433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Keepnet bets on agentic AI behavioral training to curb security mistakes

Keepnet launched its Agentic AI for Behavioral Microlearning solution, which moves success metrics from “completion rates” to behavior change and verifiable incident reduction. Agentic AI autonomously plans, creates, delivers, and optimizes training based on real-time risk data, eliminating manual intervention. Organizations using Keepnet’s Agentic AI frameworks have achieved up to a 47% reduction in human-driven incidents within 90 days, giving organizations measurable risk reduction while employees receive short, contextual coaching instead of extra courses. At … More → The post Keepnet bets on agentic AI behavioral training to curb security mistakes appeared first on Help Net Security.
http://news.poseidon-us.com/TQR70q

British Army to spend £279 million on permanent cyber regiment base

The British Army has announced a new permanent base for its cyber regiment, backed by £279 million in government spending. The plan centres on 13 Signal Regiment, the unit responsible for defending Army networks and supporting cyber operations. The regiment will relocate to Duke of Gloucester Barracks in Gloucestershire, where new facilities will support cyber training, operations, and intelligence work. The site will also host the Army’s Cyber, Information and Security Operations Centre. “We are … More → The post British Army to spend £279 million on permanent cyber regiment base appeared first on Help Net Security.
http://news.poseidon-us.com/TQR70R

SEON Identity Verification combines KYC checks with real-time fraud intelligence

SEON has unveiled the launch of its AI-powered Identity Verification solution, bringing ID verification, liveness detection and proof of address checks into its unified risk platform. SEON’s solution is built on more than 900 real-time fraud signals, helping organizations assess not just whether an ID is real, but whether the person can be confidently approved based on identity and risk signals. Most identity verification tools focus on validating documents, but lack the risk context needed … More → The post SEON Identity Verification combines KYC checks with real-time fraud intelligence appeared first on Help Net Security.
http://news.poseidon-us.com/TQQx81

Global tensions are pushing cyber activity toward dangerous territory

Cybersecurity is inseparable from geopolitics. Ongoing conflicts, sanctions, trade wars, geoeconomic rivalry, and technological competition have pushed state competition into cyberspace. States use cyber operations to exert pressure on rivals, enabling disruption without resorting to conventional weapons. Infrastructure vulnerabilities in a geopolitical context 72% of IT leaders worry that nation-state cyber capabilities could tip into a full-scale cyberwar, and that critical infrastructure would be hit hardest. Although the cause was not a cyberattack, the large-scale … More → The post Global tensions are pushing cyber activity toward dangerous territory appeared first on Help Net Security.
http://news.poseidon-us.com/TQQx7r

Rubrik introduces Security Cloud Sovereign for data sovereignty and regulatory compliance

Rubrik announced Rubrik Security Cloud Sovereign, an offering that gives global organizations control over their data to support national security and operational continuity. Rubrik Security Cloud Sovereign gives customers the ability to maintain control over where data resides and who has access to it as regulations change. “Our customers have been clear about what they need,” said Anneka Gupta, Chief Product Officer at Rubrik. “They want certainty that no foreign entity, whether government or vendor, … More → The post Rubrik introduces Security Cloud Sovereign for data sovereignty and regulatory compliance appeared first on Help Net Security.
http://news.poseidon-us.com/TQQx7D

Review: AI Strategy and Security

AI Strategy and Security is a guide for organizations planning enterprise AI programs. The book targets technology leaders, security professionals, and executives responsible for strategy, governance, and operational execution. It treats AI adoption as an organizational discipline that spans planning, staffing, security engineering, risk management, and ongoing operations. About the author Dr. Donnie W. Wendt is a Lecturer at Columbus State University and a distinguished AI and cybersecurity professional. He is the author of The … More → The post Review: AI Strategy and Security appeared first on Help Net Security.
http://news.poseidon-us.com/TQQt26

Bytebase: Open-source database DevOps tool

Bytebase is a DevOps platform for managing database schema and data changes through a structured workflow. It provides a central place for teams to submit change requests, run reviews, and track executions across environments. The open-source edition is designed for organizations that want to run the software on their own infrastructure. Organizing work through change requests Bytebase structures activity around change requests. A request includes SQL statements, the target database, and the environment where the … More → The post Bytebase: Open-source database DevOps tool appeared first on Help Net Security.
http://news.poseidon-us.com/TQQt21

A new European standard outlines security requirements for AI

The European Telecommunications Standards Institute (ETSI) has released a new European Standard that addresses a growing concern for security teams working with AI. The standard, ETSI EN 304 223, sets baseline cybersecurity requirements for AI models and systems intended for real-world use. Addressing security risks specific to AI ETSI EN 304 223 treats AI as a distinct category of technology from a security perspective. AI systems introduce risks tied to their data pipelines, model behavior, … More → The post A new European standard outlines security requirements for AI appeared first on Help Net Security.
http://news.poseidon-us.com/TQQt1H

When the Olympics connect everything, attackers pay attention

Global sporting events bring a surge of network traffic, new systems, and short term partnerships. That mix draws attention from cyber threat actors who see opportunity in scale and distraction. A new Palo Alto Networks threat study on the Milan Cortina 2026 Winter Olympic Games outlines how attackers are expected to operate across the event’s digital ecosystem, from ticketing platforms to telecom infrastructure. A target-rich environment Large events depend on fast deployment. Temporary venues, pop … More → The post When the Olympics connect everything, attackers pay attention appeared first on Help Net Security.
http://news.poseidon-us.com/TQQqRB

Cyber risk keeps winning, even as AI takes over

Cyber risk continues to dominate global business concerns, with AI rising quickly alongside it. According to a new risk survey from Allianz, both are influencing how organizations plan for disruption, resilience, and recovery across regions and industries. Cyber incidents stay on top Cyber incidents hold the highest ranking for the fifth consecutive year. Risk professionals describe a threat environment defined by ransomware, data theft, service outages, and regulatory exposure. These events affect revenue, trust, and … More → The post Cyber risk keeps winning, even as AI takes over appeared first on Help Net Security.
http://news.poseidon-us.com/TQQpZp