433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

How to prevent data leakage in collaboration tools like Slack and Teams

In recent years, collaboration tools have become an absolute necessity for remote and hybrid work. This primarily increased during the COVID-19 pandemic due to the impossibility of communicating in person. So, tools like Slack, Microsoft Teams, and Zoom surged in popularity, enabling employees to stay connected despite physical distances. But this sudden transition to online communication opened up many questions related to security because the vast majority of employees were accessing sensitive information from home … More → The post How to prevent data leakage in collaboration tools like Slack and Teams appeared first on Help Net Security.
http://news.poseidon-us.com/TJM8VP

CBA technology teams facing cuts

Finance union says up to 164 roles may be impacted.
http://news.poseidon-us.com/TJM86B

The CISO’s bookshelf: 10 must-reads for security leaders

Discover essential reads for CISOs in this curated list of books covering cybersecurity leadership, risk management, zero trust, board communication, and more. Why CISOs Fail, 2nd Edition Author: Barak Engel Barak Engel expands on the ideas from his original 2017 book, offering a fresh perspective on why security leaders struggle to make a lasting impact. With a central thesis that security is more about human behavior than technology, Engel challenges traditional views of cybersecurity management. … More → The post The CISO’s bookshelf: 10 must-reads for security leaders appeared first on Help Net Security.
http://news.poseidon-us.com/TJM3j2

89% of enterprise AI usage is invisible to the organization

Organizations have zero visibility into 89% of AI usage, despite security policies according to a LayerX report. 71% of connections to GenAI tools are done using personal non-corporate accounts. Among logins using corporate accounts, 58% of connections are done without Single-Sign On (SSO). These interactions bypass organizational identity and access management (IAM) systems, leaving security teams blind to how GenAI tools are used and what data is being shared. Casual GenAI users unaware of data … More → The post 89% of enterprise AI usage is invisible to the organization appeared first on Help Net Security.
http://news.poseidon-us.com/TJM3gt

ISC Stormcast For Thursday, March 6th, 2025 https://isc.sans.edu/podcastdetail/9352, (Thu, Mar 6th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TJLzkW

Single-qubit sensing puts new spin on quantum materials discovery

Working at nanoscale dimensions, billionths of a meter in size, a team of scientists revealed a new way to measure high-speed fluctuations in magnetic materials. Knowledge obtained by these new measurements could be used to advance technologies ranging from traditional computing to the emerging field of quantum computing.
http://news.poseidon-us.com/TJLymv

The quest for room-temperature superconductors

Theoretical physicists reveal that room-temperature superconductivity is possible within the laws of our Universe, linked to fundamental constants like electron mass and Planck constant. Discovery could revolutionize energy, quantum computing, and medical tech by enabling superconductors to work at ambient conditions. Research explores how varying fundamental constants could alter superconductivity limits, offering a glimpse into the delicate balance of our Universe.
http://news.poseidon-us.com/TJLymX

DShield Traffic Analysis using ELK, (Thu, Mar 6th)

Using the Kibana interface, sometimes it can be difficult to find traffic of interest since there can be so much of it. The 3 logs used for traffic analysis are cowrie, webhoneypot and the firewall logs. Other options to add to the honeypot are packet capture, netflow and Zeek.
http://news.poseidon-us.com/TJLwsS