433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Cyware completes SOC 2 Type 2 Compliance for data security

Cyware announces the successful completion of the System and Organization Controls (SOC) 2 Type 2 Audit for the trust services criteria relevant to Security (“applicable trust services criteria”) set forth in TSP section 100, Trust Services Criteria for Security, Availability, Processing Integrity, Confidentiality, and Privacy (AICPA, Trust Services Criteria). The achievement highlights the company’s commitment to the highest levels of data security. SOC 2 is a reporting framework created by the American Institute of Certified … More → The post Cyware completes SOC 2 Type 2 Compliance for data security appeared first on Help Net Security.
http://news.poseidon-us.com/SSrN9v

Zero Trust Cyber Exchange: Service mesh plays integral role in zero trust runtime security

There are certain strategies, features and frameworks that agencies can adopt that will get them closer to zero trust. One of the most effective is the service mesh architecture.
http://news.poseidon-us.com/SSp05Z

USPS hiring strategy helped reduce overtime last holiday season, IG finds

The Postal Service’s workforce and facility strategy to prepare for last year’s peak holiday operations led to higher performance and less overtime.
http://news.poseidon-us.com/SSny9G

Senator wants former and possibly current marijuana use to not count against clearance-seekers

In today’s Federal Newscast, new legislation would make it easier for security clearance applicants to overcome a history of using marijuana.
http://news.poseidon-us.com/SSn4m6

5 social engineering assumptions that are wrong

Social engineering is involved in the vast majority of cyberattacks, but a new report from Proofpoint has revealed five common social engineering assumptions that are not only wrong but are repeatedly subverted by malicious actors in their attacks. Commenting on the report’s findings, Sherrod DeGrippo, Proofpoint’s vice president threat research and detection, stated that the vendor has attempted to debunk faulty assumptions made by organizations and security teams so they can better protect employees against cybercrime. “Despite defenders’ best efforts, cybercriminals continue to defraud, extort and ransom companies for billions of dollars annually. Security-focused decision makers have prioritized bolstering defenses around physical and cloud-based infrastructure, which has led to human beings becoming the most relied upon entry point for compromise. As a result, a wide array of content and techniques continue to be developed to exploit human behaviors and interests.” To read this article in full, please click here
http://news.poseidon-us.com/SSmSb9

Modeling a devastating childhood disease on a chip

Millions of children globally suffer from environmental enteric dysfunction (EED), a chronic inflammatory disease of the intestine that causes malnutrition and stunts their growth. A new Organ Chip models this devastating disease in living human tissue for the first time in vitro. This EED Chip allowed researchers to tease out the complex interplay of genetics and nutrition underpinning the disease, and offers clues for the development of future treatments.
http://news.poseidon-us.com/SSjqLN

VA confidence in new EHR ‘shaken’ following cases of patient harm, McDonough says

The Department of Veterans Affairs, Congress and the vendors behind the VA’s new Electronic Health Record are renewing their scrutiny of the EHR rollout.
http://news.poseidon-us.com/SSjcxt