433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Strata Identity names Chris Veith as Senior Director of Global Alliances

Chris Veith joins Strata from Okta and, as Senior Director of Global Alliances, will lead the company’s global systems integrator (GSI) partner program. He will manage Strata’s relationships with GSIs, including EY, Deloitte, and Wipro, who serve as trusted partners for Digital Transformation programs in the Global 2000 market. “Global systems integrators are an integral part of our go-to-market strategy, given their ability to accelerate time to value for large enterprises they support,” said Eric … More → The post Strata Identity names Chris Veith as Senior Director of Global Alliances appeared first on Help Net Security.
http://news.poseidon-us.com/SZlZXG

BrandPost: Why a Risk-Based Cybersecurity Strategy is the Way to Go

Business leaders spend most of their time conducting risk/reward analyses of virtually every decision they make. Will expanding the sales staff generate enough profit to more than pay for the added costs? Can our new product launch hit the market before the competitors shift their own strategies? Do we know enough about the geopolitical climate in a new market to justify the added costs and hassles in compliance and governance? Cybersecurity is another critical area where risk must be constantly assessed.  The risk of unanticipated service interruptions—not to mention the many direct and indirect costs of data loss—is substantial. Virtually everything an organization does today—from billing customers and creating marketing programs to answering police calls and ensuring the cleanliness of waterways—is digitized. Add in the new reality of entirely new classes of digital endpoints and you can see that hackers have more opportunity than ever to wreak havoc. To read this article in full, please click here
http://news.poseidon-us.com/SZh20j

Celebrating Hispanic Heritage

This Hispanic Heritage Month, FEDtalk is recognizing efforts to increase Hispanic/Latino representation in government and government efforts to elevate Hispanic/Latino stories to the public.
http://news.poseidon-us.com/SZgplp

Army may have cracked the code on BYOD: 20,000 devices coming online next week

The biggest-yet phase of the bring-your-own-device pilot will help the Army figure out how to scale the technology across a diverse population of users in the active and reserve components — and part of the Air Force too.
http://news.poseidon-us.com/SZgdmN

Dashlane launches new Dark Web Insights tool, MFA authenticator app, small biz Starter plan

Password manager vendor Dashlane has announced updates to its suite of enterprise offerings. These include a new Dark Web Insights tool that provides a breakdown of compromised passwords, a standalone authenticator app for enabling account multi-factor authentication (MFA), and a low-cost starter plan for small businesses. The firm has also introduced new live phone support service whereby users can request and book a call directly with Dashlane’s support team. Breached employee credentials on dark web pose significant threat to businesses In a press release, Dashlane stated that its new Dark Web Insights tool “continuously scans” more than 20 billion records attached to hacks or data breaches on the dark web, providing users with a bespoke breakdown of compromised passwords across their organization. Dark Web Insights also provides admins the ability to scan their organization for incidences of breached credentials and invite non-Dashlane using, breached employees to begin using Dashlane through built-in seat provisioning. The firm said that, by pairing this alert function with the ability to generate new, random, and unique passwords, admins can take action quickly once alerted about compromised credentials. To read this article in full, please click here
http://news.poseidon-us.com/SZcMTf

New hires won’t fix the AI skills gap

With internal training strategies, companies can meet highly sought-after talent needs while making use of employees’ business expertise.
http://news.poseidon-us.com/SZc93W

5 reasons why security operations are getting harder

Recent ESG research reveals that 52% of security professionals believe security operations are more difficult today than they were two years ago. Why? Security operations center (SOC) teams point to issues such as: * A rapidly evolving and changing threat landscape: Forty-one percent of security professionals find it difficult to understand and counteract modern threats like ransomware or supply chain attacks and then build this knowledge into a comprehensive security operations program. Most react to threats and indicators of compromise (IoCs) rather than study cyber-adversaries and plan ahead. * A growing attack surface: This issue came up with 39% of respondents, but attack surface challenges are no surprise. Other ESG research indicates that the attack surface is growing at two-thirds (67%) of organizations, driven by third-party IT connections, support for remote workers, increased public cloud usage, and adoption of SaaS applications. A growing attack surface means more work, vulnerabilities, and blind spots for SOC teams. Little wonder then why 69% of organizations admit to a cyber-incident emanating from an unknown, unmanaged, or poorly managed internet-facing asset. * The volume and complexity of security alerts: We’ve all heard about “alert storms” and “alert fatigue.” Based on the ESG data, these conditions aren’t just marketing hype, as 37% of SOC teams say that alert volume and complexity is making security operations more difficult. It’s easy to understand this one: Imagine viewing, triaging, prioritizing, and investigating a constant barrage of amorphous security alerts from a variety of different detection tools and you’ll get the picture. Seems overwhelming but that’s the reality for level 1 SOC analysts at many organizations. * Public cloud usage: Beyond just expanding the attack surface, more than one-third (34%) say that security operations are more difficult as a direct result of growing use of the public cloud. This is not just a numbers game. Securing cloud workloads is difficult due to multi-cloud deployment, ephemeral cloud instances, and developer use of new cloud services that security teams may be unfamiliar with. Chasing cloud evolution and associated software developer whims has become part of the job. * Keeping up with the care and feeding of security technologies: More than half (54%) of organizations use more than 26 different commercial, homegrown, or open-source tools for security operations. The burden of managing and maintaining all these disparate technologies alone can be difficult. This is one reason why many firms are replacing on-site security tools with cloud-based alternatives. Growing scale complicates security operations In analyzing this data, it’s easy to see a common theme across these different responses – scale. Everything is growing – threats, IT, alerts, tools, everything. The research illustrates the fact that we don’t have the people, processes, or technologies to keep up with these scaling needs. To read this article in full, please click here
http://news.poseidon-us.com/SZbthH