … More → The post Security leaders relying more heavily on MSPs amid talent crunch appeared first on Help Net Security.
http://news.poseidon-us.com/SPRh1r

Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements

CYTRIO released findings from additional independent research it conducted during Q1 2022 on the state of companies’ readiness to comply with the California Consumer Privacy Act (CCPA), California Privacy Rights Act (CPRA), and the European Union’s General Data Protection Regulation (GDPR). As of March 31, 2022, the findings uncovered that 90% of companies are not fully compliant with CCPA and CPRA Data Subject Access Request (DSAR) requirements. Further, 95% of companies are using error prone … More → The post Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements appeared first on Help Net Security.
http://news.poseidon-us.com/SPRgRp

Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements

CYTRIO released findings from additional independent research it conducted during Q1 2022 on the state of companies’ readiness to comply with the California Consumer Privacy Act (CCPA), California Privacy Rights Act (CPRA), and the European Union’s General Data Protection Regulation (GDPR). As of March 31, 2022, the findings uncovered that 90% of companies are not fully compliant with CCPA and CPRA Data Subject Access Request (DSAR) requirements. Further, 95% of companies are using error prone … More → The post Companies poorly prepared to meet CCPA, CPRA and GDPR compliance requirements appeared first on Help Net Security.
http://news.poseidon-us.com/SPRgRp

Using Passive DNS sources for Reconnaissance and Enumeration, (Fri, Apr 29th)

In so many penetration tests or assessments, the client gives you a set of subnets and says “go for it”. This all seems reasonable, until you realize that if you have a website, there might be dozens or hundreds of websites hosted there, each only accessible by their DNS name.
http://news.poseidon-us.com/SPRd3n

Using Passive DNS sources for Reconnaissance and Enumeration, (Fri, Apr 29th)

In so many penetration tests or assessments, the client gives you a set of subnets and says “go for it”. This all seems reasonable, until you realize that if you have a website, there might be dozens or hundreds of websites hosted there, each only accessible by their DNS name.
http://news.poseidon-us.com/SPRd3n

Using Passive DNS sources for Reconnaissance and Enumeration, (Fri, Apr 29th)

In so many penetration tests or assessments, the client gives you a set of subnets and says “go for it”. This all seems reasonable, until you realize that if you have a website, there might be dozens or hundreds of websites hosted there, each only accessible by their DNS name.
http://news.poseidon-us.com/SPRd3n