433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

BigID Activity Explorer enhances visibility for insider risk investigation

BigID announced Activity Explorer, a new capability that delivers auditability and granular activity investigation to strengthen insider risk detection and response. With Activity Explorer, organizations can review, search, and analyze activity across cloud and on-prem environments, including AWS S3, SharePoint, OneDrive, Google Drive, and NetApp, all within a unified interface for user accounts, service accounts, and AI agents. Organizations manage massive volumes of sensitive data across distributed environments. Yet when incidents occur, a deleted file, … More → The post BigID Activity Explorer enhances visibility for insider risk investigation appeared first on Help Net Security.
http://news.poseidon-us.com/TPkrpZ

Apptega Policy Manager streamlines policy creation and compliance oversight

Apptega revealed its Policy Manager module, expanding the company’s platform to automate the creation, review, and oversight of custom business policies. With this enhancement, Apptega enables partners and in-house security and compliance teams to maintain auditable policies with minimal manual effort. Apptega Policy Manager automates entire workflows that support the creation, maintenance and management of businesses’ policies for passwords, privacy, HR and more across levels, departments and roles. Policy drafts are routed across configurable approval … More → The post Apptega Policy Manager streamlines policy creation and compliance oversight appeared first on Help Net Security.
http://news.poseidon-us.com/TPkrpX

Protecto Vault adds API-first protection for safer AI agent workflows

Protecto launched Protecto Vault, a SaaS platform designed specifically for AI agent builders. Featuring a pay-as-you-go model, Vault removes the primary barrier to AI adoption: enterprise refusal to share sensitive data due to security, PII exposure, and HIPAA compliance risks. Enterprises hesitate to connect agents to the unstructured data that makes them useful, such as emails, clinical notes, and financial documents. Protecto Vault solves this by providing an API-first security layer that sits between enterprise … More → The post Protecto Vault adds API-first protection for safer AI agent workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TPkrpW

Skyhigh Security debuts dashboard for unified data visibility and compliance

Skyhigh Security announced the launch of its risk-focused data visibility and compliance dashboard as part of Skyhigh DSPM’s Data Explorer. In April 2025, Data Security Posture Management (DSPM) was integrated into Skyhigh Security’s SSE framework to provide visibility into where data resides within cloud environments. The new dashboard provides unified, real-time visibility into an enterprise’s data security posture across hybrid and cloud environments, helping organizations maintain compliance with global privacy and data regulations. “As data … More → The post Skyhigh Security debuts dashboard for unified data visibility and compliance appeared first on Help Net Security.
http://news.poseidon-us.com/TPkrns

Henkel CISO on the messy truth of monitoring factories built across decades

In this Help Net Security interview, Stefan Braun, CISO at Henkel, discusses how smart manufacturing environments introduce new cybersecurity risks. He explains where single points of failure hide, how attackers exploit legacy systems, and why monitoring must adapt to mixed-generation equipment. His insights show why resilience depends on visibility, autonomy, and disciplined vendor accountability. What’s the most common architectural pattern you see that inadvertently creates a “single point of operational failure” in smart manufacturing environments? … More → The post Henkel CISO on the messy truth of monitoring factories built across decades appeared first on Help Net Security.
http://news.poseidon-us.com/TPkjcJ

The hidden dynamics shaping who produces influential cybersecurity research

Cybersecurity leaders spend much of their time watching how threats and tools change. A new study asks a different question, how has the research community itself changed over the past two decades. Researchers from the University of Southampton examined two long running conference communities, SOUPS and Financial Cryptography and Data Security, to see how teams form, who contributes, and which kinds of work gain attention. The result is a rare look at the structure behind … More → The post The hidden dynamics shaping who produces influential cybersecurity research appeared first on Help Net Security.
http://news.poseidon-us.com/TPkjb6

UTMStack: Open-source unified threat management platform

UTMStack is an open-source unified threat management platform that brings SIEM and XDR features into one system. The project focuses on real time correlation of log data, threat intelligence, and malware activity patterns gathered from different sources. The goal is to help organizations identify and halt complex threats that rely on stealthy techniques. UTMStack: Core capabilities The platform includes log management and correlation, threat detection and response, threat intelligence, alert investigation, file classification, AI-powered SOC … More → The post UTMStack: Open-source unified threat management platform appeared first on Help Net Security.
http://news.poseidon-us.com/TPkgj5

Scientists reveal a tiny brain chip that streams thoughts in real time

BISC is an ultra-thin neural implant that creates a high-bandwidth wireless link between the brain and computers. Its tiny single-chip design packs tens of thousands of electrodes and supports advanced AI models for decoding movement, perception, and intent. Initial clinical work shows it can be inserted through a small opening in the skull and remain stable while capturing detailed neural activity. The technology could reshape treatments for epilepsy, paralysis, and blindness.
http://news.poseidon-us.com/TPkd7m