433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Coffee Talk: Preparing for the Continuing Remote Workforce

In this session, Senior Resultant Howard M. Cohen will explore what needs to be done to thoroughly prepare an organization for ongoing work-from-home. Learn more!
http://news.poseidon-us.com/ScW67t

Former IBM executive discusses crisis leadership

Anne Altman, CEO of Everyone Matters, joins Aileen Black on Leaders and Legends to discuss leadership and how to lead during times of crisis.
http://news.poseidon-us.com/ScTvl1

Why it’s time to review your Microsoft patch management options

You have several options to manage patching on Microsoft networks: let machines independently update or use a third-party patching tool, Windows Software Update Services (WSUS), or another Microsoft management product. If you are still using WSUS as your key patching tool, you may want to review your options. Microsoft is developing additional patching tools that will allow you to better manage systems and control administrative access. Is WSUS on the way out? Microsoft has long kept the status quo for WSUS, its on-premises patching product. It still supports WSUS, but Microsoft does not appear to be making new investments in the platform. Case in point, if your WSUS server fails on syncing, disable the Windows category of “Windows Insider Dev Channel.” Selecting this category creates an error message during synchronization. Microsoft is aware of the issue but has not given any estimated time for a fix. WSUS has not been updated in years. If you are considering using WSUS as your go-to patching platform, budget for a subscription to WSUS Automated Maintenance, which includes scripts and routines to optimize WSUS. To read this article in full, please click here
http://news.poseidon-us.com/ScTY6D

EndaceFlow protects customers against network attacks

Endace has released EndaceFlow, a NetFlow Generator that promotes end-to-end visibility for cybersecurity and network performance monitoring. NetFlow offers a view of network traffic and other information, while continuous packet capture provides detail and granularity of that data. Together, the technologies deliver the information required for faster, definitive incident response and resolution. When integrated with the EndaceProbe Analytics Platform and EndaceVision, EndaceFlow delivers these benefits to customers: A summary of every conversation or flow on … More → The post EndaceFlow protects customers against network attacks appeared first on Help Net Security.
http://news.poseidon-us.com/ScSqXY

Veriti emerges from stealth and raises $18.5 million to develop its product suite

Veriti emerged from stealth with $18.5 million in total funding. The funding consists of a $12 million round led by global software investor Insight Partners, which followed a $6.5 million round led by NFX and AMITI. The new funding will help the company scale to meet its growing customer base and further enhance its Unified Security Posture Management platform functionality. Founded in 2021 by unit 8200 veterans and ex-Check Point executives Adi Ikan, CEO, and … More → The post Veriti emerges from stealth and raises $18.5 million to develop its product suite appeared first on Help Net Security.
http://news.poseidon-us.com/ScSdyC

Zoom launches email, calendar service to kill the ‘toggling tax’

Users will get access to a Zoom-hosted mail and calendar service in the Zoom platform, or integrate existing services from other providers, the company said.
http://news.poseidon-us.com/ScS1SX

Always on call: How to avoid an IT meltdown

Communication, automation and preparation can turn an after hours IT outage into a minor hiccup instead of a full meltdown.
http://news.poseidon-us.com/ScQhFF

The 15 biggest data breaches of the 21st century

In today’s data-driven world, data breaches can affect hundreds of millions or even billions of people at a time. Digital transformation has increased the supply of data moving, and data breaches have scaled up with it as attackers exploit the data-dependencies of daily life. How large cyberattacks of the future might become remains speculation, but as this list of the biggest data breaches of the 21st Century indicates, they have already reached enormous magnitudes. [ Learn the The 5 types of cyberattack you’re most likely to face. | Get the latest from CSO by signing up for our newsletters. ] To read this article in full, please click here
http://news.poseidon-us.com/ScQMwv

ISC Stormcast For Tuesday, November 8th, 2022 https://isc.sans.edu/podcastdetail.html?id=8248, (Tue, Nov 8th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/ScPZDs