433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Army preparing to take zero trust to tactical edge

Col. Michael Smith, the director of the Army’s functional management office for zero trust and director of the unified network task force, said an ongoing gap analysis will look at weapons systems and control systems to see where zero trust capabilities can fit in.
http://news.poseidon-us.com/SvM0j6

Google Cloud unveils new TPUs in race to optimize AI hardware

The new generation chips are optimized to handle the growing volume of generative AI model training and inference workloads.
http://news.poseidon-us.com/SvLww9

Survival time for web sites, (Tue, Aug 29th)

Many, many years ago we (SANS Internet Storm Center) published some interesting research about survival time of new machines connected to the Internet. Back then, when Windows XP was the most popular operating system, it was enough to connect your new machine to the Internet and get compromised before you managed to download and install patches. Microsoft changed this with Windows XP SP2, which introduced the host based firewall that was (finally) enabled by default, so a new user had a better chance of surviving the Internet.
http://news.poseidon-us.com/SvKJjH

DoD looks to AI to widen its catalog of cyber training providers

A new approach to accrediting cyber training providers will automate parts of the process — hopefully leading to a dramatic increase in the number of certification courses available to DoD personnel and contractors.
http://news.poseidon-us.com/SvJLvZ

DoD looks to AI to widen its catalog of cyber training providers

A new approach to accrediting cyber training providers will automate parts of the process — hopefully leading to a dramatic increase in the number of certification courses available to DoD personnel and contractors.
http://news.poseidon-us.com/SvJLtm

DoD looks to AI to widen its catalog of cyber training providers

A new approach to accrediting cyber training providers will automate parts of the process — hopefully leading to a dramatic increase in the number of certification courses available to DoD personnel and contractors.
http://news.poseidon-us.com/SvJLr2

GM to close IT innovation center in Arizona, cut staff

The closure will impact more than 900 General Motors employees as the company works to align its footprint and IT resources in the U.S.
http://news.poseidon-us.com/SvJDlj

Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE

Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: Network detection and response in the modern era In this Help Net Security interview, David Gugelmann, CEO at Exeon, sheds light on the current cyber threats and their challenges for network security. He discusses the role of Network Detection and Response (NDR) solutions that leverage machine learning algorithms to improve threat detection and streamline incident response. Lazarus Group exploited ManageEngine … More → The post Week in review: Security Onion 2.4 released, WinRAR vulnerable to RCE appeared first on Help Net Security.
http://news.poseidon-us.com/SvDhV5

macOS: Who?s Behind This Network Connection?, (Sat, Aug 26th)

When you must investigate suspicious behavior or work on an actual incident, you could be asked to determine who&#x27s behind a network connection. From a pure network point of view, your firewall or any network security control device/app will tell you that the source is the connection is host « A », « B » or « C ». But investigating further how to discover who or which process is the source of the connection (now, at the operating system level).
http://news.poseidon-us.com/SvC6yy

Unraveling complex systems: The backtracking method

Scientists have developed a new method to analyze the dynamical, out-of-equilibrium properties of complex disordered systems, such as gold with magnetic impurities or opinions spreading on social media.
http://news.poseidon-us.com/SvBLgp