433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

ISC Stormcast For Wednesday, November 16th, 2022 https://isc.sans.edu/podcastdetail.html?id=8260, (Wed, Nov 16th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/ScrJnv

Neobank Up eyes Slack canvas

Hopes to jump on the beta list.
http://news.poseidon-us.com/ScqZf5

Biden picks 233 civil service leaders for the 2022 Presidential Rank Awards

President Joe Biden picked 233 federal employees across 33 agencies as winners of the 2022 Presidential Rank Awards.
http://news.poseidon-us.com/ScqRsl

Meta’s new kill chain model tackles online threats

In April 2014, Lockheed Martin revolutionized the cyber defense business by publishing a seminal white paper Intelligence-Driven Computer Network Defense Informed by Analysis of Adversary Campaigns and Intrusion Kill Chains. This document sparked a new wave of thinking about digital adversaries, specifically, nation-state advanced persistent threat groups (APTs). The authors of the paper argued that by leveraging the knowledge of how these adversaries operate, cyber defenders “can create an intelligence feedback loop, enabling defenders to establish a state of information superiority which decreases the adversary’s likelihood of success with each subsequent intrusion attempt.” This so-called kill chain model could “describe phases of intrusions, mapping adversary kill chain indicators to defender courses of action, identifying patterns that link individual intrusions into broader campaigns, and understanding the iterative nature of intelligence gathering form the basis of intelligence-driven computer network defense.” To read this article in full, please click here
http://news.poseidon-us.com/ScpJcX

How China takes American know-how and technology right from under our noses

Scientists from China work on sensitive projects at the Los Alamos National Laboratory, then go back to help China with what they’ve learned.
http://news.poseidon-us.com/ScmSJW

The Air Force seeks a better approach to the thorny problem of software licensing

The Air Force tests airplanes before it buys them. Now it’s testing software programming tools before buying them.
http://news.poseidon-us.com/ScmJCB

Frost & Sullivan recognizes Resecurity as a leader in the cyber threat intelligence market

Resecurity announced that Frost & Sullivan recognized the company in its Global Threat Intelligence Platforms Market 2022 report. The Frost & Sullivan report details the organization’s market research, identifying trends in the market and top vendors and tools in the market. Inclusion in this report is a major milestone for Resecurity, as the recognition validates the company’s position as a top provider in the space. Frost & Sullivan specifically highlighted Resecurity’s HUNTER team that is … More → The post Frost & Sullivan recognizes Resecurity as a leader in the cyber threat intelligence market appeared first on Help Net Security.
http://news.poseidon-us.com/Scl1Ht