433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Illumio Insights brings agentless visibility and breach containment to hybrid environments

Illumio unveiled its solution to deliver agentless visibility and breach containment across both data center and cloud environments. Illumio Insights ingests real-time telemetry and policy data from Check Point and Fortinet firewalls, converting existing firewall information into real-time traffic maps to provide agentless visibility across the hybrid environment. This extends Illumio Insights into data center and endpoint estates, providing end-to-end view and analysis of network posture. By ingesting native firewall telemetry, Insights can map data … More → The post Illumio Insights brings agentless visibility and breach containment to hybrid environments appeared first on Help Net Security.
http://news.poseidon-us.com/TRBfj7

AuthMind enhances identity observability to secure vaults, secrets, and NHIs

AuthMind has announced that its platform offers enhanced capabilities to address the fast-growing security concerns surrounding vaults, secrets managers, and AI-driven workloads. Since its founding, AuthMind has focused on securing identity access and execution paths across agentic AI, non-human identities (NHIs), and human users, enabling enterprises to observe what identities actually do across cloud, network and infrastructure environments. As adoption of agentic AI and automation accelerates, the identity-to-secret attack surface has expanded, increasing the urgency … More → The post AuthMind enhances identity observability to secure vaults, secrets, and NHIs appeared first on Help Net Security.
http://news.poseidon-us.com/TRBfj4

Ransomware activity peaks outside business hours

Intrusions continue to center on credential access and timed execution outside standard business hours. The Sophos Active Adversary Report 2026 analyzes 661 incident response and managed detection and response cases handled between November 1, 2024 and October 31, 2025, spanning organizations in 70 countries. The dataset examines how attackers gain access, how quickly they reach key systems, and when ransomware and data theft occur. Identity-related root causes as a proportion of all cases covered in … More → The post Ransomware activity peaks outside business hours appeared first on Help Net Security.
http://news.poseidon-us.com/TRBfgQ

NATO greenlights iPhone and iPad for classified information handling

Apple confirmed that the iPhone and iPad have been approved for use with classified information in NATO restricted environments. The devices will no longer require special software or settings to handle NATO restricted-level information. “This achievement recognizes that Apple has transformed how security is traditionally delivered. Prior to iPhone, secure devices were only available to sophisticated government and enterprise organizations after a massive investment in bespoke security solutions,” stated Ivan Krstić, Apple’s VP of Security … More → The post NATO greenlights iPhone and iPad for classified information handling appeared first on Help Net Security.
http://news.poseidon-us.com/TRBYxS

Oculeus 2FN authenticates calls in real time to stop CLI spoofing

Oculeus has launched its new Two Factor Network (2FN) solution. The 2FN solution provides a framework for telcos to trace the origin of traffic, verify caller identity, determine the roaming status of inbound calls, and prevent Caller Line Identification (CLI) spoofing. The landscape of fraud has been changed by cybercrime-as-a-service with the evolution of specialized criminal gangs that subvert communications networks at scale, then sell their services to less technically skilled scammers worldwide. The services … More → The post Oculeus 2FN authenticates calls in real time to stop CLI spoofing appeared first on Help Net Security.
http://news.poseidon-us.com/TRBWSN

N-able’s Anomaly Detection feature identifies credential-based threats

N-able expanded its Anomaly Detection capabilities in Cove Data Protection to combat the surge in identity-driven cyberattacks targeting backup environments. The new functionality delivers real-time alerts when suspicious or unauthorized changes to backup policies are detected, giving customers an early warning system against the credential-based tactics attackers use to disable or corrupt backups before deploying ransomware. Identity-based attacks have become a major driver of successful cyberattacks, with AI making these schemes even more convincing. With … More → The post N-able’s Anomaly Detection feature identifies credential-based threats appeared first on Help Net Security.
http://news.poseidon-us.com/TRBWSM

Android app uses Bluetooth signals to detect nearby smart glasses

Smart glasses with built-in cameras are showing up in more public spaces, and a growing number of people want a way to know when one is nearby. An Android app called Nearby Glasses, developed by Yves Jeanrenaud, attempts to fill that gap by scanning Bluetooth Low Energy traffic for manufacturer identifiers associated with known smart glasses makers. The project cites several reported incidents that motivated its development, including documented cases of Meta Ray-Ban glasses being … More → The post Android app uses Bluetooth signals to detect nearby smart glasses appeared first on Help Net Security.
http://news.poseidon-us.com/TRBWRj

Varist Hybrid Detection Engine protects against AI-assisted malware

Varist launched the Hybrid Detection Engine, creating an AI-scale malware detection solution that detects both known and zero-day threats. Built on proven technology used to perform more than 500 billion file scans per day for global customers, the Varist solution surpasses conventional detection by scanning every file and simulating suspicious components in real time. By combining unknown threat detection, lower costs and hyperscale scanning, the Varist Hybrid Detection Engine meets the exponentially growing data demands … More → The post Varist Hybrid Detection Engine protects against AI-assisted malware appeared first on Help Net Security.
http://news.poseidon-us.com/TRBWQD

Versa introduces cloud-based sovereign solution for enterprises of all sizes

Versa released Sovereign SASE-as-a-Service, a cloud-delivered SaaS offering in which the data, control, and management planes operate entirely within a region’s legal jurisdiction. Digital sovereignty has moved from a compliance consideration to a board-level decision. Across Europe and other regions, governments are asserting stronger authority over data residency and protection. The European Union’s GDPR, NIS2, and DORA frameworks are tightening enforcement standards, and data residency alone is no longer sufficient. Most SASE offerings fall short … More → The post Versa introduces cloud-based sovereign solution for enterprises of all sizes appeared first on Help Net Security.
http://news.poseidon-us.com/TRBS42

Backblaze launches two tools to automate endpoint backup management

Backblaze announced two new tools for Backblaze Computer Backup designed to give IT teams greater control, consistency, and automation across endpoint deployments: the Advanced Installer and the Backblaze Command Line Interface (bzcli). Backblaze Computer Backup has long been known for its simplicity. Install it, and it runs quietly in the background protecting data. While this works well for many organizations, IT teams managing large or distributed environments have increasingly asked for deeper configuration control during … More → The post Backblaze launches two tools to automate endpoint backup management appeared first on Help Net Security.
http://news.poseidon-us.com/TRBS3x