433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Skyflow delivers Runtime AI Data Security for protecting sensitive data in agentic workflows

Skyflow announced the launch of its Runtime AI Data Security platform for AWS AgentCore. While AI models are improving every few months and the industry is investing hundreds of billions of dollars on AI infrastructure, most organizations still struggle to move from demos and prototypes to production-grade agentic applications. As enterprises and the startups and ISVs that serve them begin deploying agentic applications in production, they need a reliable way to protect sensitive customer data. … More → The post Skyflow delivers Runtime AI Data Security for protecting sensitive data in agentic workflows appeared first on Help Net Security.
http://news.poseidon-us.com/TPZbpL

Upwind adds real-time AI security and posture management to its CNAPP

Upwind announced the launch of its integrated AI security suite, expanding the company’s CNAPP to protect the growing enterprise AI attack surface. The suite introduces real-time AI security, AI posture management, AI agents, and runtime protection, allowing AI security to benefit from the same deep cloud context that already powers Upwind’s CNAPP across data security, API security, identity, and cloud detection and response. “AI security should not be a stand-alone security component,” said Amiram Shachar, … More → The post Upwind adds real-time AI security and posture management to its CNAPP appeared first on Help Net Security.
http://news.poseidon-us.com/TPZbpF

Creative cybersecurity strategies for resource-constrained institutions

In this Help Net Security interview, Dennis Pickett, CISO at RTI International, talks about how research institutions can approach cybersecurity with limited resources and still build resilience. He discusses the tension between open research and the need to protect sensitive information, noting that workable solutions come from understanding how people get their jobs done. Pickett explains how security teams can partner with researchers to set guardrails that support innovation rather than slow it. He also … More → The post Creative cybersecurity strategies for resource-constrained institutions appeared first on Help Net Security.
http://news.poseidon-us.com/TPZbnc

Product showcase: UserLock IAM for Active Directory

UserLock brings modern identity and access management (IAM) to Active Directory, adding granular multi-factor authentication (MFA), contextual access controls, single sign-on (SSO) and real-time session management. It helps AD-first teams secure logons and govern access to network and SaaS resources without overhauling their identity stack. How UserLock works Real-time visibility into your AD environment For most AD teams, visibility is a big operational blind spot. Access controls are much more effective when you can see … More → The post Product showcase: UserLock IAM for Active Directory appeared first on Help Net Security.
http://news.poseidon-us.com/TPZVsZ

Attackers keep finding new ways to fool AI

AI development keeps accelerating while the safeguards around it move on uneven ground, according to The International AI Safety Report. Security leaders are being asked to judge exposure without dependable benchmarks. Developers build layered defenses Across the AI ecosystem, developers are adopting layered controls throughout the lifecycle. They combine training safeguards, deployment filters, and post release tracking tools. A model may be trained to refuse harmful prompts. After release, its inputs and outputs may pass … More → The post Attackers keep finding new ways to fool AI appeared first on Help Net Security.
http://news.poseidon-us.com/TPZVs2

The collapse of trust at the identity layer

Identity verification has become the latest front in the fight against industrialized fraud, according to a new report from Regula. The shift is visible across sectors that once relied on predictable verification routines. Criminals have learned to target the identity step itself, and the impact is spreading through financial services, healthcare, telecoms, crypto platforms, and aviation. Deepfake impersonation becomes the primary threat AI driven impersonation has moved into the mainstream. Deepfakes and synthetic identities have … More → The post The collapse of trust at the identity layer appeared first on Help Net Security.
http://news.poseidon-us.com/TPZSNW

Cybersecurity jobs available right now: December 2, 2025

Application Security Manager Oddity | Israel | On-site – View job details As an Application Security Manager, you will conduct threat modeling based on a deep understanding of product features and workflows. You will coordinate manual and automated penetration testing with a focus on high-risk, high-value functionality. You will lead and support incident response activities related to application-layer breaches, and you will develop dashboards and metrics to continuously monitor the organization’s application security posture. Cloud … More → The post Cybersecurity jobs available right now: December 2, 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TPZSNM

The Cloud Conundrum

The cloud transformation may be over. But the transformation is far from complete.
http://news.poseidon-us.com/TPZRSj

Seizing market shifts: Why it’s time for an infrastructure reset

When Hewlett Packard Enterprise finalised its US $14 billion acquisition of Juniper Networks earlier this year, most headlines focused on vendor consolidation.
http://news.poseidon-us.com/TPZNrx