433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (727) 493-2351

How the Air Force manages risk in its supply chains

When a part is needed for a plane in the Air Force, it usually comes through the 448th Supply Chain Wing in the Air Force Sustainment Center. Ensuring that all those parts get to their destinations, and that they are not tampered with or sabotaged, calls for a good deal of risk management.
http://news.poseidon-us.com/SBQJyX

How the Air Force manages risk in its supply chains

When a part is needed for a plane in the Air Force, it usually comes through the 448th Supply Chain Wing in the Air Force Sustainment Center. Ensuring that all those parts get to their destinations, and that they are not tampered with or sabotaged, calls for a good deal of risk management.
http://news.poseidon-us.com/SBQJyX

Evaluating technical architecture: 11 key criteria and how to apply them

Technical architecture provides a way to describe, evaluate, and plan the evolution of the information technology that IT manages and the enterprise relies on. To read this article in full, please click here(Insider Story)
http://news.poseidon-us.com/SBNLLB

RBA finds its next CIO

Promotes its deputy head of IT.
http://news.poseidon-us.com/SBMQVV

Movandi upgrades features for BeamXR-powered smart repeaters to accelerate mmWave coverage

Movandi announced new features and capabilities to Movandi BeamXR-powered smart repeaters. The upgrades build upon Movandi’s second generation 5G RF-to-antenna BeamX technology. These new capabilities accelerate and reduce the costs of 5G mmWave deployments. New, upgraded features and capabilities for Movandi BeamXR-powered smart repeaters include expanded mmWave spectrum, sub-6 modules, new mesh indoor and outdoor software and cloud intelligence and outdoor solar powered smart repeater support – a key requirement to reduce 5G deployment costs. … More → The post Movandi upgrades features for BeamXR-powered smart repeaters to accelerate mmWave coverage appeared first on Help Net Security.
http://news.poseidon-us.com/SBMGHF

Secrets to Keeping Your Multi-Cloud Environments Secure

The cloud is a lot of good things, but one thing it definitely isn’t is ransomware-proof. Don’t leave the safety of your cloud data up to chance. Read this Digital Dialogue to learn the biggest mistakes development teams make when they’re first building their applications, why cloud-native security needs a fresh approach, the top six threats to a cloud environment (hint: they’re all coming from inside the house), and more.
http://news.poseidon-us.com/SBMFLK

Cheap and free cybersecurity training: 8 ways to build skills without breaking the bank

Every organization wants to keep its employees’ cybersecurity skills up to date, but for many, the cost of advanced formal trainings can break the budget. At the SANS Institute, for instance, considered by many to be the gold standard for professional trainings, courses can cost more than $5,000 per person. At high profile conferences like Black Hat, even one- or two-day sessions can range to close to $4,000. But those aren’t the only options out there. In fact, experts say, there are plenty of high-quality ways to boost security skills without breaking the bank. Their suggestions fell into two broad categories: making use of your own internal resources to ensure that cybersecurity knowledge is shared throughout your organization and finding low-cost external resources, either in addition to or as part of your internal efforts. To read this article in full, please click here
http://news.poseidon-us.com/SBLmzP

5 ways to maximize the value of data analytics

It’s one thing to gather large amounts of data and apply analytics to it; lots of organizations are doing that. It’s another thing entirely to gain optimum business value from that data and analysis. To read this article in full, please click here(Insider Story)
http://news.poseidon-us.com/SBJnLH

Microsoft Points to Inadequate Service Provider Protections Against Nobelium Attacks

Microsoft on Monday highlighted delegated administrative privileges with service providers as being a major organizational security hole that’s being targeted by the “Nobelium” advanced persistent threat (ATP) group.
http://news.poseidon-us.com/SBHfXZ