433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

LinkedIn wants to make verification a portable trust signal

In this Help Net Security interview, Oscar Rodriguez, VP Trust Product at LinkedIn, discusses how verification is becoming a portable trust signal across the internet. He explains how LinkedIn is extending professional identity beyond its platform to address rising AI-driven fraud, impersonation, and online scams. Rodriguez also outlines how LinkedIn views its role in digital trust alongside platforms, partners, and existing identity systems. LinkedIn is positioning verification as a foundational trust signal not just on … More → The post LinkedIn wants to make verification a portable trust signal appeared first on Help Net Security.
http://news.poseidon-us.com/TQM9ml

QR codes are getting colorful, fancy, and dangerous

QR codes have become a routine part of daily life, showing up on emails, posters, menus, invoices, and login screens. Security-savvy users have learned to treat links with caution, but QR codes still carry an assumption of safety. Researchers from Deakin University have examined how visually stylized QR codes are being used in quishing attacks. Examples of custom-shaped QR codes Their study introduces a detection method that evaluates QR codes based on their structure rather … More → The post QR codes are getting colorful, fancy, and dangerous appeared first on Help Net Security.
http://news.poseidon-us.com/TQM9mR

How everyday foam reveals the secret logic of artificial intelligence

Foams were once thought to behave like glass, with bubbles frozen in place at the microscopic level. But new simulations reveal that foam bubbles are always shifting, even while the foam keeps its overall shape. Remarkably, this restless motion follows the same math used to train artificial intelligence. The finding hints that learning-like behavior may be a fundamental principle shared by materials, machines, and living cells.
http://news.poseidon-us.com/TQM5cS

CISOs flag gaps in third-party risk management

Third-party cyber risk continues to concern security leaders as vendor ecosystems grow, supply chains stretch, and AI plays a larger role in business operations. A recent Panorays survey of U.S. CISOs shows rising third-party incidents and growing regulatory attention, while visibility beyond direct vendors and the resources to manage that risk continue to fall short. Ranking of third-party cyber risk compared to other cybersecurity risks Third-party risk remains a top concern CISOs rank third-party cyber … More → The post CISOs flag gaps in third-party risk management appeared first on Help Net Security.
http://news.poseidon-us.com/TQM5HF

Cybersecurity spending keeps rising, so why is business impact still hard to explain?

Cybersecurity budgets keep climbing, but many security leaders still struggle to explain what that spending delivers to the business. A new study by Expel examines that disconnect through a survey of security and finance executives at large enterprises. The research looks at how the two groups view risk, investment decisions, and their working relationship. Shared priorities, uneven trust Security leaders believe their priorities align with business objectives. Most say cybersecurity supports company goals and plays … More → The post Cybersecurity spending keeps rising, so why is business impact still hard to explain? appeared first on Help Net Security.
http://news.poseidon-us.com/TQM5HD

The NSA lays out the first steps for zero trust adoption

Security pros often say that zero trust sounds straightforward until they try to apply it across real systems, real users, and real data. Many organizations are still sorting out what they own, how access works, and where authority sits. That day-to-day reality is the context for a new set of implementation documents released by the National Security Agency. A series built for phased adoption The NSA has published the first two documents in its Zero … More → The post The NSA lays out the first steps for zero trust adoption appeared first on Help Net Security.
http://news.poseidon-us.com/TQM5Gz

Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026

Join former Gartner analyst Ravisha Chugh and Abnormal’s Director of Product Marketing, Lane Billings, on January 20th for an exclusive insider look at how email security vendors will be evaluated in 2026. Backed by years of analyst experience and deep market insight, this session equips security leaders with a clear, practical approach to confidently selecting the right vendor. You’ll learn: How Gartner analysts evaluate the email security market, and which criteria truly matter The must-ask … More → The post Webinar: Beyond the Quadrant: An Analyst’s Guide to Evaluating Email Security in 2026 appeared first on Help Net Security.
http://news.poseidon-us.com/TQLRsF