433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Funding uncertainty may spell the end of MITRE’s CVE program

The future of the Common Vulnerabilities and Exposures (CVE) program hangs in the balance: MITRE, the not-for-profit US organization that runs it, could lose the US federal funding that helps them maintain it. But others have been waiting in the wings and are getting ready to pick up the vulnerability tracking mantle. “On Wednesday, April 16, 2025, the current contracting pathway for MITRE to develop, operate, and modernize CVE and several other related programs, such … More → The post Funding uncertainty may spell the end of MITRE’s CVE program appeared first on Help Net Security.
http://news.poseidon-us.com/TKBdvv

Federal judge blocks Labor Department from enforcing key part of Trump’s anti-DEI executive orders

Judge Kennelly of the U.S. District Court for the Northern District of Illinois issued the ruling in response to a lawsuit filed by Chicago Women in Trades. The post Federal judge blocks Labor Department from enforcing key part of Trump’s anti-DEI executive orders first appeared on Federal News Network.
http://news.poseidon-us.com/TKBcnr

Dell’s Cyber Resilience Solutions Safeguard Your Business Data

Overcome cyber threats with Dell’s relentless cyber resilience solutions that enable swift recovery when attacks hit.
http://news.poseidon-us.com/TKBVdN

Small AI models set to gain enterprise traction: Gartner

In the next two years, organizations will use small, task-specific models three times more than general-purpose LLMs, the analyst firm predicts.
http://news.poseidon-us.com/TKBVDq

Introducing the refreshed Recorded Future brand

Learn how Recorded Future’s brand refresh, powered by AI and actionable threat intelligence, helps teams evolve with the next generation of cybersecurity.
http://news.poseidon-us.com/TKBR0Q

Cato Networks unveils GenAI security controls for Cato CASB

Cato Networks introduced GenAI security controls for Cato CASB (Cloud Access Security Broker). Cato CASB, a native feature in the Cato SASE Cloud Platform, is now enhanced with new capabilities for GenAI applications including a shadow AI dashboard and policy engine. With the shadow AI dashboard, enterprises can detect, analyze, and gain insights into the use of GenAI. With the policy engine, enterprises can take control of user activities in GenAI applications. Combined, Cato is enabling security … More → The post Cato Networks unveils GenAI security controls for Cato CASB appeared first on Help Net Security.
http://news.poseidon-us.com/TKBJj8

NEC Identity Cloud Service simplifies identity verification

NEC introduces Identity Cloud Service (ICS), a new identity verification solution to deliver streamlined, secure and cost-effective access management. Based on NEC’s biometric technology, ICS provides verification and search capabilities for corporations and global enterprises, financial services, hospitality, e-commerce, government services agencies and more. “ICS is an efficient, high-performance identity verification solution that allows organizations to access NEC’s top-ranked face recognition technology quickly and affordably,” says Eugene Le Roux, SVP of Digital Government for NEC … More → The post NEC Identity Cloud Service simplifies identity verification appeared first on Help Net Security.
http://news.poseidon-us.com/TKBJhG

When companies merge, so do their cyber threats

For CISOs, mergers and acquisitions (M&A) bring both potential and risk. These deals can drive growth, but they also open the door to serious cybersecurity threats that may derail the transaction. Strong due diligence, smart risk planning, and a shared security mindset can help keep deals on track and protect the business. Key cybersecurity risks in M&A 1. Inherited vulnerabilities: Acquiring a company means inheriting its existing cybersecurity weaknesses. If the target company has unresolved … More → The post When companies merge, so do their cyber threats appeared first on Help Net Security.
http://news.poseidon-us.com/TKBDz7

Strategic AI readiness for cybersecurity: From hype to reality

AI readiness in cybersecurity involves more than just possessing the latest tools and technologies; it is a strategic necessity. Many companies could encounter serious repercussions, such as increased volumes of advanced cyber threats, if they fail to exploit AI due to a lack of clear objectives, inadequate data readiness or misalignment with business priorities. Foundational concepts are vital for constructing a robust AI-readiness framework for cybersecurity. These concepts encompass the organization’s technology, data, security, governance … More → The post Strategic AI readiness for cybersecurity: From hype to reality appeared first on Help Net Security.
http://news.poseidon-us.com/TKBDyd

Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques

MITRE’s Attack Flow project aims to translate complex cyber operations into a structured language. By describing how adversaries sequence and combine offensive techniques to reach their objectives, Attack Flow offers defenders, analysts, and decision-makers a tool to see the bigger picture. Threat intelligence Cyber threat intel (CTI) teams can use Attack Flow to show how attackers behave, not just what tools they use. It tracks activity across incidents, campaigns, or threat groups. Because it’s machine-readable, … More → The post Attack Flow: Learn how cyber adversaries combine and sequence offensive techniques appeared first on Help Net Security.
http://news.poseidon-us.com/TKBDxp