433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (727) 493-2351

Vanta announces new products to enhance GRC and trust programs

Vanta announced a number of new and upcoming products enabling customers to build, demonstrate and enhance their GRC and trust programs. The new offerings include Vanta for Marketplaces to strengthen trust across a company’s entire ecosystem; adaptive scoping; AI-powered chat for Trust Centers; developer-first workflows for faster remediation; and expanded reporting capabilities. The announcements coincide with a number of highlights for the company in 2024: Now continuously monitoring over 92 million resources across customers—from laptops … More → The post Vanta announces new products to enhance GRC and trust programs appeared first on Help Net Security.
http://news.poseidon-us.com/TGJJhg

Deep Instinct delivers malware and ransomware prevention for cloud data stored in S3 buckets

Deep Instinct launched Deep Instinct DSX for Cloud Amazon S3. As organizations increasingly rely on the cloud to power their digital transformation, businesses are generating and storing record amounts of data in the cloud. Cybercriminals know this and are leveraging generative AI to create sophisticated malware that evades existing security tools and takes advantage of the “assume breach” mindset. DSX for Cloud enables businesses to protect sensitive data across cloud storage environments by preventing and … More → The post Deep Instinct delivers malware and ransomware prevention for cloud data stored in S3 buckets appeared first on Help Net Security.
http://news.poseidon-us.com/TGJJhf

Ukrainian cyberwar experience becomes blueprint for TRYZUB cyber training service

The Computer Emergency Response Team of Ukraine (CERT-UA), part of the State Service of Special Communications and Information Protection (SSSCIP), has joined forces with the simulation training platform Cyber Ranges to unveil TRYZUB, a cyber resilience training and capability development service. TRYZUB primarily protects military, government entities, and critical infrastructure sectors such as energy, healthcare, finance, telecommunications, and education. Its training is designed for military units, law enforcement, government agencies, and operators of essential infrastructure … More → The post Ukrainian cyberwar experience becomes blueprint for TRYZUB cyber training service appeared first on Help Net Security.
http://news.poseidon-us.com/TGJJhd

Actfore TRACE reduces keystrokes and expedites data extraction

Actfore unveiled TRACE (Targeted Retrieval and Automated Content Extraction), an auto-extraction feature to accelerate and improve the accuracy of data mining processes for breach notification list generation. TRACE will be integrated into all future Actfore deployments, underscoring the company’s commitment to delivering innovative, tech-driven solutions for carriers, counsel, and clients. TRACE represents a significant advancement in the extraction of sensitive data elements, eliminating inefficiencies and minimizing the reliance on manual processes. Developed by Actfore’s Innovation … More → The post Actfore TRACE reduces keystrokes and expedites data extraction appeared first on Help Net Security.
http://news.poseidon-us.com/TGJJhc

Zitadel raises $9 million to accelerate product development

Zitadel announced its $9 million Series A funding round led by Nexus Venture Partners with participation from Floodgate. Both firms represent the world’s best experts in open source, developer tools, and identity infrastructure. Zitadel’s developer-first approach and a strong focus on data security and ownership has fueled its growth to more than 150 customers across North America and Europe. This investment will further Zitadel’s vision to lead the identity infrastructure and authentication market. Abhishek Sharma, Managing … More → The post Zitadel raises $9 million to accelerate product development appeared first on Help Net Security.
http://news.poseidon-us.com/TGJJgs

AxoSyslog: Open-source scalable security data processor

AxoSyslog is a syslog-ng fork, created and maintained by the original creator of syslog-ng, Balazs Scheidler, and his team. “We first started by making syslog-ng more cloud-ready: we packaged syslog-ng in a container, added helm charts, and made it more suitable for use in cloud-native environments. We’ve also improved the monitoring and operational experience to help AxoSyslog better integrate with modern telemetry pipelines,” Balazs Scheidler, CEO of Axoflow, told Help Net Security. AxoSyslog is not … More → The post AxoSyslog: Open-source scalable security data processor appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ8st

Product showcase: Augmenting penetration testing with Plainsea

Human-led penetration testing is an essential practice for any organization seeking to proactively address potential attack vectors. However, this indispensable pentesting method is often limited by several factors: high resource demands, project time constraints, dispersed communication, and lack of continuous visibility into evolving vulnerabilities. Plainsea‘s innovative all-in-one platform addresses these challenges through an augmented penetration testing approach that results in a continuous, streamlined, and collaborative service. Designed for MSSPs and security teams, the platform enables … More → The post Product showcase: Augmenting penetration testing with Plainsea appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ8sZ

CWE top 25 most dangerous software weaknesses

The CWE list of the 25 most dangerous software weaknesses demonstrates the currently most common and impactful software flaws. Identifying the root causes of these vulnerabilities provides insights to shape investments, policies, and practices that proactively prevent their occurrence. The CWE top 25 most dangerous software weaknesses list was calculated by analyzing public vulnerability information in Common Vulnerabilities and Exposures (CVE) Records for CWE root cause mappings. This year’s dataset included 31,770 CVE Records for … More → The post CWE top 25 most dangerous software weaknesses appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ8rJ

Enhancing visibility for better security in multi-cloud and hybrid environments

In this Help Net Security interview, Brooke Motta, CEO of RAD Security, talks about how cloud-specific threats have evolved and what companies should be watching out for. She discusses the growing complexity of cloud environments and the importance of real-time detection to protect against increasingly sophisticated attacks. Motta also shares practical advice for SMBs and organizations navigating compliance and cloud security challenges. How have cloud-specific threats evolved over the past few years, and what new … More → The post Enhancing visibility for better security in multi-cloud and hybrid environments appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ6Rb

Preventing credential theft in the age of AI

In this Help Net Security video, Tina Srivastava, MIT Lecturer and CEO of Badge, discusses a 20-year cryptography problem – using biometrics for authentication without storing a face/finger/voice print. This has massive implications for corporate and personal security/privacy because there is nothing for an attacker to steal. The post Preventing credential theft in the age of AI appeared first on Help Net Security.
http://news.poseidon-us.com/TGJ6RZ