433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Most enterprise AI use is invisible to security teams

Most enterprise AI activity is happening without the knowledge of IT and security teams. According to Lanai, 89% of AI use inside organizations goes unseen, creating risks around data privacy, compliance, and governance. This blind spot is growing as AI features are built directly into business tools. Employees often connect personal AI accounts to work devices or use unsanctioned services, making it difficult for security teams to monitor usage. Lanai says this lack of visibility … More → The post Most enterprise AI use is invisible to security teams appeared first on Help Net Security.
http://news.poseidon-us.com/TN4dZd

Arkime: Open-source network analysis and packet capture system

Arkime is an open-source system for large-scale network analysis and packet capture. It works with your existing security tools to store and index network traffic in standard PCAP format, making it easy to search and access. The solution includes a simple web interface for browsing, searching, and exporting PCAP files. Arkime also provides APIs for downloading PCAP data and session data in JSON format. Because Arkime uses standard PCAP files, you can analyze the data … More → The post Arkime: Open-source network analysis and packet capture system appeared first on Help Net Security.
http://news.poseidon-us.com/TN4bYh

What could a secure 6G network look like?

The official standards for 6G are set to be announced by the end of 2029. While the industry is moving towards consensus around how the 6G network will be built, it also needs to anticipate how it will be compromised and make sure to build it with a secure-by-design approach. Telecom industry leaders need to anticipate novel vulnerabilities and attacks specific for 6G. Unlike the previous generation of wireless, 6G will expand to even more … More → The post What could a secure 6G network look like? appeared first on Help Net Security.
http://news.poseidon-us.com/TN4bSw

Why neglected assets are the hidden threat attackers love to find

In this Help Net Security video, Tim Chase, Tech Evangelist at Orca Security, explores one of the most overlooked cybersecurity risks: neglected assets. From forgotten cloud resources and outdated OT systems to expired domains and abandoned storage, these hidden vulnerabilities quietly expand the attack surface. Chase explains how attackers exploit these blind spots, highlights recent guidance from CISA, and offers practical steps for organizations to improve visibility, lifecycle management, and governance to prevent breaches. The post Why neglected assets are the hidden threat attackers love to find appeared first on Help Net Security.
http://news.poseidon-us.com/TN4YH6

Static feeds leave intelligence teams reacting to irrelevant or late data

Boards and executives are not asking for another feed of indicators. They want to know whether their organization is being targeted, how exposed they are, and what steps need to be taken. A new report from Flashpoint argues that most current intelligence models cannot keep up with these demands and that primary source collection (PSC) should become the standard approach. Why current models fall short Intelligence feeds rely on aggregation of publicly available data or … More → The post Static feeds leave intelligence teams reacting to irrelevant or late data appeared first on Help Net Security.
http://news.poseidon-us.com/TN4YGC