433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Final NIST IR 8349 Released: Characterize & Secure Your IoT Devices

The NIST National Cybersecurity Center of Excellence (NCCoE) has published the final version of NIST Internal Report (IR) 8349, Methodology for Characterizing Network Behavior of Internet of Things (IoT) Devices. Characterizing and understanding the
http://news.poseidon-us.com/TMlmzs

Halo Security platform updates give teams better control over exposure data

Halo Security announced platform enhancements designed to give security teams flexibility and control within the platform. The new features include custom dashboards, configurable reports, and improved automation capabilities that give organizations better control over how they visualize and manage their exposure data. “No two organizations are the same, and different team members face different challenges,” said Lisa Dowling, CEO of Halo Security. “A vulnerability analyst needs different insights than a compliance manager, and a CISO … More → The post Halo Security platform updates give teams better control over exposure data appeared first on Help Net Security.
http://news.poseidon-us.com/TMlgj9

New framework aims to outsmart malware evasion tricks

Attackers have learned how to trick machine learning malware detectors with small but clever code changes, and researchers say they may finally have an answer. In a new paper, academics from Inria and the CISPA Helmholtz Center for Information Security describe a framework that can withstand these kinds of evasion attempts. Their work focuses on adversarial examples in malware detection, where attackers alter software in ways that preserve its function but confuse the model into … More → The post New framework aims to outsmart malware evasion tricks appeared first on Help Net Security.
http://news.poseidon-us.com/TMlb3k

Finding connection and resilience as a CISO

With sensitive information to protect and reputational risk always in the background, it isn’t easy for security leaders to have open conversations about what’s working and what isn’t. Yet strong peer networks and candid exchanges are critical for resilience, both organizationally and personally. In this Help Net Security interview, Michael Green, CISO at Trellix, discusses how CISOs can build trusted communities, balance information sharing with confidentiality, and avoid burnout while leading at the highest level. … More → The post Finding connection and resilience as a CISO appeared first on Help Net Security.
http://news.poseidon-us.com/TMlb3R

AI isn’t taking over the world, but here’s what you should worry about

In this Help Net Security video, Josh Meier, Senior Generative AI Author at Pluralsight, debunks the myth that AI could “escape” servers or act on its own. He explains how large language models actually work, why they can’t become sentient, and where the real risks lie: from misinformation and data leaks to phishing and malware. Meyer also highlights practical, safe ways AI can support cybersecurity professionals. The post AI isn’t taking over the world, but here’s what you should worry about appeared first on Help Net Security.
http://news.poseidon-us.com/TMlb3Q

AI can’t deliver without trusted, well-governed information

While enterprise IT leaders recognize the transformative potential of AI, a gap in information readiness is causing their organizations to struggle in securing, governing, and aligning AI initiatives across business, according to a survey conducted by the Ponemon Institute. Who is the final authority for setting your organization’s AI strategy? (Source: Ponemon Institute) 73% of CIOs, CISOs, and other IT leaders believe reducing information complexity is key to AI readiness. “Without trusted, well-governed information, AI … More → The post AI can’t deliver without trusted, well-governed information appeared first on Help Net Security.
http://news.poseidon-us.com/TMlb25

Infosec products of the month: August 2025

Here’s a look at the most interesting products from the past month, featuring releases from: Black Kite, Brivo, Cloudflare, Descope, Doppel, Druva, Elastic, ExtraHop, LastPass, Prove, Riverbed, Rubrik, StackHawk, and Trellix. StackHawk empowers security teams to expand their API testing coverage StackHawk releaseed LLM-Driven OpenAPI Specifications, a powerful new capability that creates API documentation directly from source code. With this new capability, StackHawk analyzes source code repositories, extracts API details using homegrown LLMs, and produces … More → The post Infosec products of the month: August 2025 appeared first on Help Net Security.
http://news.poseidon-us.com/TMlWrq

ISC Stormcast For Friday, August 29th, 2025 https://isc.sans.edu/podcastdetail/9592, (Fri, Aug 29th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License.
http://news.poseidon-us.com/TMlWCG

From In-Q-Tel to venture capital: George Hoyem on leadership & innovation

On this episode of Leaders and Legends in Government, host Aileen Black sits down with George Hoyem, venture capital leader and former managing partner at In-Q-Tel. The post From In-Q-Tel to venture capital: George Hoyem on leadership & innovation first appeared on Federal News Network.
http://news.poseidon-us.com/TMlRBv