433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Lightrun brings live runtime context to AI site reliability engineering

Lightrun has announced real-time AI SRE built on live, in-line runtime context. This enables AI agents and engineering teams to dynamically generate missing evidence without redeployments, prove root causes with live execution data (“ground truth”), and validate fixes directly in live environments. The mass adoption of AI agents and coding assistants has accelerated code generation, outpacing reliability. This has shifted developer time from writing code to verifying and fixing issues, and moved the development bottleneck … More → The post Lightrun brings live runtime context to AI site reliability engineering appeared first on Help Net Security.
http://news.poseidon-us.com/TR9RQx

Intellicheck Desktop Application helps organizations combat identity theft

Intellicheck announced the roll out of its enriched Desktop Application. The new Desktop Application allows any sized organization to immediately stop identity theft and fraud losses. Implementation is immediate. No system integration is needed. This comes at minimal cost. The technology solution works with the scanners most organizations already have in place. Intellicheck’s Desktop Application is designed for customers of all sizes. The application ensures a superior, frictionless and rapid customer authentication experience. Businesses can … More → The post Intellicheck Desktop Application helps organizations combat identity theft appeared first on Help Net Security.
http://news.poseidon-us.com/TR9RQw

The $19.5 million insider risk problem

Routine employee activity across corporate systems carries an average annual cost of $19.5 million per organization. That figure comes from the 2026 Cost of Insider Risks Global Report, conducted by the Ponemon Institute and based on data from 354 organizations that experienced one or more material insider related incidents over the past year. Negligent or mistaken insiders account for the largest share of financial impact. These incidents generate $10.3 million in annualized cost per organization, … More → The post The $19.5 million insider risk problem appeared first on Help Net Security.
http://news.poseidon-us.com/TR9RQ4

APCON IntellaStore IV analyzes network traffic characteristics for further processing

Deploying the IntellaStore IV Network Security Appliance from APCON means easy installation, dedicated network packet capture, and a seamless workflow from traffic of interest to security and compliance tools. The release of APCON’s IntellaStore IV empowers network security engineers, business owners, office managers, and others to conveniently address network visibility (filtering, port tagging, etc.) as well as their vital security needs. With the APCON Intelligent Processor (AIp) running the server-side software, users are free to … More → The post APCON IntellaStore IV analyzes network traffic characteristics for further processing appeared first on Help Net Security.
http://news.poseidon-us.com/TR9RQ0

Open-source security debt grows across commercial software

Open source code sits inside nearly every commercial application, and development teams continue to add new dependencies. Black Duck’s 2026 Open Source Security and Risk Analysis Report data shows that nearly all audited codebases contain open source components, with average component counts rising sharply over the past year. That growth brings a parallel increase in exposure. Mean vulnerabilities per codebase climbed from 280 to 581 in one year, more than doubling. Median vulnerabilities also rose. … More → The post Open-source security debt grows across commercial software appeared first on Help Net Security.
http://news.poseidon-us.com/TR9RPv

Review: Digital Forensics, Investigation, and Response, 5th Edition

Digital Forensics, Investigation, and Response, 5th Edition presents a structured survey of the digital forensics discipline. The book spans foundational principles, platform specific analysis, specialized branches, and incident response integration. About the author Chuck Easttom has many years of practical experience across a wide range of computer science, mathematics, and related fields. He holds a Doctor of Science in Cyber Security, a Ph.D. in Nanotechnology, a Ph.D. in Computer Science, and four master’s degrees. He … More → The post Review: Digital Forensics, Investigation, and Response, 5th Edition appeared first on Help Net Security.
http://news.poseidon-us.com/TR9RP2

AI-driven DAST reduces manual setup and surfaces exploitable vulnerabilities

In this Help Net Security interview, Joni Klippert, CEO at StackHawk, discusses what defines DAST coverage in 2026 and why scan completion does not equal security. She explains how AI-driven DAST testing automates attack surface discovery, supports business-logic testing in pre-production, and reduces the manual setup that has limited adoption. Klippert also describes how organizations can implement runtime testing without instrumenting production systems. In 2026, what does “good DAST coverage” mean, and how should teams … More → The post AI-driven DAST reduces manual setup and surfaces exploitable vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TR9NFL

Hottest cybersecurity open-source tools of the month: February 2026

This month’s roundup features exceptional open-source cybersecurity tools that are gaining attention for strengthening security across various environments. Pompelmi: Open-source secure file upload scanning for Node.js Software teams building services in JavaScript are adding more layers of defense to handle untrusted file uploads. An open-source project called Pompelmi aims to insert malware scanning and policy checks directly into Node.js applications before files reach storage or business logic. Allama: Open-source AI security automation Allama is an … More → The post Hottest cybersecurity open-source tools of the month: February 2026 appeared first on Help Net Security.
http://news.poseidon-us.com/TR9NDJ

Finding Signal in the Noise: Lessons Learned Running a Honeypot with AI Assistance [Guest Diary], (Tue, Feb 24th)

[This is a Guest Diary by Austin Bodolay, an ISC intern as part of the SANS.edu BACS program]
http://news.poseidon-us.com/TR9J3J