433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

The defense industrial base is a prime target for cyber disruption

Cyber threats against the defense industrial base (DIB) are intensifying, with adversaries shifting from traditional espionage toward operations designed to disrupt production capacity and compromise supply chains. In this Help Net Security interview, Luke McNamara, Deputy Chief Analyst, Google Threat Intelligence Group, explains how attackers target the broader defense ecosystem and why identity has become the new security boundary. At a strategic level, how do cyber operations against the defense industrial base differ from espionage … More → The post The defense industrial base is a prime target for cyber disruption appeared first on Help Net Security.
http://news.poseidon-us.com/TR1bMP

Everyone uses open source, but patching still moves too slowly

Enterprise security teams rely on open source across infrastructure, development pipelines, and production applications, even when they do not track it as a separate category of technology. Open source has become a default building block in many environments, and the operational risks now look like standard enterprise security problems: patch delays, version sprawl, and aging platforms that stay online longer than planned. TuxCare’s 2026 Open Source Landscape Report describes an open source footprint that continues … More → The post Everyone uses open source, but patching still moves too slowly appeared first on Help Net Security.
http://news.poseidon-us.com/TR1bML

Cybersecurity in cross-border logistics operations

In this Help Net Security video, Dieter Van Putte, CTO at Landmark Global, discusses how cybersecurity has become a core part of global supply chain operations. He explains that logistics is now also about data moving between carriers, customs authorities, warehouses, brokers, and customers. That constant flow increases risk and expands the attack surface. Van Putten outlines key security priorities, including encrypted data transfers, secure APIs, strict access control, and data minimization. He stresses that … More → The post Cybersecurity in cross-border logistics operations appeared first on Help Net Security.
http://news.poseidon-us.com/TR1bL0

SecureClaw: Dual stack open-source security plugin and skill for OpenClaw

AI agent frameworks are being used to automate work that involves tools, files, and external services. That type of automation creates security questions around what an agent can access, what it can change, and how teams can detect risky behavior. SecureClaw is an open-source project that adds security auditing and rule-based controls to OpenClaw agent environments. The tool is published by Adversa AI and is designed to work with OpenClaw and related agents such as … More → The post SecureClaw: Dual stack open-source security plugin and skill for OpenClaw appeared first on Help Net Security.
http://news.poseidon-us.com/TR1XJj

As DHS shutdown stretches on, negotiations take place with Congress out of town

“We could have a situation where the shutdown is persisting while the president is talking at the State of the Union,” Loren Duggan said.
http://news.poseidon-us.com/TR1R4H

As DHS shutdown stretches on, negotiations take place with Congress out of town

“We could have a situation where the shutdown is persisting while the president is talking at the State of the Union,” Loren Duggan said.
http://news.poseidon-us.com/TR1Qww

DIA consolidates open source, media exploitation organizations

The DIA has consolidated the National Media Exploitation Center and the Open Source Intelligence Integration Center into a single organization.
http://news.poseidon-us.com/TR1Nfh