433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Veritone secures AI data with automated PII removal

Veritone deploys Veritone Redact with Veritone Data Refinery (VDR) to remove personally identifiable information (PII) and sensitive data before processing, enabling AI-ready data while protecting intellectual property (IP) and data owner rights. As the scale and stakes for AI deployments and applications put pressure on enterprises and hyperscalers alike to ensure AI training data is properly licensed with PII and other sensitive data removed, VDR is designed to help ensure the data is clean from … More → The post Veritone secures AI data with automated PII removal appeared first on Help Net Security.
http://news.poseidon-us.com/TRXjKX

Imprivata enhances NHS access security with passwordless controls

Imprivata has introduced new capabilities designed to help NHS organisations and UK healthcare providers meet the unique demands of the UK’s evolving compliance, cybersecurity, data protection landscape, including the Cyber Assessment Framework (CAF)-aligned Data Security and Protection Toolkit (DSPT) and Care Identity Service (Spine) Authentication. Imprivata Enterprise Access Management (EAM) offers context-aware passwordless authentication, high-assurance identity verification, and AI-powered behavioral analytics, expanding the company’s leading solutions for improving workflow productivity while meeting the unique demands … More → The post Imprivata enhances NHS access security with passwordless controls appeared first on Help Net Security.
http://news.poseidon-us.com/TRXZ7P

Proofpoint addresses AI threats with intent-based security

Proofpoint has announced Proofpoint AI Security, the newest security solution that combines intent-based detection, multi-surface control points, and a comprehensive implementation framework to secure how humans and AI agents use AI across the enterprise. Based on the Agent Integrity Framework, which defines how an AI agent operates with integrity, Proofpoint is introducing a five-phase maturity model for implementation, from initial discovery through runtime enforcement. As organizations rapidly deploy autonomous AI agents to browse the web, … More → The post Proofpoint addresses AI threats with intent-based security appeared first on Help Net Security.
http://news.poseidon-us.com/TRXZ65

Jozu Agent Guard targets AI agents that evade controls

Jozu has announced the launch of Jozu Agent Guard, a zero-trust AI runtime that executes agents, models, and MCP servers in secure environments with built-in policy enforcement and guardrails that cannot be disabled. As enterprises adopt AI agents, MCP servers, and tools such as Copilot, OpenClawd, and Claude Code, security teams face a growing gap. Employees are running these tools on their machines without formal vetting, policies, approvals, or security scans. Jozu Agent Guard allows … More → The post Jozu Agent Guard targets AI agents that evade controls appeared first on Help Net Security.
http://news.poseidon-us.com/TRXX6G

Microsoft zeroes in on AI-driven data risks in Fabric

New Microsoft Purview innovations for Microsoft Fabric help organizations secure data and accelerate AI adoption. The updates focus on identifying risks, preventing data oversharing, and strengthening governance and data quality across the data estate. Integration between Microsoft Purview and Microsoft Fabric delivers unified data security and governance, enabling protection of sensitive data, maintaining visibility across the data environment, and supporting data readiness for AI use. “Microsoft Purview and Microsoft Fabric deliver an integrated and unified … More → The post Microsoft zeroes in on AI-driven data risks in Fabric appeared first on Help Net Security.
http://news.poseidon-us.com/TRXX69

Millions of UK firms on alert after Companies House data exposure

Companies House, the UK’s official company registry, said its WebFiling service is back online after being shut down on Friday to fix a security issue that may have exposed the personal data of millions of firms. An investigation indicates the flaw was likely introduced during an October 2025 update. According to Companies House, only users who were logged in and had a valid authentication code could have exploited the flaw. However, the vulnerability raised concerns … More → The post Millions of UK firms on alert after Companies House data exposure appeared first on Help Net Security.
http://news.poseidon-us.com/TRXX5q

Traefik Triple Gate gains parallel safety pipelines, failover routing, and AI runtime controls

Traefik Labs has announced new capabilities that extend Traefik Hub’s Triple Gate architecture (API Gateway, AI Gateway, and MCP Gateway) with deeper runtime governance across the full AI workflow, including a composable multi-vendor safety pipeline with parallel guard execution, multi-provider failover routing, token-level cost controls, graceful error handling for agent-aware enforcement, IBM Granite Guardian integration, and a new Regex Guard capability that enables organizations to create custom guards. These capabilities address a growing gap. Enterprises … More → The post Traefik Triple Gate gains parallel safety pipelines, failover routing, and AI runtime controls appeared first on Help Net Security.
http://news.poseidon-us.com/TRXP93

Hidden instructions in README files can make AI agents leak data

Developers rely on AI coding agents to set up projects, install dependencies, and run commands by following instructions in repository README files, which provide setup guidance for software projects. New research identifies a security risk when attackers hide malicious instructions in those documents. A semantic injection attack, where injections are embedded in an installation file, leading to the unintended leakage of sensitive local files. Tests showed that hidden instructions in README files could trigger AI … More → The post Hidden instructions in README files can make AI agents leak data appeared first on Help Net Security.
http://news.poseidon-us.com/TRXLz0

What to do in the first 24 hours of a breach

In this Help Net Security video, Arvind Parthasarathi, CEO of CYGNVS, walks through a 10-step process for handling a cybersecurity breach. The first five steps cover preparation: setting up an out-of-band communication platform, identifying internal stakeholders, selecting external providers like legal counsel and forensic firms, building cross-functional playbooks, and running tabletop exercises to test those playbooks. The second five steps address what to do once a breach is underway. These include setting up real-time dashboards, … More → The post What to do in the first 24 hours of a breach appeared first on Help Net Security.
http://news.poseidon-us.com/TRXJWM