433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Managing legacy medical devices that can no longer be patched

In this Help Net Security interview, Patty Ryan, Senior Director and CISO at QuidelOrtho, discusses how the long lifecycles of medical devices impact cybersecurity in healthcare environments. She explains how organizations can protect legacy systems, collaborate with vendors, and adopt proactive, risk-based strategies. Ryan also shares insights on strengthening cyber resilience as AI-enabled and connected medical devices become more prevalent in healthcare. Given the long lifecycles of medical devices, how should hospitals handle legacy systems … More → The post Managing legacy medical devices that can no longer be patched appeared first on Help Net Security.
http://news.poseidon-us.com/TNwWM1

Chain of security weaknesses found in smart air compressor model

Contractors and workshops often rely on air compressors to power their tools and keep projects running. But when those compressors are connected to the internet, convenience can introduce new risks. Researchers at George Mason University found that the California Air Tools CAT-10020SMHAD smart air compressor contains a chain of security vulnerabilities that could allow an attacker to disrupt operations or tamper with usage data. California Air Tools CAT-10020SMHAD smart air compressor with MDR2i wireless controller … More → The post Chain of security weaknesses found in smart air compressor model appeared first on Help Net Security.
http://news.poseidon-us.com/TNwWLt

Review: The Wireless Cookbook

The Wireless Cookbook is a project-centered guide to working with Wi-Fi, Bluetooth, and LoRa, written with the Raspberry Pi as the main platform. It is aimed at people who learn through building, experimenting, and breaking things to understand how they work. For security professionals, this approach can be valuable. Wireless networks remain a common entry point for attackers, and hands-on practice offers insight that theory alone does not match. This book gives readers a structured … More → The post Review: The Wireless Cookbook appeared first on Help Net Security.
http://news.poseidon-us.com/TNwWLQ

How to Prevent Ransomware | Recorded Future

Learn to how to prevent ransomware attacks before they materialize with proactive threat intelligence
http://news.poseidon-us.com/TNwVjP

How to stop third-party risk from becoming your biggest headache

In this Help Net Security video, Robert Kraczek, Global IAM Strategist at One Identity, takes a deep dive into the growing problem of third-party cyber exposure and what it means for enterprise security. He walks through real-world examples of how partner connections, contractors, and even machine-to-machine identities can expand your attack surface. Kraczek also explores how AI-driven threats are changing the risk landscape and why identity governance and privileged access management are key to staying … More → The post How to stop third-party risk from becoming your biggest headache appeared first on Help Net Security.
http://news.poseidon-us.com/TNwSdV

Cybersecurity jobs available right now: October 28, 2025

Analyst, Cybersecurity Threat Intelligence Brookfield Renewable | Canada | On-site – View job details As a Cybersecurity Threat Intelligence Analyst, you will run monthly vulnerability scans across IT and OT environments, track remediation progress, and report results. You will collect and analyze phishing and security awareness metrics, conduct threat intelligence research using tools like Dark Owl, OpenCTI, and Shodan, and produce actionable reports. You will analyze incidents, document lessons learned, and manage key cybersecurity and … More → The post Cybersecurity jobs available right now: October 28, 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TNwSch