433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Do Attackers Pay More Attention to IPv6?, (Sat, Jul 29th)

IPv6 has always been a hot topic! Available for years, many ISP's deployed IPv6 up to their residential customers. In Belgium, we were for a long time, the top-one country with IPv6 deployment because all big players provided IPv6 connectivity. In today's operating systems, IPv6 will be used first if your computer sees “RA” packets (for “router advertisement” [1]) and can get an IPv6 address. This will be totally transparent. That's why many people think that they don't use IPv6 but they do!
http://news.poseidon-us.com/Ssvz66

Bipartisan bill would bar agencies from denying job applicants over weed use

Agencies would also have to set up a process for reconsidering decisions that denied someone a job or clearance over weed use dating back to 2008.
http://news.poseidon-us.com/Sstdwg

Shaky tech talent market remains hungry for hires

The need for IT skills persists despite mixed signals emerging from the economy, leading executives to carry out response plans.
http://news.poseidon-us.com/Sstblf

Respect the Founders’ wishes: Honor National Whistleblower Day

National Whistleblower Day must be honored across the United States. It is important to step back and remember what whistleblowers have achieved and how they have served the public interest year after year.
http://news.poseidon-us.com/SstZD6

New infosec products of the week: July 28, 2023

Here’s a look at the most interesting products from the past week, featuring releases from BreachRx, Darktrace, Dig Security, Panorays, and SeeMetrics. Panorays unveils cybersecurity enhancements for supply chains Panorays announced two capabilities – Supply Chain Discovery and Risk Insights and Response Portal. These new additions empower organizations to gain comprehensive visibility into their digital supply chains and effectively manage potential cybersecurity risks posed by third, fourth, and Nth party vendors. SeeMetrics Security Performance Boards … More → The post New infosec products of the week: July 28, 2023 appeared first on Help Net Security.
http://news.poseidon-us.com/SsrYgf

CISOs consider zero trust a hot security ticket

The majority of organizations are on the road to implementing a zero trust framework to increase their overall security risk posture, according to PlainID. However, only 50% said that authorization makes up their zero trust program – potentially exposing their infrastructure to threat actors. Zero trust framework challenges Historically, a zero trust framework was focused on solving the challenges associated with authentication, end point and network access security. However, identity related breaches have increased exponentially, … More → The post CISOs consider zero trust a hot security ticket appeared first on Help Net Security.
http://news.poseidon-us.com/SsrPNc

European Commission Investigating Teams Bundling in Microsoft 365 as Unfair Competition

The European Union’s European Commission announced on Thursday that it has opened an investigation into Microsoft’s bundling of Teams in its productivity suite offerings as a possible violation of competition rules.
http://news.poseidon-us.com/SsqrJ7

AWS builds out generative AI marketplace, adds 4 foundational models

The hyperscaler, growing a nascent generative AI marketplace through Bedrock, now features models from Anthropic, Stability AI and Cohere.
http://news.poseidon-us.com/SsqpRX

Key factors for effective security automation

Harnessing the potential of automation in cybersecurity is key to maintaining a robust defense against ever-evolving threats. Still, this approach comes with its own unique challenges. In this Help Net Security interview, Oliver Rochford, Chief Futurist at Tenzir, discusses how automation can be strategically integrated with human expertise, the challenges in ensuring data integrity, and the considerations when automating advanced tasks. Because human intelligence is still crucial in cybersecurity, how can automation be used strategically … More → The post Key factors for effective security automation appeared first on Help Net Security.
http://news.poseidon-us.com/Ssngtl