433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Top cybersecurity books for your holiday gift list

The holiday season is approaching, and with it, the tradition of gift-giving. For professionals and enthusiasts alike, a well-chosen book can provide both knowledge and inspiration. To help with ideas on what to give, we’ve compiled a list of cybersecurity books to consider. Security Yearbook 2024: A History and Directory of the IT Security Industry Author: Richard Stiennon In the book, you’ll find a comprehensive directory of cybersecurity vendors, updated for 2024, complete with headquarters … More → The post Top cybersecurity books for your holiday gift list appeared first on Help Net Security.
http://news.poseidon-us.com/TGgYlh

Proactive Defense for Critical Infrastructure: OPSWAT

As cyber threats grow more sophisticated, OPSWAT leads the charge in safeguarding critical infrastructure with a prevention-first approach, securing industries vital to society through innovative technologies like its MetaDefender platform.
http://news.poseidon-us.com/TGgYSd

Businesses plagued by constant stream of malicious emails

36.9% of all emails received by businesses (20.5 billion) in 2024 were unwanted, according to Hornetsecurity’s analysis of 55.6+ billion emails processed through their security services between November 1, 2023 and October 31, 2024 – and 2.3% of those contained malicious content, totalling 427.8 million emails. Once again, phishing remains the most prevalent form of attack, responsible for a third of all cyber-attacks in 2024. This was confirmed by the analysis of 55.6 billion emails, … More → The post Businesses plagued by constant stream of malicious emails appeared first on Help Net Security.
http://news.poseidon-us.com/TGgWzS

ISC Stormcast For Monday, December 9th, 2024 https://isc.sans.edu/podcastdetail/9246, (Mon, Dec 9th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TGgVpH

CURLing for Crypto on Honeypots, (Mon, Dec 9th)

I get a daily report from my honeypots for Cowrie activity [1], which includes telnet and SSH sessions attempted on the honyepot. One indicator I use to find sessions of interest is the number of commands run. Most of the time there are about 20 commands run per session, but a session with over 1,000 commands run in a session is unexpected.
http://news.poseidon-us.com/TGgTHh

In Pictures: iTnews and IBM Sydney social event

iTnews and IBM recently hosted a networking event in Sydney solving the chaos of connectivity and bridging the future of integration.
http://news.poseidon-us.com/TGgRZ2

Versent Achieves the AWS Digital Sovereignty Competency

Recognised for expertise in secure and resilient cloud solutions, Versent empowers customers to meet digital sovereignty requirements using AWS technology.
http://news.poseidon-us.com/TGgPHc