433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

ZEDEDA introduces Edge Kubernetes App Flows to automate edge application lifecycle

ZEDEDA has released a full-stack edge Kubernetes-as-a-Service solution that extends a cloud-native deployment experience to distributed edge environments. ZEDEDA Edge Kubernetes App Flows automates the edge application lifecycle, from packaging and configuration to delivery and observability, eliminating the need to manage cluster and application orchestration infrastructure. Edge Kubernetes App Flows supports the bare-metal and GPU compute required for edge AI applications, such as automated detection of manufacturing flaws and predictive maintenance. Built on ZEDEDA’s edge … More → The post ZEDEDA introduces Edge Kubernetes App Flows to automate edge application lifecycle appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nNB

Veeam App for Microsoft Sentinel brings backup intelligence directly into the SOC

Veeam Software launched its new Veeam App for Microsoft Sentinel. The solution provides advanced integration with Veeam Data Platform and empowers organizations to detect, investigate, and respond to cyber threats and backup anomalies, delivering data resilience and operational efficiency across SOC. As cyberattacks increasingly target backup environments, many SOC teams face a critical visibility gap in their security posture ecosystem, leaving organizations vulnerable to attacks on their last line of defense – their backups. The … More → The post Veeam App for Microsoft Sentinel brings backup intelligence directly into the SOC appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nN4

Veza Access AuthZ automates identity governance

Veza announced Access AuthZ, a new product that automates how organizations grant and revoke access across enterprise systems to address the “last mile” of identity governance. Built on the power of Veza Access Graph and Access Profiles, Access AuthZ unifies access control and access automation in a simplified way even with organizations relying on existing lifecycle management processes. Designed for scale and interoperability, it extends provisioning beyond traditional lifecycle management tools to include legacy platforms, … More → The post Veza Access AuthZ automates identity governance appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nMm

New Relic unveils Logs Intelligence to accelerate root cause analysis with AI

New Relic has announced Logs Intelligence, a series of AI-strengthened capabilities that automate the time and effort required to reduce mean time to resolution (MTTR) and extract critical insights from logs. Featured key innovations, like AI Log Alerts Summarization, transform how teams work with log data by providing automated analysis to generate a rapid hypothesis, accelerating time to root cause understanding and incident response. “Distributed systems and AI tools generate logs at an unprecedented rate,” … More → The post New Relic unveils Logs Intelligence to accelerate root cause analysis with AI appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nMS

PortGPT: How researchers taught an AI to backport security patches automatically

Keeping older software versions secure often means backporting patches from newer releases. It is a routine but tedious job, especially for large open-source projects such as the Linux kernel. A new research effort has built a tool that uses a large language model to do that work automatically. A team of researchers from China, the United States, and Canada created PortGPT, an AI system designed to automate the process of migrating security patches from mainline … More → The post PortGPT: How researchers taught an AI to backport security patches automatically appeared first on Help Net Security.
http://news.poseidon-us.com/TP4nLD

AI can flag the risk, but only humans can close the loop

In this Help Net Security interview, Dilek Çilingir, Global Forensic & Integrity Services Leader at EY, discusses how AI is transforming third-party assessments and due diligence. She explains how machine learning and behavioral analytics help organizations detect risks earlier, improve compliance, and strengthen accountability. As oversight grows, Çilingir explains why human judgment still matters in every AI-supported decision. When a third-party breach occurs, the forensic investigation often uncovers weak points that AI could have flagged … More → The post AI can flag the risk, but only humans can close the loop appeared first on Help Net Security.
http://news.poseidon-us.com/TP4lfg

VulnRisk: Open-source vulnerability risk assessment platform

VulnRisk is an open-source platform for vulnerability risk assessment. It goes beyond basic CVSS scoring by adding context-aware analysis that reduces noise and highlights what matters. The tool is free to use and designed for local development and testing. The platform’s scoring engine cuts up to 90 percent of noise by applying contextual factors such as exploit likelihood and asset importance. Every score comes with a full calculation breakdown, so users can see exactly how … More → The post VulnRisk: Open-source vulnerability risk assessment platform appeared first on Help Net Security.
http://news.poseidon-us.com/TP4k2t

Connected homes: Is bystander privacy anyone’s responsibility?

Smart doorbells, connected cameras, and home monitoring systems have become common sights on doorsteps and living rooms. They promise safety and convenience, but they also raise a problem. These devices record more than their owners. They capture neighbors, visitors, and anyone passing by. Overlooking bystander privacy A new study from researchers at the Budapest University of Technology and Economics shows that while companies selling these products talk about privacy, they rarely protect those who never … More → The post Connected homes: Is bystander privacy anyone’s responsibility? appeared first on Help Net Security.
http://news.poseidon-us.com/TP4k2r

Google says 2026 will be the year AI supercharges cybercrime

Security leaders are staring down a year of major change. In its Cybersecurity Forecast 2026, Google paints a picture of a threat landscape transformed by AI, supercharged cybercrime, and increasingly aggressive nation-state operations. Attackers are moving faster, scaling their operations with automation. AI becomes central to both sides By 2026, AI will be a normal part of everyday attack and defense activity. Adversaries are already using it to automate phishing, clone voices, and shape disinformation. … More → The post Google says 2026 will be the year AI supercharges cybercrime appeared first on Help Net Security.
http://news.poseidon-us.com/TP4k0b