433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Zscaler empowers businesses to extend zero trust everywhere

Zscaler announced a new suite of solutions that enable customers to adopt zero trust everywhere. These innovations extend the reach of true zero trust and enable businesses to modernize and scale securely by providing end-to-end segmentation between and inside branches and enhance security across multi-cloud environments. Organizations are increasingly distributed, rapidly adopting IoT, OT, and multi-cloud architectures and grappling with increasing digital complexity. Zscaler has unveiled innovative updates to the Zscaler Zero Trust Exchange platform, … More → The post Zscaler empowers businesses to extend zero trust everywhere appeared first on Help Net Security.
http://news.poseidon-us.com/TL8nbt

Varonis Identity Protection unifies identity and data security

Varonis announced Varonis Identity Protection, the latest enhancement to its Data Security Platform that gives organizations visibility and control of data and identities. Most identity security tools operate in a vacuum — with no understanding of the critical data each identity can access or how they’re accessing it. Varonis connects the dots between identities and data, helping organizations automatically reduce access to their most sensitive data, fix identity posture issues, and stop identity-based threats — … More → The post Varonis Identity Protection unifies identity and data security appeared first on Help Net Security.
http://news.poseidon-us.com/TL8nYL

Cloud Covered 2025

Gartner, Finder, MYOB, Blackwoods and Onyx Gaming.
http://news.poseidon-us.com/TL8kZQ

How to manage your cyber risk in a modern attack surface

According to research, 62% of organizations said their attack surface grew over the past year. It’s no coincidence that 76% of organizations also reported a cyberattack due to an exposed asset in 2024, as expanding digital footprints often outpace security measures, leaving vulnerabilities unnoticed and unaddressed. So how exactly can organizations keep up and stay secure in this evolving landscape? In this article, we’ll cover some major attack surface risks to be aware of, and … More → The post How to manage your cyber risk in a modern attack surface appeared first on Help Net Security.
http://news.poseidon-us.com/TL8jzv

The hidden risks of LLM autonomy

Large language models (LLMs) have come a long way from the once passive and simple chatbots that could respond to basic user prompts or look up the internet to generate content. Today, they can access databases and business applications, interact with external systems to independently execute complex tasks and make business decisions. This transformation is primarily supported by emerging interoperability standards, such as the Model Context Protocol (MCP) and Agent-to-Agent (A2A) communication. MCP, created to … More → The post The hidden risks of LLM autonomy appeared first on Help Net Security.
http://news.poseidon-us.com/TL8jzt

Agentic AI and the risks of unpredictable autonomy

In this Help Net Security interview, Thomas Squeo, CTO for the Americas at Thoughtworks, discusses why traditional security architectures often fail when applied to autonomous AI systems. He explains why conventional threat modeling needs to adapt to address autonomous decision-making and emergent behaviors. Squeo also outlines strategies for maintaining control and accountability when AI agents operate with increasing autonomy. Why do traditional security architectures expecting predictable behavior fail when applied to autonomous AI systems? Autonomous … More → The post Agentic AI and the risks of unpredictable autonomy appeared first on Help Net Security.
http://news.poseidon-us.com/TL8jz6

Rethinking governance in a decentralized identity world

Decentralized identity (DID) is gaining traction, and for CISOs, it’s becoming a part of long-term planning around data protection, privacy, and control. As more organizations experiment with verifiable credentials and self-sovereign identity models, a question emerges: Who governs the system when no single entity holds the reins? The governance gap Traditional identity systems come with built-in governance. Central authorities validate users, issue credentials, and set policies for revocation and auditing. In decentralized ecosystems, these responsibilities … More → The post Rethinking governance in a decentralized identity world appeared first on Help Net Security.
http://news.poseidon-us.com/TL8f7M