433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Entrust Cryptographic Security Platform provides visibility into cryptographic risk posture

Entrust announced the Entrust Cryptographic Security Platform, a unified, end-to-end cryptographic security management solution for keys, secrets, and certificates. Cyberattacks on data security and identity systems are exploding in scale and sophistication. Traditional approaches to securing data and identities aren’t working, and in digital-first environments every connected device, application, and system is at risk without a secure cryptographic foundation. And the fragmented tools for managing cryptographic sprawl – including encryption keys, secrets, and certificates – … More → The post Entrust Cryptographic Security Platform provides visibility into cryptographic risk posture appeared first on Help Net Security.
http://news.poseidon-us.com/TKBm9m

Cozy Bear targets EU diplomats with wine-tasting invites (again)

APT29 (aka Cozy Bear, aka Midnight Blizzard) is, once again, targeting European diplomats with fake invitations to wine-tasting events, Check Point researchers have shared. Cozy Bear uses wine-tastings and dinners as a lure In early 2024, Zscaler flagged a low-volume phishing campaign aimed at delivering the WINELOADER backdoor to European diplomats. The lure was a PDF file containing a fake invitation letter supposedly send by the Ambassador of India, inviting diplomats to a wine-tasting event. … More → The post Cozy Bear targets EU diplomats with wine-tasting invites (again) appeared first on Help Net Security.
http://news.poseidon-us.com/TKBm87

Cyware strengthens threat intelligence management

Cyware has added Compromised Credential Management to the Cyware Intel Packaged Solution, a pre-configured threat intelligence program-in-a-box that enables security teams to operationalize threat intelligence faster by eliminating complex integrations and configurations. Built on Cyware Intel Exchange and pre-bundled with Team Cymru premium threat feeds, the packaged solution provides instant, out-of-the-box capabilities, allowing security teams to skip months of setup and focus immediately on detecting and responding to advanced cyber threats. This launch adds Compromised … More → The post Cyware strengthens threat intelligence management appeared first on Help Net Security.
http://news.poseidon-us.com/TKBdxB

Funding uncertainty may spell the end of MITRE’s CVE program

The future of the Common Vulnerabilities and Exposures (CVE) program hangs in the balance: MITRE, the not-for-profit US organization that runs it, could lose the US federal funding that helps them maintain it. But others have been waiting in the wings and are getting ready to pick up the vulnerability tracking mantle. “On Wednesday, April 16, 2025, the current contracting pathway for MITRE to develop, operate, and modernize CVE and several other related programs, such … More → The post Funding uncertainty may spell the end of MITRE’s CVE program appeared first on Help Net Security.
http://news.poseidon-us.com/TKBdvv

Federal judge blocks Labor Department from enforcing key part of Trump’s anti-DEI executive orders

Judge Kennelly of the U.S. District Court for the Northern District of Illinois issued the ruling in response to a lawsuit filed by Chicago Women in Trades. The post Federal judge blocks Labor Department from enforcing key part of Trump’s anti-DEI executive orders first appeared on Federal News Network.
http://news.poseidon-us.com/TKBcnr

Dell’s Cyber Resilience Solutions Safeguard Your Business Data

Overcome cyber threats with Dell’s relentless cyber resilience solutions that enable swift recovery when attacks hit.
http://news.poseidon-us.com/TKBVdN

Small AI models set to gain enterprise traction: Gartner

In the next two years, organizations will use small, task-specific models three times more than general-purpose LLMs, the analyst firm predicts.
http://news.poseidon-us.com/TKBVDq

Introducing the refreshed Recorded Future brand

Learn how Recorded Future’s brand refresh, powered by AI and actionable threat intelligence, helps teams evolve with the next generation of cybersecurity.
http://news.poseidon-us.com/TKBR0Q

Cato Networks unveils GenAI security controls for Cato CASB

Cato Networks introduced GenAI security controls for Cato CASB (Cloud Access Security Broker). Cato CASB, a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for GenAI applications including a shadow AI dashboard and policy engine. With the shadow AI dashboard, enterprises can detect, analyze, and gain insights into the use of GenAI. With the policy engine, enterprises can take control of user activities in GenAI applications. Combined, Cato is enabling security … More → The post Cato Networks unveils GenAI security controls for Cato CASB appeared first on Help Net Security.
http://news.poseidon-us.com/TKBJj8

NEC Identity Cloud Service simplifies identity verification

NEC introduces Identity Cloud Service (ICS), a new identity verification solution to deliver streamlined, secure and cost-effective access management. Based on NEC’s biometric technology, ICS provides verification and search capabilities for corporations and global enterprises, financial services, hospitality, e-commerce, government services agencies and more. “ICS is an efficient, high-performance identity verification solution that allows organizations to access NEC’s top-ranked face recognition technology quickly and affordably,” says Eugene Le Roux, SVP of Digital Government for NEC … More → The post NEC Identity Cloud Service simplifies identity verification appeared first on Help Net Security.
http://news.poseidon-us.com/TKBJhG