433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Abstract Security unveils cloud-native cold storage for security telemetry

Abstract Security announced LakeVilla, a cloud-native cold storage solution built for long-term security telemetry retention that delivers compliance-ready, highly accessible storage at a fraction of SIEM costs—without compromising on performance or accessibility. “Security telemetry is exploding—but that doesn’t mean you should have to choose between storing it affordably and actually being able to access it when it matters,” said Colby DeRodeff, CEO of Abstract Security. “We designed LakeVilla so you never have to compromise again. … More → The post Abstract Security unveils cloud-native cold storage for security telemetry appeared first on Help Net Security.
http://news.poseidon-us.com/TLXxPV

Why the SOC needs its “Moneyball” moment

In the classic book and later Brad Pitt movie Moneyball, the Oakland A’s didn’t beat baseball’s giants by spending more – they won by thinking differently, scouting players not through gut instinct and received wisdom, but by utilizing relevant data and pattern recognition. While the rest of the league fixated on batting averages, they focused on what really mattered: getting on base. Security operations centers (SOCs) are at the same crossroads, and only those who … More → The post Why the SOC needs its “Moneyball” moment appeared first on Help Net Security.
http://news.poseidon-us.com/TLXxP6

Quantum computers just got an upgrade – and it’s 10× more efficient

Chalmers engineers built a pulse-driven qubit amplifier that’s ten times more efficient, stays cool, and safeguards quantum states—key for bigger, better quantum machines.
http://news.poseidon-us.com/TLXvk0

From posture to prioritization: The shift toward unified runtime platforms

In this Help Net Security interview, Rinki Sethi, Chief Security Officer at Upwind, discusses how runtime platforms help CISOs shift from managing tools to managing risk. She encourages CISOs to position runtime as a practical layer for real-time risk reduction, especially when facing legacy constraints. Looking ahead, she sees security leaders playing a bigger role in shaping infrastructure and innovation, with teams working more closely across functions as tools converge. What advice would you offer … More → The post From posture to prioritization: The shift toward unified runtime platforms appeared first on Help Net Security.
http://news.poseidon-us.com/TLXv27

Why should companies or organizations convert to FIDO security keys?

In this Help Net Security interview, Alexander Summerer, Head of Authentication at Swissbit, explains how FIDO security keys work, what threats they address, and why they’re gaining traction across industries, from healthcare to critical infrastructure. He also shares insights into their scalability, compliance advantages, and real-world deployment considerations. How do FIDO security keys differ from traditional authentication methods like passwords or SMS codes? FIDO security keys use public key cryptography to authenticate users, making them … More → The post Why should companies or organizations convert to FIDO security keys? appeared first on Help Net Security.
http://news.poseidon-us.com/TLXv1G

Companies negotiate their way to lower ransom payments

Nearly 50% of companies paid the ransom to recover their data, the second-highest rate in six years, according to Sophos. How actual payments stack up with the initial demand Ransom payments and recovery costs are on the decline Despite the high percentage of companies that paid the ransom, 53% paid less than the original demand. In 71% of cases where the companies paid less, they did so through negotiation, either through their own negotiations or … More → The post Companies negotiate their way to lower ransom payments appeared first on Help Net Security.
http://news.poseidon-us.com/TLXv0Q

Users lack control as major AI platforms share personal info with third parties

Some of the most popular generative AI and large language model (LLM) platforms, from companies like Meta, Google, and Microsoft, are collecting sensitive data and sharing it with unknown third parties, leaving users with limited transparency and virtually no control over how their information is stored, used, or shared, according to Incogni. AI platforms trap user data in training Many of these platforms, including Google’s Gemini, Meta AI, DeepSeek, and Pi.ai, do not appear to … More → The post Users lack control as major AI platforms share personal info with third parties appeared first on Help Net Security.
http://news.poseidon-us.com/TLXrZT

ISC Stormcast For Wednesday, June 25th, 2025 https://isc.sans.edu/podcastdetail/9504, (Wed, Jun 25th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TLXqWn

Federal identity management at a crossroads

GAO has recommended a closer look at eCBSV, Electronic Consent Based Social Security Number Verification. The post Federal identity management at a crossroads first appeared on Federal News Network.
http://news.poseidon-us.com/TLXk29