433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

10 years in, the Defense Innovation Unit needs to pivot

The Government Accountability Office is urging the Defense Innovation Unit to develop better metrics for products that are helping the military. The post 10 years in, the Defense Innovation Unit needs to pivot first appeared on Federal News Network.
http://news.poseidon-us.com/TJTqZX

The Trump administration has dispensed with the government’s feedstock

The highly visible dismissal of probationary federal employees will have lasting damage, according to several good-government groups. The post The Trump administration has dispensed with the government’s feedstock first appeared on Federal News Network.
http://news.poseidon-us.com/TJTnlC

Explore the Future of AI with Dell’s Chief AI Officer, John Roese

Explore cutting-edge AI insights, from future trends to actionable strategies, designed to help you stay ahead in the world of AI innovation.
http://news.poseidon-us.com/TJTnFv

Pres. Trump makes new nominations to OMB

Ueland, who is currently the acting chief of staff for OMB, would be the deputy director for management at OMB if confirmed by the Senate. The post Pres. Trump makes new nominations to OMB first appeared on Federal News Network.
http://news.poseidon-us.com/TJTlXc

Pres. Trump makes new nominations to OMB

Ueland, who is currently the acting chief of staff for OMB, would be the deputy director for management at OMB if confirmed by the Senate. The post Pres. Trump makes new nominations to OMB first appeared on Federal News Network.
http://news.poseidon-us.com/TJTlWF

Goodbye passwords? Enterprises ramping up passkey adoption

87% of companies have, or are in the midst of, rolling out passkeys with goals tied to improved user experience, enhanced security, and compliance, according to the FIDO Alliance. Key findings Enterprises understand the value of passkeys for workforce sign-ins. Most decision makers (87%) report deploying passkeys at their companies. Of these, 47% report rolling out a mix of device-bound passkeys (on physical security keys and/or cards) and synced passkeys (synced securely across the user’s … More → The post Goodbye passwords? Enterprises ramping up passkey adoption appeared first on Help Net Security.
http://news.poseidon-us.com/TJTlRH

15 Leadership Training Options: Courses, Programs and Blogs

Is leadership something you’re born with or can it be taught? It’s an interesting question, but one that you shouldn’t spend too much time stressing over. Even if you are full of charisma and people naturally line up to follow… Read More The post 15 Leadership Training Options: Courses, Programs and Blogs appeared first on ProjectManager.
http://news.poseidon-us.com/TJTkkB

Cisco IOS XR Software Image Verification Bypass Vulnerability

A vulnerability in the boot process of Cisco IOS XR Software could allow an authenticated, local attacker to bypass Cisco IOS XR image signature verification and load unverified software on an affected device. To exploit this vulnerability, the attacker must have root-system privileges on the affected device. This vulnerability is due to incomplete validation of files in the boot verification process. An attacker could exploit this vulnerability by manipulating the system configuration options to bypass some of the integrity checks that are performed during the boot process. A successful exploit could allow the attacker to control the boot configuration, which could enable them to bypass the requirement to run Cisco-signed images or alter the security properties of the running system. Note: Because exploitation of this vulnerability could result in the attacker bypassing Cisco image verification, Cisco has raised the Security Impact Rating (SIR) of this advisory from Medium to High. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-xr-verii-bypass-HhPwQRvx This advisory is part of the March 2025 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2025 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20177
http://news.poseidon-us.com/TJTjfh

Cisco IOS XR Software Internet Key Exchange Version 2 Denial of Service Vulnerability

A vulnerability in the Internet Key Exchange version 2 (IKEv2) function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to prevent an affected device from processing any control plane UDP packets.  This vulnerability is due to improper handling of malformed IKEv2 packets. An attacker could exploit this vulnerability by sending malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to prevent the affected device from processing any control plane UDP packets, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrike-9wYGpRGq This advisory is part of the March 2025 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2025 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20209
http://news.poseidon-us.com/TJTjff

Cisco IOS XR Software Release 7.9.2 Denial of Service Vulnerability

A vulnerability in the handling of specific packets that are punted from a line card to a route processor in Cisco IOS XR Software Release 7.9.2 could allow an unauthenticated, adjacent attacker to cause control plane traffic to stop working on multiple Cisco IOS XR platforms.  This vulnerability is due to incorrect handling of packets that are punted to the route processor. An attacker could exploit this vulnerability by sending traffic, which must be handled by the Linux stack on the route processor, to an affected device. A successful exploit could allow the attacker to cause control plane traffic to stop working, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xr792-bWfVDPY This advisory is part of the March 2025 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: March 2025 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication. Security Impact Rating: High CVE: CVE-2025-20141
http://news.poseidon-us.com/TJTjfd