433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Cytex AICenturion protects against data exfiltration

Cytex launched AICenturion, a LLM Firewall with Data Loss Prevention (DLP) capabilities. GenAI’s risks intensify as LLMs prevent enterprises from directly controlling their processes and data handling. AICenturion provides the trust, risk and security management that enterprises need by enabling AI model discovery, data loss prevention, threat mitigation, and compliance framework policy enforcement. “With the explosive adoption of LLMs, we’re seeing a new frontier of risk emerge: the exfiltration of sensitive data uploaded into LLMs, … More → The post Cytex AICenturion protects against data exfiltration appeared first on Help Net Security.
http://news.poseidon-us.com/TJcc1M

TXOne Networks Stellar 3.2 helps organizations make informed security choices

TXOne Networks announced Version 3.2 of its Stellar solution, further enhancing its capabilities from endpoint protection to more comprehensive detection and response in operational technology (OT) environments. Stellar simplifies the journey into threat hunting and detection while overcoming the limitations of traditional information technology (IT) endpoint detection and response (EDR) solutions, which can disrupt OT operations and productivity. Purpose-built for OT environments, Stellar ensures effective security without compromising system stability. “We have observed that alert … More → The post TXOne Networks Stellar 3.2 helps organizations make informed security choices appeared first on Help Net Security.
http://news.poseidon-us.com/TJcc1J

Keysight AI Insight Brokers accelerates threat detection and response

Keysight Technologies announces the expansion of its Keysight Vision Network Packet Brokers (NPBs), with the introduction of AI Insight Brokers. These enhanced NPBs are designed to improve the performance of AI-driven cybersecurity operations such as threat detection, incident response, and forensics. The AI Insight Broker is purpose built to support and leverage the capabilities of AI software, including Keysight’s newly developed AI Stack. As cyber threats continue to evolve, organizations need to look for new … More → The post Keysight AI Insight Brokers accelerates threat detection and response appeared first on Help Net Security.
http://news.poseidon-us.com/TJcc13

Outseer introduces Behavioral Biometrics capability

Outseer announced its platform-native Behavioral Biometrics capability. The addition of platformized Behavioral Biometrics introduces another layer of defense that continuously analyzes user interactions to detect anomalies in real time. Building on its rich RSA heritage (formerly RSA Fraud & Risk Intelligence), Outseer has enhanced its platform to counter modern cyber threats. As fraud evolves, spurred by the digitization of payments, the spread of personal data across the dark web, the growing threat of scams and … More → The post Outseer introduces Behavioral Biometrics capability appeared first on Help Net Security.
http://news.poseidon-us.com/TJcXx9

Orion Security emerges from stealth to combat insider threats with AI

Orion Security announced a $6 million Seed funding round led by Pico Partners and FXP with participation from Underscore VC and cybersecurity leaders including the founders of Perimeter 81 and the CISO of Elastic. Founded by CEO Nitay Milner, former product leader at Cisco-acquired Epsagon, and CTO Yonatan Kreiner, former application security lead at WalkMqe, Orion is already used by leading technology companies. Data exfiltration by insiders, both intentional and inadvertent, is a critical cybersecurity … More → The post Orion Security emerges from stealth to combat insider threats with AI appeared first on Help Net Security.
http://news.poseidon-us.com/TJcXw4

Moving beyond checkbox security for true resilience

In this Help Net Security interview, William Booth, director, ATT&CK Evaluations at MITRE, discusses how CISOs can integrate regulatory compliance with proactive risk management, prioritize spending based on threat-informed assessments, and address overlooked vulnerabilities like shadow IT and software supply chain risks. CISOs face increasing regulatory pressure. How should organizations balance compliance requirements with proactive cybersecurity measures that go beyond mere compliance? Compliance is a critical foundation, but it should be an organization’s cybersecurity strategy … More → The post Moving beyond checkbox security for true resilience appeared first on Help Net Security.
http://news.poseidon-us.com/TJcQcg

Dependency-Check: Open-source Software Composition Analysis (SCA) tool

Dependency-Check is an open-source Software Composition Analysis (SCA) tool to identify publicly disclosed vulnerabilities within a project’s dependencies. The tool analyzes dependencies for Common Platform Enumeration (CPE) identifiers. When a match is found, the tool generates a report with links to the relevant Common Vulnerabilities and Exposures (CVE) entries, helping teams address security risks. Dependency-Check main components The tool is made up of four main components: Engine: The central controller that orchestrates the execution of … More → The post Dependency-Check: Open-source Software Composition Analysis (SCA) tool appeared first on Help Net Security.
http://news.poseidon-us.com/TJcQcM

Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK

Advanced Data Protection (ADP) secures iCloud data with end-to-end encryption. This ensures that no one, not even Apple, can access the encrypted data, which remains secure even in the event of a cloud breach. As of February 21, 2025, Apple removed ADP for customers in the UK after the government demanded backdoor access to user data. Although the motivations behind the UK government’s request for backdoor access to user data are national security and combating … More → The post Protecting your iCloud data after Apple’s Advanced Data Protection removal in the UK appeared first on Help Net Security.
http://news.poseidon-us.com/TJcQbT

ISC Stormcast For Wednesday, March 19th, 2025 https://isc.sans.edu/podcastdetail/9370, (Wed, Mar 19th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TJcKMk

Dialing in the temperature needed for precise nuclear timekeeping

For decades, atomic clocks have been the pinnacle of precision timekeeping, enabling GPS navigation, cutting-edge physics research, and tests of fundamental theories. But researchers are now pushing beyond atomic transitions to something potentially even more stable: a nuclear clock.
http://news.poseidon-us.com/TJcJdd