433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Ikea picks data, analytics chief

Francesco Marzoni, former chief data and analytics officer of Ikea Retail, departed the company last month and will join travel retailer Avolta.
http://news.poseidon-us.com/TN18qx

Feedback Requested: NIST Cryptographic Module Validation Program White Paper

The NIST National Cybersecurity Center of Excellence (NCCoE) has published the draft NIST Cybersecurity White Paper (CSWP) 37B, Automation of the NIST Cryptographic Module Validation Program (ACMVP). The purpose of this project is to support
http://news.poseidon-us.com/TN16ln

Cynomi simplifies vendor risk management

Cynomi has launched its Third-Party Risk Management (TPRM) module. Delivered as an add-on to the Cynomi vCISO Platform, the new capability integrates vendor risk management into existing service providers’ workflows. The global third-party risk management market, valued at $7.42 billion in 2023, is forecast to more than double, reaching $20.59 billion by 2030. Cynomi’s new TPRM module opens up a valuable business opportunity for service providers. It helps their clients deal with a pressing challenge: … More → The post Cynomi simplifies vendor risk management appeared first on Help Net Security.
http://news.poseidon-us.com/TN12wH

Hush Security emerges from stealth to replace legacy vaults with secretless access

Hush Security has raised $11 million in seed funding led by Battery Ventures and YL Ventures. As agentic AI expands, Hush replaces legacy vaults and secrets across the enterprise with just-in-time, policy-driven access controls enforced at runtime. This approach eliminates the operational and security risks of traditional vaults and secrets managers, delivering a faster, safer way to secure machine-to-machine access. Gartner predicts that 40% of organizations will adopt a secretless approach by 2027 as the … More → The post Hush Security emerges from stealth to replace legacy vaults with secretless access appeared first on Help Net Security.
http://news.poseidon-us.com/TN0xpF

When typing becomes tracking: Study reveals widespread silent keystroke interception

You type your email address into a website form but never hit submit. Hours later, a marketing email shows up in your inbox. According to new research, that is not a coincidence. A team of researchers from UC Davis, Maastricht University, and other institutions has found that many websites collect keystrokes as users type, sometimes before a form is ever submitted. The study explores how third-party scripts capture and share this information in ways that … More → The post When typing becomes tracking: Study reveals widespread silent keystroke interception appeared first on Help Net Security.
http://news.poseidon-us.com/TN0xmm

How attackers weaponize communications networks

In this Help Net Security interview, Gregory Richardson, Vice President, Advisory CISO Worldwide, at BlackBerry, talks about the growing risks to communications networks. He explains why attackers focus on these networks and how their motivations range from corporate espionage to geopolitical influence. The discussion also covers practical ways to secure networks and maintain reliable communication. Which types of communications networks are most attractive to attackers, and what are the primary motivations driving these attacks, such … More → The post How attackers weaponize communications networks appeared first on Help Net Security.
http://news.poseidon-us.com/TN0xkt

AI is everywhere, but scaling it is another story

AI is being adopted across industries, but many organizations are hitting the same obstacles, according to Tines. IT leaders say orchestration is the key to scaling AI. They point to governance, visibility, and collaboration as the critical areas executives need to watch. Views on Al and orchestration in the organization (Source: Tines) Companies invest heavily in AI Organizations are pouring resources into AI, yet many initiatives remain isolated or slow-moving. Without a coordinated approach, AI … More → The post AI is everywhere, but scaling it is another story appeared first on Help Net Security.
http://news.poseidon-us.com/TN0t98

The state of DMARC adoption: What 10M domains reveal

In this Help Net Security video, John Wilson, Senior Fellow, Threat Research at Fortra, explores the state of DMARC adoption across the top 10 million internet domains. He explains how SPF, DKIM, and DMARC work together to prevent email spoofing, why misconfigurations like “+all” can be dangerous, and why so few organizations have strong DMARC policies in place even though the standard has been around since 2012. Wilson shares surprising statistics from his research, highlights … More → The post The state of DMARC adoption: What 10M domains reveal appeared first on Help Net Security.
http://news.poseidon-us.com/TN0t8S

Why organizations need a new approach to risk management

To succeed in the risk environment, risk, audit, and compliance leaders need to focus on what Gartner calls “reflexive risk ownership.” This is a future state where business leaders don’t just identify and manage risks after they occur, but instinctively recognize and respond to them as part of their daily decision-making. Rethink risk management At the opening keynote of the Gartner Enterprise Risk, Audit & Compliance Conference, Gartner experts highlighted how risks are now emerging … More → The post Why organizations need a new approach to risk management appeared first on Help Net Security.
http://news.poseidon-us.com/TN0t7c

APT Travel Group grows online sales 175% with Contentful-powered digital transformation

APT Travel Group transformed its digital presence by migrating from Sitecore to Contentful, unlocking editorial autonomy, streamlining content management across six brands, and driving a 175% boost in online transactions through a more flexible, visually rich, and customer-centric platform.
http://news.poseidon-us.com/TN0s8W