433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

When it comes to protecting federal employees, she’s done it all

“Good agency reps know the benefits come from having one unified, legally binding voice,” said Susan Tsui Grundmann. The post When it comes to protecting federal employees, she’s done it all first appeared on Federal News Network.
http://news.poseidon-us.com/TKl6rc

GSA expands efforts to reshape federal consulting contracts

GSA says it already identified as much as $33 billion in savings or avoidance from the first set of consultant contractors. The post GSA expands efforts to reshape federal consulting contracts first appeared on Federal News Network.
http://news.poseidon-us.com/TKl5qR

Tufin TOS Discovery automates device discovery and onboarding

Tufin launched Tufin Orchestration Suite (TOS) Discovery, a new solution that helps security teams ensure their network topology is always accurate and up-to-date. Maintaining up-to-date network topology is a crucial task – one that enables proper enforcement of security policies and access validation – and is critical for mitigating vulnerabilities and troubleshooting issues. Despite its importance in establishing and maintaining a safe and secure enterprise network environment, it is traditionally a manual, time-consuming task that … More → The post Tufin TOS Discovery automates device discovery and onboarding appeared first on Help Net Security.
http://news.poseidon-us.com/TKkwWC

Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources

Lenovo introduced ThinkShield Solutions, security offerings tailored to protect small and medium sized business (SMBs), schools, and other organizations with limited IT resources facing significant risks. The new offering is part of Lenovo ThinkShield’s portfolio of enterprise-grade cybersecurity solutions. Cybercriminals target SMBs, schools, and other smaller organizations because they often have less robust security compared to large corporations and other institutions. The majority of reported cyberattacks are directed towards SMBs, with average costs per incident … More → The post Lenovo intoduces ThinkShield Solutions to secure organizations with limited IT resources appeared first on Help Net Security.
http://news.poseidon-us.com/TKkwVN

Product showcase: Go beyond VPNs and Tor with NymVPN

If you care about online privacy, you probably already know: Centralized VPNs and even Tor aren’t enough anymore. Traditional VPNs require you to trust a single company with your internet activity. Even if they promise “no logs,” you’re still handing over the keys to your digital life to a third party. If they’re compromised — or forced by authorities — they can expose your information. And decentralized VPNs? While better, they mostly focus on distributing … More → The post Product showcase: Go beyond VPNs and Tor with NymVPN appeared first on Help Net Security.
http://news.poseidon-us.com/TKksJG

The limitations of AI in chip manufacturing

Leaders from Intel, EMD and GlobalFoundries discussed the challenges they see as the semiconductor industry adapts artificial intelligence to get results faster.
http://news.poseidon-us.com/TKkhn7

CISOs must speak business to earn executive trust

In this Help Net Security interview, Pritesh Parekh, VP, CISO at PagerDuty talks about how CISOs can change perceptions of their role, build influence across the organization, communicate risk in business terms, and use automation to support business goals. What do business leaders most often misunderstand about the CISO’s role, and how can security leaders correct those perceptions? Too often, business leaders view cybersecurity solely as a defensive function that can slow innovation when in … More → The post CISOs must speak business to earn executive trust appeared first on Help Net Security.
http://news.poseidon-us.com/TKkXQG

AI vs AI: How cybersecurity pros can use criminals’ tools against them

For a while now, AI has played a part in cybersecurity. Now, agentic AI is taking center stage. Based on pre-programmed plans and objectives, agentic AI can make choices which optimize results without a need for developer intervention. As agentic AI can be programmed for various tasks, AI agents are set to create a labor revolution, from manufacturing to customer service. However, this comes at a cost, as they can also be programmed to conduct … More → The post AI vs AI: How cybersecurity pros can use criminals’ tools against them appeared first on Help Net Security.
http://news.poseidon-us.com/TKkXMY

Breaking down silos in cybersecurity

All organizations erect silos – silos between groups and departments, across functions and among technologies. Silos represent differences in practices, culture and operations. Their presence inhibits communication and collaboration. As companies scale from startup to mid-sized and beyond, silos multiply and ossify. As operations expand from one site to many, from on-premises to cloud, from legacy to emerging tech (e.g., cloud and AI), silos don’t topple; they persist and proliferate. Nowhere are silos more evident … More → The post Breaking down silos in cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TKkQZ1

Review: Resilient Cybersecurity

Resilient Cybersecurity touches on nearly every major function of enterprise cybersecurity, from threat detection and identity management to vendor risk and regulatory compliance. About the author Mark Dunkerley is a cybersecurity and technology leader with over 20 years of experience working in higher education, healthcare and Fortune 100 companies. Inside the book The structure of the book mirrors the process of building a cybersecurity program from the ground up. Early chapters focus on understanding the … More → The post Review: Resilient Cybersecurity appeared first on Help Net Security.
http://news.poseidon-us.com/TKkQX6