433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Most interesting products to see at RSA Conference 2023

Security professionals attending this year’s RSA Conference expect to learn about new tools, platforms, and services from the 600-plus vendors exhibiting there. That’s a lot of ground to cover, so CSO has sifted through the upcoming announcements and gathered the products and services that caught our eye here. More announcements will be made throughout the event, and CSO will update this article as their embargoes break. We’ve organized the listings by day of announcement. RSA Conference announcements, pre-event Binary Defense Phishing Response service Managed detection and response (MDR) firm Binary Defense will be showing its new Phishing Response service. Its features include email attack surface hardening, intelligence correlation, threat hunting, and investigation-based detection and remediation recommendations. Users may submit emails and phishing alerts from third-party email protection software for analysis. Findings from that analysis are then correlated with other threat intelligence, and then Binary Defense analysts look for evidence of this attack. Binary Defense is at RSAC booth 5415. To read this article in full, please click here
http://news.poseidon-us.com/Smrb16

The strong link between cyber threat intelligence and digital risk protection

While indicators of compromise (IoCs) and attackers’ tactics, techniques, and processes (TTPs) remain central to threat intelligence, cyber threat intelligence (CTI) needs have grown over the past few years, driven by things like digital transformation, cloud computing, SaaS propagation, and remote worker support. In fact, these changes have led to a CTI subcategory focused on digital risk protection. DRP is broadly defined as, “telemetry, analysis, processes, and technologies used to identify and mitigate risks associated with digital assets.” I’ve earlier examined ESG research on enterprise CTI programs based on. CISOs are investing here but challenges remain. I’ve also dug into the CTI lifecycle. Nearly three-quarters (74%) of organizations claim they employ a lifecycle, but many describe bottlenecks in one or several of the lifecycle phases. To read this article in full, please click here
http://news.poseidon-us.com/SmrGs0

Intruder joins Google Cloud Partner Advantage program

Intruder has joined the Google Cloud Partner Advantage program as a technology partner, giving organisations the ability to easily monitor their cloud systems for potential security breaches and vulnerabilities. As part of the collaboration, customers are able to connect Intruder to Google Cloud to synchronise assets. With the integration and as a partner, Intruder offers a cybersecurity solution to customers who are deploying numerous assets in their cloud accounts. Intruder’s vulnerability management and attack surface … More → The post Intruder joins Google Cloud Partner Advantage program appeared first on Help Net Security.
http://news.poseidon-us.com/SmqNqk

Dashlane launches Confidential SSO powered by AWS Nitro Enclaves

Dashlane has unveiled an integration of AWS Nitro Enclaves into its security architecture, starting with the launch of Dashlane Confidential SSO in public beta. Leveraging AWS Nitro Enclaves to create isolated computing environments to further protect and securely process highly sensitive data, this single sign-on (SSO) integration for businesses is the first release in a series of breakthrough security features planned over the coming months. While the combination of Dashlane and SSO already ensures reliable … More → The post Dashlane launches Confidential SSO powered by AWS Nitro Enclaves appeared first on Help Net Security.
http://news.poseidon-us.com/SmqNqj

Talon Cyber Security collaborates with Microsoft to provide ChatGPT access

Talon Cyber Security has integrated the Talon Enterprise Browser with Microsoft Azure OpenAI Service to provide enterprise-grade ChatGPT access to customers. “The productivity gains that ChatGPT enables for organizations are too game changing for us to not make an enterprise-level version of this easily available to our customers,” said Ofer Ben-Noon, CEO, Talon Cyber Security. “By embedding Microsoft Azure OpenAI Service in Talon’s Enterprise Browser, organizations can embrace ChatGPT for enterprise use in a manner … More → The post Talon Cyber Security collaborates with Microsoft to provide ChatGPT access appeared first on Help Net Security.
http://news.poseidon-us.com/SmqNpq

Five Eye nations release new guidance on smart city cybersecurity

New guidance, Cybersecurity Best Practices for Smart Cities, wants to raise awareness among communities and organizations implementing smart city technologies that these beneficial technologies can also have potential vulnerabilities. A collaboration among the Five Eye nations (Australia, Canada, New Zealand, the UK, and the US), it advises communities considering becoming smart cities to assess and mitigate the cybersecurity risks that comes with the technology. What makes smart cities attractive to attackers is the data being collected and processed. Because AI-powered systems are being used to integrate this data, these should be given special attention when checking for vulnerabilities. To read this article in full, please click here
http://news.poseidon-us.com/SmnYMK

The biggest data security blind spot: Authorization

Too many people have access to company data they don’t need. Also, too many companies focus on authentication (verifying identity) as a security measure and overlook the importance of authorization (verifying right to access). While it’s important to give employees access to the data they require to do their job, granting too much access increases the risk of data breaches. Maintaining proper authorization is particularly important when we’re facing the economic distress that comes with … More → The post The biggest data security blind spot: Authorization appeared first on Help Net Security.
http://news.poseidon-us.com/SmmkHN

LogRhythm and Zscaler integration streamlines website access control

LogRhythm and Zscaler work together to help organizations around the globe increase network insight and address a variety of cloud access security challenges faced by the modern SOC. LogRhythm SIEM and the Zscaler Zero Trust Exchange platform provide visibility and security to facilitate a modern zero trust architecture. Zscaler secures all user, workload, and device communications over any network, anywhere. The integration with LogRhythm provides visibility into everything occurring in your network, and the websites … More → The post LogRhythm and Zscaler integration streamlines website access control appeared first on Help Net Security.
http://news.poseidon-us.com/SmmJqP

Lean Construction Principles & Best Practices

There’s more than one way to manage a construction project. From the world of manufacturing comes an approach called lean construction. But lean manufacturing and lean construction are two different things. Let’s explore lean construction, defining what it is and…Read More The post Lean Construction Principles & Best Practices appeared first on ProjectManager.
http://news.poseidon-us.com/SmmJKL

Microsoft Security Nomenclature Switches to Bad Weather Naming Scheme

Microsoft announced this week that it has scrapped its security threat nomenclature for a new weather-themed one.
http://news.poseidon-us.com/SmmGZx