433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

RSA expands phishing-resistant, passwordless capabilities

RSA announced expanded phishing-resistant, passwordless capabilities. Built to secure financial services organizations, government agencies, healthcare, and other highly-regulated industries from the most frequent and highest-impact attacks, these new RSA capabilities meet the most stringent cybersecurity regulations and are a key asset in developing a Zero Trust security architecture: The FIDO2 Certified RSA Authenticator App 4.5 for iOS and Android: RSA now makes it easy to deploy FIDO2-Certified device-bound passkeys on users’ mobile devices through RSA … More → The post RSA expands phishing-resistant, passwordless capabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TGh0h2

Hornetsecurity boosts 365 Total Backup with self-service recovery for end users

Hornetsecurity unveiled an upgraded version of its 365 Total Backup solution, introducing self-service recovery for end users while also offering full backup and recovery support for Microsoft OneNote. This new functionality is also available with 365 Total Protection Plans 3 and 4. Enabling end users to independently recover their own data Hornetsecurity has added a new self-service functionality to its backup solution. This allows end users to independently recover their mailbox, OneDrive and OneNote data … More → The post Hornetsecurity boosts 365 Total Backup with self-service recovery for end users appeared first on Help Net Security.
http://news.poseidon-us.com/TGh0h0

Extreme Platform ONE integrates networking and security with AI

Extreme Networks unveiled Extreme Platform ONE, a technology platform that reduces the complexity for enterprises by seamlessly integrating networking, security and AI solutions. The platform’s AI-powered automation includes conversational, interactive and autonomous AI agents—to assist, advise and accelerate the productivity of networking, security and business teams—effectively reducing the time to complete complex tasks from hours to minutes. Extreme Platform ONE also offers the industry’s simplest licensing. “Today, IT leaders face mounting challenges — balancing increasing … More → The post Extreme Platform ONE integrates networking and security with AI appeared first on Help Net Security.
http://news.poseidon-us.com/TGh0gR

8Base hacked port operating company Luka Rijeka

Luka Rijeka, a company that offers maritime transport, port, storage of goods and forwarding services in Rijeka, Croatia, has been hacked by the 8Base ransomware group. According to HackManac, the group claimed the attack on their dark web data leak site and professed that they’ve managed to grab the company’s invoices, receipts, employment contracts, personal data and files, accounting documents, and “a huge amount of confidential information”. If the company does not pay the ransom, … More → The post 8Base hacked port operating company Luka Rijeka appeared first on Help Net Security.
http://news.poseidon-us.com/TGh0fC

New defense civilian workforce pipeline in the works, starting with 4 universities

The department is using the new Defense Civilian Training Corps to build its acquisition workforce, with hopes to expand the program to other disciplines soon. The post New defense civilian workforce pipeline in the works, starting with 4 universities first appeared on Federal News Network.
http://news.poseidon-us.com/TGgxTN

New defense civilian workforce pipeline in the works, starting with 4 universities

The department is using the new Defense Civilian Training Corps to build its acquisition workforce, with hopes to expand the program to other disciplines soon. The post New defense civilian workforce pipeline in the works, starting with 4 universities first appeared on Federal News Network.
http://news.poseidon-us.com/TGgxRf

AI spending to grow faster than IT budgets next year, executives say

“Enterprises are continuing to focus on cost optimization and efficiency programs to fund transformation and customer experience enabled by AI,” ISG’s Michael Dornan said.
http://news.poseidon-us.com/TGgsKY

TPM 2.0: The new standard for secure firmware

Connected devices are better protected from cyberattacks and less likely to be compromised by errors thanks to the new TPM 2.0 specification from the Trusted Computing Group (TCG). Manufacturers attach a Trusted Platform Module (TPM) to a device to help users and administrators authenticate its identity, to generate and store encryption keys, and to ensure platform integrity. Before the TPM specification was updated, users and administrators could only assume the TPM was working correctly because … More → The post TPM 2.0: The new standard for secure firmware appeared first on Help Net Security.
http://news.poseidon-us.com/TGggx6

Who handles what? Common misconceptions about SaaS security responsibilities

In this Help Net Security interview, James Dolph, CISO at Guidewire, addresses common misconceptions about security responsibilities in cloud environments, particularly in SaaS, and how these misunderstandings can lead to security risks. What common misconceptions do you encounter about the distribution of responsibilities in a cloud environment, and how do these misunderstandings increase security risks? SaaS providers and their customers both care deeply about security, compliance, and meeting global regulations. However, SaaS is still relatively … More → The post Who handles what? Common misconceptions about SaaS security responsibilities appeared first on Help Net Security.
http://news.poseidon-us.com/TGgYmx