433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | [email protected] | Office: (813) 563-2652

Bugcrowd enables organizations to test their security environments

Bugcrowd’s new service connects customers with a global network of vetted ethical hackers for a variety of red team engagements—fully managed through the Bugcrowd Platform. This release sets a new benchmark in the red team services market, enabling organizations to test their security environments with the highest level of confidence. By tapping into a global pool of experts using the latest adversarial tactics, techniques, and procedures (TTPs), customers gain unparalleled insight into how real-world attackers … More → The post Bugcrowd enables organizations to test their security environments appeared first on Help Net Security.
http://news.poseidon-us.com/TKRPTz

Arctic Wolf launches Cipher to enhance security investigations with AI insights

Arctic Wolf has introduced Cipher, an AI security assistant that provides customers with self-guided access to deeper security insights directly within the Arctic Wolf Aurora Platform. Cipher enhances investigations and alert comprehension by delivering instant answers, contextual enrichment, and actionable summaries, all informed by real-world experience from Arctic Wolf’s AI-enabled global security operations centers (SOC). The post Arctic Wolf launches Cipher to enhance security investigations with AI insights appeared first on Help Net Security.
http://news.poseidon-us.com/TKRN5G

Netwrix boosts identity and data security for Microsoft environments

Netwrix unveiled new solutions and capabilities across its 1Secure SaaS platform. Its new Data Security Posture Management (DSPM) solution identifies and eliminates data exposures within Microsoft 365 environments and will be available in May. Netwrix also announced new risk assessment capabilities within 1Secure, allowing organizations to quickly scan their Active Directory, Entra ID and Microsoft365 environments to gain rapid insight into security risks and misconfigurations. The risk assessments also include a new AI-assisted remediation workflow … More → The post Netwrix boosts identity and data security for Microsoft environments appeared first on Help Net Security.
http://news.poseidon-us.com/TKRN4w

Oasis NHI Provisioning automates the provisioning of NHIs and their credentials

Oasis Security launched Oasis NHI Provisioning, a capability that automates the creation, governance, and security of non-human identities (NHIs) from their inception. Built into the Oasis NHI Security Cloud, this solution addresses the critical challenges of fragmented processes, ungoverned sprawl, and manual workflows that plague NHI provisioning today. According to ESG research, NHIs, such as service accounts, service principals, managed accounts, secrets, keys, and access tokens, are growing 20% year-over-year, powering automation across legacy, cloud, … More → The post Oasis NHI Provisioning automates the provisioning of NHIs and their credentials appeared first on Help Net Security.
http://news.poseidon-us.com/TKRN4l

Lumu SecOps Platform allows teams to unify their entire security stack

Lumu released Lumu SecOps Platform, a fully integrated Security Operations (SecOps) platform that unifies threat detection, response, automation, compliance, and intelligence across the network, identities and endpoints—delivering full attack context and enabling security teams to autonomously detect and neutralize complex threats. Lumu SecOps Platform acts as the control center of a security network and allows teams to unify their entire security stack, streamline defenses, enhance their visibility, and reduce security gaps, powered by automated responses … More → The post Lumu SecOps Platform allows teams to unify their entire security stack appeared first on Help Net Security.
http://news.poseidon-us.com/TKRN4K

Eyes, ears, and now arms: IoT is alive

I’ve never quite seen anything like this in my two decades of working in the Internet of Things (IoT) space. In just a few years, devices at home and work started including cameras to see and microphones to hear. Now, with new lines of vacuums and emerging humanoid robots, devices have appendages to manipulate the world around them. They’re not only able to collect information about their environment but can touch, “feel”, and move it. … More → The post Eyes, ears, and now arms: IoT is alive appeared first on Help Net Security.
http://news.poseidon-us.com/TKRJ0V

Sumo Logic unveils innovations across AI, automation, and threat intelligence

Sumo Logic announced a number of new security capabilities that help organizations build and operate intelligent security operations to reduce risks, accelerate threat containment, and ensure stronger security postures. “With the rise of AI-powered attacks, dynamically scaling cloud environments, and growing data complexity, legacy solutions are significantly slowing detection and response,” said Keith Kuchler, Chief Development Officer for Sumo Logic. “The innovations we’re unveiling fuel DevSecOps via the power of logs by centralizing security log … More → The post Sumo Logic unveils innovations across AI, automation, and threat intelligence appeared first on Help Net Security.
http://news.poseidon-us.com/TKRJ0D

What’s worth automating in cyber hygiene, and what’s not

Cyber hygiene sounds simple. Patch your systems, remove old accounts, update your software. But for large organizations, this gets messy fast. Systems number in the thousands. Teams are scattered. Some machines haven’t been rebooted in months. Automation can help. But not everything should be automated, and not every automation pays off. For CISOs, the real question isn’t “can we automate it?” It’s “should we?” Here’s what’s worth automating in cyber hygiene today, and where to … More → The post What’s worth automating in cyber hygiene, and what’s not appeared first on Help Net Security.
http://news.poseidon-us.com/TKRHyq

Want faster products and stronger trust? Build security in, not bolt it on

In this Help Net Security interview, Christopher Kennedy, CISO at Group 1001, discusses how cybersecurity initiatives are reshaping enterprise cybersecurity strategy. He explains why security must be embedded across IT, business lines, and product development, how automation and risk discovery can drive competitive advantage, and why security leaders need to play a central role in shaping business outcomes. Traditionally, cybersecurity has been seen as a cost center. What are the most compelling ways it can … More → The post Want faster products and stronger trust? Build security in, not bolt it on appeared first on Help Net Security.
http://news.poseidon-us.com/TKRFVH

DDoS attacks jump 358% compared to last year

Cloudflare says it mitigated 20.5 million DDoS attacks in the first quarter of 2025. This is a 358% increase compared to the same time last year. Their Q1 2025 DDoS report highlights a rise in the number and size of attacks, including some of the largest ever recorded. Map of top 10 most attacked industries in Q1 2025 (Source: Cloudflare) Massive multi-vector attacks One-third of the attacks, about 6.6 million, directly targeted Cloudflare’s own network … More → The post DDoS attacks jump 358% compared to last year appeared first on Help Net Security.
http://news.poseidon-us.com/TKRFVG