433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Agencies plan to decommission hundreds of .gov websites following GSA review

Thomas Shedd, commissioner of GSA’s Technology Transformation Services, directed agencies to eliminate the “low-hanging fruit” of unnecessary federal websites. The post Agencies plan to decommission hundreds of .gov websites following GSA review first appeared on Federal News Network.
http://news.poseidon-us.com/TLn5gh

How to derive offensive benefits from AI-cyber convergence

Dynamic cyber: Gaining an offensive advantage through AI The post How to derive offensive benefits from AI-cyber convergence first appeared on Federal News Network.
http://news.poseidon-us.com/TLn5fW

How to derive offensive benefits from AI-cyber convergence

Dynamic cyber: Gaining an offensive advantage through AI The post How to derive offensive benefits from AI-cyber convergence first appeared on Federal News Network.
http://news.poseidon-us.com/TLn4xR

How IT leaders infuse cyber hygiene into daily work

For technology chiefs, a “do as I say, not as I do” stance could lead to a security breach. Instead, cyber awareness can be taught by example.
http://news.poseidon-us.com/TLmsmv

Software executives prepare for the rise of agentic AI

Nearly half of organizations are deploying agentic orchestration to power code reviews, automate testing and accelerate deal cycles, making once-impossible productivity gains a daily reality.
http://news.poseidon-us.com/TLmm4f

What’s My (File)Name?, (Mon, Jul 7th)

Modern malware implements a lot of anti-debugging and anti-analysis features. Today, when a malware is spread in the wild, there are chances that it will be automatically sent into a automatic analysis pipe, and a sandbox. To analyze a sample in a sandbox, it must be “copied” into the sandbox and executed. This can happen manually or automatically. When people start the analysis of a suspicious file, they usually call it “sample.exe”, “malware.exe” or “suspicious.exe”. It's not always a good idea because it's can be detected by the malware and make it aware that “I'm being analyzed”.
http://news.poseidon-us.com/TLml8Q

July 2025 Patch Tuesday forecast: Take a break from the grind

There was a barrage of updates released the week of June 2025 Patch Tuesday. This included security updates from Adobe, Google, Microsoft, Mozilla, and others. But it has been ‘calm’ the past couple of weeks. The news and message boards were covering the continuing update issues from the past couple of months but there wasn’t a lot of new or exciting information. If this lull in activity continues, maybe we’ll be able to get a … More → The post July 2025 Patch Tuesday forecast: Take a break from the grind appeared first on Help Net Security.
http://news.poseidon-us.com/TLmhXt

AI built it, but can you trust it?

In this Help Net Security interview, John Morello, CTO at Minimus, discusses the security risks in AI-driven development, where many dependencies are pulled in quickly. He explains why it’s hard to secure software stacks that no one fully understands. He also shares what needs to change to keep development secure as AI becomes more common. We’re seeing AI-assisted development pull in hundreds of dependencies from diverse sources at speed. From your perspective, what’s the most … More → The post AI built it, but can you trust it? appeared first on Help Net Security.
http://news.poseidon-us.com/TLmhWm