433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

When companies merge, so do their cyber threats

For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction. Strong due diligence, smart risk planning, and a shared security mindset can help keep deals on track and protect the business. Key cybersecurity risks in M&A 1. Inherited vulnerabilities: Acquiring a company means inheriting its existing cybersecurity weaknesses. If the target company has unresolved … More → The post When companies merge, so do their cyber threats appeared first on Help Net Security.
http://news.poseidon-us.com/TKBDz7

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity. Many companies could encounter serious repercussions, such as increased volumes of advanced cyber threats, if they fail to exploit AI due to a lack of clear objectives, inadequate data readiness or misalignment with business priorities. Foundational concepts are vital for constructing a robust AI-readiness framework for cybersecurity. These concepts encompass the organization’s technology, data, security, governance … More → The post Strategic AI readiness for cybersecurity: From hype to reality appeared first on Help Net Security.
http://news.poseidon-us.com/TKBDyd

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques

MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and combine offensive techniques to reach their objectives, Attack Flow offers defenders, analysts, and decision-makers a tool to see the bigger picture. Threat intelligence Cyber threat intel (CTI) teams can use Attack Flow to show how attackers behave, not just what tools they use. It tracks activity across incidents, campaigns, or threat groups. Because it’s machine-readable, … More → The post Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques appeared first on Help Net Security.
http://news.poseidon-us.com/TKBDxp

The future of authentication: Why passwordless is the way forward

By now, most CISOs agree: passwords are the weakest link in the authentication chain. They’re easy to guess, hard to manage, and constantly reused. Even the most complex password policies don’t stop phishing or credential stuffing. That’s why passwordless authentication is gaining serious ground. Adopting passwordless authentication comes with challenges, including resistance to change, integration with legacy systems, and initial costs. Organizations may also have concerns about security, user experience, accessibility, compliance, and data privacy. … More → The post The future of authentication: Why passwordless is the way forward appeared first on Help Net Security.
http://news.poseidon-us.com/TKB9wB

Browser extensions make nearly every employee a potential attack vector

Despite being present on virtually every employee’s browser, extensions are rarely monitored by security teams or controlled by IT, according to LayerX. Most extensions have access to sensitive data 99% of enterprise users have at least one extension installed in their browsers, and 53% have more than 10 browser extensions. This widespread usage means almost every employee represents a potential attack vector. 53% of enterprise users have installed a browser extension with “high” or “critical” … More → The post Browser extensions make nearly every employee a potential attack vector appeared first on Help Net Security.
http://news.poseidon-us.com/TKB9vq

Funding Expires for Key Cyber Vulnerability Database

A critical resource that cybersecurity professionals worldwide rely on to identify, mitigate and fix security vulnerabilities in software and hardware is in danger of breaking down. The federally funded, non-profit research and development organization MITRE warned today that its contract to maintain the Common Vulnerabilities and Exposures (CVE) program — which is traditionally funded each year by the Department of Homeland Security — expires on April 16.
http://news.poseidon-us.com/TKB8xv

ISC Stormcast For Wednesday, April 16th, 2025 https://isc.sans.edu/podcastdetail/9410, (Wed, Apr 16th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TKB52h

Direct File future uncertain as IRS faces deep workforce cuts

The Trump administration has eliminated or greatly reduced the staffing of teams at other agencies that helped launch Direct File. The post Direct File future uncertain as IRS faces deep workforce cuts first appeared on Federal News Network.
http://news.poseidon-us.com/TKB2dF

Direct File future uncertain as IRS faces deep workforce cuts

The Trump administration has eliminated or greatly reduced the staffing of teams at other agencies that helped launch Direct File. The post Direct File future uncertain as IRS faces deep workforce cuts first appeared on Federal News Network.
http://news.poseidon-us.com/TKB2cF

DHS cancels federal neurodiversity workforce contract

DHS did not provide a reason for cancelling CISA’s neurodiversity workforce pilot, but it came amid the Trump administration’s anti-DEI push. The post DHS cancels federal neurodiversity workforce contract first appeared on Federal News Network.
http://news.poseidon-us.com/TKB1Th