433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Cisco enhances security for enterprise AI adoption

Cisco announced a suite of capabilities to help enterprises adopt agentic AI with confidence, combining agent protection, interaction governance, and resilient connectivity for AI-driven workflows. As organizations move from AI assistants to autonomous agents that use tools and data across hybrid environments, security teams need to strengthen agentic defenses, govern agent interactions with enterprise systems and external services, and maintain reliable, cryptographically protected connectivity at scale. “In the age of AI, safety and security are … More → The post Cisco enhances security for enterprise AI adoption appeared first on Help Net Security.
http://news.poseidon-us.com/TQtm1G

Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy

Global retail and beauty brands manage a unique cybersecurity balancing act. They depend on consumer trust, massive volumes of personal data, and a sprawling network of vendors, while also managing thousands of physical locations and dynamic digital growth. In this Help Net Security interview, Jérôme Etienne, Group CISO, Groupe Rocher shares practical insights on closing strategy gaps, managing third-party risk, and securing online and in-store environments. In the conversation, he also discusses why point-of-sale and … More → The post Groupe Rocher CISO on strengthening a modern retail cybersecurity strategy appeared first on Help Net Security.
http://news.poseidon-us.com/TQtk4n

Trellix SecondSight identifies subtle indicators of an active breach

Trellix announced Trellix SecondSight, a threat hunting service designed to proactively identify low-noise advanced threats often undetected, reducing organizational risk for Trellix customers. “Threat actors’ use of AI has significantly increased alert fatigue for security analysts,” said John Fokker, VP Threat Intelligence Strategy, Trellix. “While automated systems flag high-level alerts, they often miss subtle, low-noise signals enabling actions like lateral movement. Trellix SecondSight is a critical component, offering analysts a ‘second set of eyes’ to … More → The post Trellix SecondSight identifies subtle indicators of an active breach appeared first on Help Net Security.
http://news.poseidon-us.com/TQtk4f

Zen-AI-Pentest: Open-source AI-powered penetration testing framework

Zen-AI-Pentest provides an open-source framework for scanning and exercising systems using a combination of autonomous agents and standard security utilities. The project aims to let users run an orchestrated sequence of reconnaissance, vulnerability scanning, exploitation, and reporting using AI guidance and industry tools like Nmap and Metasploit. It is written to support command line, API, and web interfaces. Multi-agent structure and integrated tools Zen-AI-Pentest organizes its functionality around a set of agents that handle discrete … More → The post Zen-AI-Pentest: Open-source AI-powered penetration testing framework appeared first on Help Net Security.
http://news.poseidon-us.com/TQtk3r

Product showcase: PCAPdroid analyzes Android app network activity

PCAPdroid is a free, open-source Android app that allows inspection of network traffic. Installation is straightforward and does not require creating an account. To begin capturing traffic, a VPN request must be accepted, which allows the app to monitor network activity. Once permission is granted, tapping the play button starts PCAPdroid, which then runs in the background until stopped. Viewing connections The Connections tab displays active and past connections. For each entry, it shows which … More → The post Product showcase: PCAPdroid analyzes Android app network activity appeared first on Help Net Security.
http://news.poseidon-us.com/TQth6B

Security teams are paying for sprawl in more ways than one

Most enterprises run security programs across sprawling environments that include mobile devices, SaaS applications, cloud infrastructure, and telecom networks. Spend control in these areas often sits outside the security organization, even when the operational consequences land directly on security teams. Tangoe’s 2026 Trends & Savings Recommendations Report connects these cost domains to recurring governance failures that create risk exposure across identity, endpoint management, and infrastructure visibility. The report focuses on IT expense management across three … More → The post Security teams are paying for sprawl in more ways than one appeared first on Help Net Security.
http://news.poseidon-us.com/TQth5Q

Federal employees put into revived ‘Schedule F’ category may lose loan aid, pay incentives

Additional Schedule Policy/Career guidance follows the Trump administration’s final rule to strip job protections from certain career federal employees.
http://news.poseidon-us.com/TQtX05