433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Oasis NHI Provisioning automates the provisioning of NHIs and their credentials

Oasis Security launched Oasis NHI Provisioning, a capability that automates the creation, governance, and security of non-human identities (NHIs) from their inception. Built into the Oasis NHI Security Cloud, this solution addresses the critical challenges of fragmented processes, ungoverned sprawl, and manual workflows that plague NHI provisioning today. According to ESG research, NHIs, such as service accounts, service principals, managed accounts, secrets, keys, and access tokens, are growing 20% year-over-year, powering automation across legacy, cloud, … More → The post Oasis NHI Provisioning automates the provisioning of NHIs and their credentials appeared first on Help Net Security.
http://news.poseidon-us.com/TKRN4l

Lumu SecOps Platform allows teams to unify their entire security stack

Lumu released Lumu SecOps Platform, a fully integrated Security Operations (SecOps) platform that unifies threat detection, response, automation, compliance, and intelligence across the network, identities and endpoints—delivering full attack context and enabling security teams to autonomously detect and neutralize complex threats. Lumu SecOps Platform acts as the control center of a security network and allows teams to unify their entire security stack, streamline defenses, enhance their visibility, and reduce security gaps, powered by automated responses … More → The post Lumu SecOps Platform allows teams to unify their entire security stack appeared first on Help Net Security.
http://news.poseidon-us.com/TKRN4K

Eyes, ears, and now arms: IoT is alive

I’ve never quite seen anything like this in my two decades of working in the Internet of Things (IoT) space. In just a few years, devices at home and work started including cameras to see and microphones to hear. Now, with new lines of vacuums and emerging humanoid robots, devices have appendages to manipulate the world around them. They’re not only able to collect information about their environment but can touch, “feel”, and move it. … More → The post Eyes, ears, and now arms: IoT is alive appeared first on Help Net Security.
http://news.poseidon-us.com/TKRJ0V

Sumo Logic unveils innovations across AI, automation, and threat intelligence

Sumo Logic announced a number of new security capabilities that help organizations build and operate intelligent security operations to reduce risks, accelerate threat containment, and ensure stronger security postures. “With the rise of AI-powered attacks, dynamically scaling cloud environments, and growing data complexity, legacy solutions are significantly slowing detection and response,” said Keith Kuchler, Chief Development Officer for Sumo Logic. “The innovations we’re unveiling fuel DevSecOps via the power of logs by centralizing security log … More → The post Sumo Logic unveils innovations across AI, automation, and threat intelligence appeared first on Help Net Security.
http://news.poseidon-us.com/TKRJ0D

What’s worth automating in cyber hygiene, and what’s not

Cyber hygiene sounds simple. Patch your systems, remove old accounts, update your software. But for large organizations, this gets messy fast. Systems number in the thousands. Teams are scattered. Some machines haven’t been rebooted in months. Automation can help. But not everything should be automated, and not every automation pays off. For CISOs, the real question isn’t “can we automate it?” It’s “should we?” Here’s what’s worth automating in cyber hygiene today, and where to … More → The post What’s worth automating in cyber hygiene, and what’s not appeared first on Help Net Security.
http://news.poseidon-us.com/TKRHyq

Want faster products and stronger trust? Build security in, not bolt it on

In this Help Net Security interview, Christopher Kennedy, CISO at Group 1001, discusses how cybersecurity initiatives are reshaping enterprise cybersecurity strategy. He explains why security must be embedded across IT, business lines, and product development, how automation and risk discovery can drive competitive advantage, and why security leaders need to play a central role in shaping business outcomes. Traditionally, cybersecurity has been seen as a cost center. What are the most compelling ways it can … More → The post Want faster products and stronger trust? Build security in, not bolt it on appeared first on Help Net Security.
http://news.poseidon-us.com/TKRFVH

DDoS attacks jump 358% compared to last year

Cloudflare says it mitigated 20.5 million DDoS attacks in the first quarter of 2025. This is a 358% increase compared to the same time last year. Their Q1 2025 DDoS report highlights a rise in the number and size of attacks, including some of the largest ever recorded. Map of top 10 most attacked industries in Q1 2025 (Source: Cloudflare) Massive multi-vector attacks One-third of the attacks, about 6.6 million, directly targeted Cloudflare’s own network … More → The post DDoS attacks jump 358% compared to last year appeared first on Help Net Security.
http://news.poseidon-us.com/TKRFVG

Investing in security? It’s not helping you fix what matters faster

Automation and structured collaboration have a strong, positive influence on the efficiency of vulnerability management, according to Seemplicity. However, manual processes, unstructured workflows, and excessive noise from vulnerability scanning tools continue to slow remediation efforts, leading to delays and security risks. Despite advancements in automation, a significant portion of vulnerability management remains manual, increasing operational inefficiencies and contributing to alert fatigue. “This year’s data makes it clear that security teams aren’t short on tools or … More → The post Investing in security? It’s not helping you fix what matters faster appeared first on Help Net Security.
http://news.poseidon-us.com/TKRFV1

Hopper Security emerges from stealth to fix open-source security problems

Modern software relies on open-source. As open-source software (OSS) scaled, accelerated by AI, legacy security tools failed to keep pace, introducing undesired cost, complexity, and drag on developer productivity. Gartner cites false positives, alert fatigue, and the lack of exploitability context such as function-level reachability as key barriers to effective application security. Hopper Security has launched out of stealth with a clear goal: to change how companies manage OSS risk. They raised $7.6 million in … More → The post Hopper Security emerges from stealth to fix open-source security problems appeared first on Help Net Security.
http://news.poseidon-us.com/TKRFTH

Cybersecurity jobs available right now: April 29, 2025

Analyst IV – Cybersecurity Carpenter Technology | USA | On-site – View job details As an Analyst IV – Cybersecurity, you will guide IT teams on IAM tasks, including account provisioning, password vaulting, access reviews, and encryption key management. You will conduct advanced threat analysis, risk assessments, forensic investigations, vulnerability scans, application security testing, and periodic penetration testing, advising management on risk treatment plans. CISO Department of Justice | Australia | On-site – View job … More → The post Cybersecurity jobs available right now: April 29, 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TKRFSn