433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

As CIOs tighten tech spend, demand for cybersecurity services grows

Managed service providers can help fill talent needs and tame costs, but that strategy may require additional risk mitigation.
http://news.poseidon-us.com/SdTxB8

Week in review: 5 free CISA resources, surviving a DDoS attack, Google to make Cobalt Strike useless

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Google seeks to make Cobalt Strike useless to attackers Google Cloud’s intelligence research and applications team has created and released a collection of 165 YARA rules to help defenders flag Cobalt Strike components deployed by attackers. Fake subscription invoices lead to corporate data theft and extortion A threat actor dubbed Luna Moth has been leveraging social engineering and legitimate software … More → The post Week in review: 5 free CISA resources, surviving a DDoS attack, Google to make Cobalt Strike useless appeared first on Help Net Security.
http://news.poseidon-us.com/SdRLSq

New infosec products of the week: November 25, 2022

Here’s a look at the most interesting products from the past week, featuring releases from Solvo, Sonrai Security, and Spring Labs. Sonrai Risk Insights Engine empowers security teams to reduce impact of exploits Sonrai Security releases Risk Insights Engine which lets developer and security teams control the chaos in both their organizations and their multicloud environments, minimizing lateral movement that leads to data theft. The platform recommends goals based on multiple factors, including the intended … More → The post New infosec products of the week: November 25, 2022 appeared first on Help Net Security.
http://news.poseidon-us.com/SdLBR5

Introducing the book: The Security Analyst’s Guide to Suricata

In this Help Net Security video interview, Eric Leblond, CTO at Stamus Networks, talks about The Security Analyst’s Guide to Suricata, a book he co-wrote with Peter Manev. Key fast facts that can be learned from their work: How Suricata can be leveraged to provide deep insights into Windows host activities without agents or access to the logs How to leverage modern Suricata to go beyond signature-based threat detection to simultaneously produce protocol and file … More → The post Introducing the book: The Security Analyst’s Guide to Suricata appeared first on Help Net Security.
http://news.poseidon-us.com/SdL1Zl