433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Robots that feel heat, pain, and pressure? This new “skin” makes it possible

Researchers have created a revolutionary robotic skin that brings machines closer to human-like touch. Made from a flexible, low-cost gel material, this skin transforms the entire surface of a robotic hand into a sensitive, intelligent sensor. Unlike traditional robotic skins that rely on a patchwork of different sensors, this material can detect pressure, temperature, pain, and even distinguish multiple contact points all at once.
http://news.poseidon-us.com/TLPMVS

BigID Vendor AI Assessment reduces third-party AI risk

BigID launched Vendor AI Assessment, a solution designed to help organizations identify, evaluate, and manage the risks introduced by third-party AI usage. As vendors race to embed GenAI, large language models (LLMs), and autonomous agents into their products, organizations are left in the dark about how AI is being used – and what risks it introduces to their data, privacy, and compliance. Expanding on its capabilities in vendor management and third-party risk, BigID now enables … More → The post BigID Vendor AI Assessment reduces third-party AI risk appeared first on Help Net Security.
http://news.poseidon-us.com/TLP9v4

Hackers love events. Why aren’t more CISOs paying attention?

When CISOs think about risk, they usually think about cloud platforms, laptops, and data centers. But live events like conferences, trade shows, product launches, and shareholder meetings bring a different kind of cybersecurity exposure. These events gather people, devices, and sensitive information in one place, often for just a day or two. That makes them an appealing target. Events also combine digital and physical systems. A vulnerability in one area can lead to a breach … More → The post Hackers love events. Why aren’t more CISOs paying attention? appeared first on Help Net Security.
http://news.poseidon-us.com/TLP9tM

Before scaling GenAI, map your LLM usage and risk zones

In this Help Net Security interview, Paolo del Mundo, Director of Application and Cloud Security at The Motley Fool, discusses how organizations can scale their AI usage by implementing guardrails to mitigate GenAI-specific risks like prompt injection, insecure outputs, and data leakage. He explains that as GenAI features proliferate, organizations must implement guardrails to manage risk, especially around input/output handling and fine-tuning practices. Establishing these controls early ensures safe, compliant adoption without compromising innovation. For … More → The post Before scaling GenAI, map your LLM usage and risk zones appeared first on Help Net Security.
http://news.poseidon-us.com/TLP9sz

CURBy: A quantum random number generator you can verify

NIST and the University of Colorado Boulder have created a public service that delivers random numbers using quantum mechanics. Called the Colorado University Randomness Beacon (CURBy), the system offers a daily stream of certifiable random numbers generated through a process that no one can predict or manipulate. Instrumentation for the quantum random number generator (Source: NIST) For security professionals, randomness is essential. But most systems use pseudo-random numbers, which are generated by algorithms and can … More → The post CURBy: A quantum random number generator you can verify appeared first on Help Net Security.
http://news.poseidon-us.com/TLP9pS

CISOs brace for a surge in domain-based cyber threats

Cybersecurity threats are growing more complex, and domain-based attacks are at the center of this shift. CSC’s CISO Outlook 2025 report, based on a survey of 300 security leaders, reveals a rising sense of urgency as organizations confront both established and emerging threats. 70 percent of respondents expect an increase in cyber threats in 2025, and 98 percent believe risks will continue rising over the next three years. Domain-related threats, such as cybersquatting, DNS hijacking, … More → The post CISOs brace for a surge in domain-based cyber threats appeared first on Help Net Security.
http://news.poseidon-us.com/TLP6N5