433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Holly Ventures launches $33 million fund focused on early-stage cyber innovation

Holly Ventures announced the launch of its $33 million debut fund, a solo-led cybersecurity vehicle built around a simple idea that for early-stage cyber start-ups, access and value matter more than capital. Founded by John Brennan, formerly a Senior Partner at YL Ventures, Holly Ventures is positioned as a counter-model to the large cybersecurity platforms. Instead of competing on fund size or AI-driven messaging, the firm focuses on day zero, the stage when founders need … More → The post Holly Ventures launches $33 million fund focused on early-stage cyber innovation appeared first on Help Net Security.
http://news.poseidon-us.com/TPk37V

Nudge Security expands platform with new AI governance capabilities

Nudge Security announced an expansion of its platform to address the need for organizations to mitigate AI data security risks while supporting workforce AI use. New capabilities include: AI conversation monitoring: Detect sensitive data shared via file uploads and conversations with AI chatbots including ChatGPT, Gemini, Microsoft Copilot, and Perplexity Policy enforcement via the browser: Delivery of guardrails to employees as they interact with AI tools to educate and enforce the organization’s acceptable use policy … More → The post Nudge Security expands platform with new AI governance capabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TPjvCb

New Black Kite module offers product-level insight into software supply chain vulnerabilities

Black Kite released its new Product Analysis module, which allows security teams to evaluate the risks of third-party software products at a granular level. As the first TPRM platform to offer this capability, Black Kite provides a more detailed view of exposure and supports better decision-making around specific products and vendor outreach. The new module delivers intelligence on software supply chain risk through deep downloadable software analysis (CPE), SaaS subdomain analysis, and SBOM analysis. “Organizations … More → The post New Black Kite module offers product-level insight into software supply chain vulnerabilities appeared first on Help Net Security.
http://news.poseidon-us.com/TPjvC4

watchTowr Active Defense delivers automated protection from exposure to defense

watchTowr announced major capability enhancements, including the launch of Active Defense, a new capability that closes the gap between discovery and protection. Active Defense delivers automated, intelligence-driven protection the moment a validated exposure is identified, providing defenders with near-instant coverage when patches or vendor guidance are unavailable. These updates advance watchTowr’s mission to stay ahead of the threat curve by reacting to emerging threats and vulnerabilities, reproducing them with precision, and empowering customers to protect … More → The post watchTowr Active Defense delivers automated protection from exposure to defense appeared first on Help Net Security.
http://news.poseidon-us.com/TPjv9v

AI-driven threats are heading straight for the factory floor

In this Help Net Security interview, Natalia Oropeza, Chief Cybersecurity Officer at Siemens, discusses how industrial organizations are adapting to a shift in cyber risk driven by AI. She notes that in-house capability, especially for OT response and recovery, is becoming a priority. Oropeza also explains why collaboration and a different mindset are becoming as important as the technology. How are you adapting Siemens’ threat models to account for AI-driven attacks that may unfold in … More → The post AI-driven threats are heading straight for the factory floor appeared first on Help Net Security.
http://news.poseidon-us.com/TPjchX

AI agents break rules in unexpected ways

AI agents are starting to take on tasks that used to be handled by people. These systems plan steps, call tools, and carry out actions without a person approving every move. This shift is raising questions for security leaders. A new research paper offers one of the first attempts to measure how well these agents stay inside guardrails when users try to push them off course. The work comes from a group of researchers at … More → The post AI agents break rules in unexpected ways appeared first on Help Net Security.
http://news.poseidon-us.com/TPjchC

New image signature can survive cropping, stop deepfakes from hijacking trust

Deepfake images can distort public debate, fuel harassment, or shift a news cycle before anyone checks the source. A new study from researchers at the University of Pisa examines one specific part of this problem. They introduced a way to keep image signatures intact even after cropping. System model Cropping remains a weak spot in image verification Most authentication tools fail the moment a photo is altered. Even small changes like trimming edges turn a … More → The post New image signature can survive cropping, stop deepfakes from hijacking trust appeared first on Help Net Security.
http://news.poseidon-us.com/TPjcfZ

Cybersecurity jobs available right now: December 9, 2025

Associate Analyst, Cyber Threat Intelligence Sony | USA | Remote – View job details As an Associate Analyst, Cyber Threat Intelligence, you will collect and analyze open-source threat data to identify signs of cyber threats. You will prepare analysis reports, threat assessments, and briefings for GSIRT and its stakeholders. You will also support projects that improve data collection, interpretation, and other threat intelligence processes. Cyber Security Manager Chubb Fire & Security | Australia | On-site … More → The post Cybersecurity jobs available right now: December 9, 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TPjXqd