433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

AI vs AI: How cybersecurity pros can use criminals’ tools against them

For a while now, AI has played a part in cybersecurity. Now, agentic AI is taking center stage. Based on pre-programmed plans and objectives, agentic AI can make choices which optimize results without a need for developer intervention. As agentic AI can be programmed for various tasks, AI agents are set to create a labor revolution, from manufacturing to customer service. However, this comes at a cost, as they can also be programmed to conduct … More → The post AI vs AI: How cybersecurity pros can use criminals’ tools against them appeared first on Help Net Security.
http://news.poseidon-us.com/TKkXMY

Breaking down silos in cybersecurity

All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and operations. Their presence inhibits communication and collaboration. As companies scale from startup to mid-sized and beyond, silos multiply and ossify. As operations expand from one site to many, from on-premises to cloud, from legacy to emerging tech (e.g., cloud and AI), silos don’t topple; they persist and proliferate. Nowhere are silos more evident … More → The post Breaking down silos in cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TKkQZ1

Review: Resilient Cybersecurity

Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk and regulatory compliance. About the author Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience working in higher education, healthcare and Fortune 100 companies. Inside the book The structure of the book mirrors the process of building a cybersecurity program from the ground up. Early chapters focus on understanding the … More → The post Review: Resilient Cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TKkQX6

UNIDIR Intrusion Path: New framework to analyze ICT environment activities

Malicious activity in the ICT environment is growing. However, a non-technical audience often struggle to understand these threats, either because technical explanations are too complex or because media coverage oversimplifies the issues. To help understand and analyze these activities, UNIDIR has developed the UNIDIR Intrusion Path framework. Based on the idea of a network perimeter, the framework divides the ICT space into “outside” and “inside.” This spatial view helps map where activities occur, making cyber … More → The post UNIDIR Intrusion Path: New framework to analyze ICT environment activities appeared first on Help Net Security.
http://news.poseidon-us.com/TKkQX1

ISC Stormcast For Tuesday, May 13th, 2025 https://isc.sans.edu/podcastdetail/9448, (Tue, May 13th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TKkKwP

OMB memo requires agencies to track federal employees attendance

Agencies, in an annual report, must tell OMB whether their office space meets or exceeds a 60% utilization target. The post OMB memo requires agencies to track federal employees attendance first appeared on Federal News Network.
http://news.poseidon-us.com/TKkBlM

Judge refuses to block IRS from sharing tax data to identify and deport people illegally in U.S.

A federal judge is refusing to block the Internal Revenue Service from sharing immigrants’ tax data with Immigration and Customs Enforcement. The post Judge refuses to block IRS from sharing tax data to identify and deport people illegally in U.S. first appeared on Federal News Network.
http://news.poseidon-us.com/TKkB74

Apple Updates Everything: May 2025 Edition, (Mon, May 12th)

Apple released its expected update for all its operating systems. The update, in addition to providing new features, patches 65 different vulnerabilities. Many of these vulnerabilities affect multiple operating systems within the Apple ecosystem.
http://news.poseidon-us.com/TKk8qL