433 Central Ave., 4th Floor, St. Petersburg, FL 33701 | info@poseidon-us.com | Office: (813) 563-2652

Rethinking OT security for project heavy shipyards

In this Help Net Security interview, Hans Quivooij, CISO at Damen Shipyards Group, discusses securing OT and ICS in the shipyard. He outlines how project-based operations, rotating contractors, and temporary systems expand the threat surface and complicate access control. Quivooij also covers visibility in legacy environments and the risks introduced by IT and OT integration. Shipyards blend long-lived industrial equipment with short-lived projects and contractors. How does that project-based operating model change the threat surface … More → The post Rethinking OT security for project heavy shipyards appeared first on Help Net Security.
http://news.poseidon-us.com/TQHtQM

pfSense: Open-source firewall and routing platform

Firewalls, VPN access, and traffic rules need steady attention, often with limited budgets and staff. In that context, the open source pfSense Community Edition (CE) continues to show up in production environments, supported by a long-standing user community. pfSense CE is the free, open-source version of the pfSense firewall and routing platform. The software runs on standard x86 hardware, virtual machines, and some embedded systems, which keeps deployment flexible for small teams and labs. What … More → The post pfSense: Open-source firewall and routing platform appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6k

What security teams can learn from torrent metadata

Security teams often spend time sorting through logs and alerts that point to activity happening outside corporate networks. Torrent traffic shows up in investigations tied to policy violations, insider risk, and criminal activity. A new research paper looks at that same torrent activity through an open source intelligence lens and asks how much signal security teams can extract from data that is already public. Data pipeline design Turning torrent metadata into intelligence Torrent files contain … More → The post What security teams can learn from torrent metadata appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6j

EU’s Chat Control could put government monitoring inside robots

Cybersecurity debates around surveillance usually stay inside screens. A new academic study argues that this boundary no longer holds when communication laws extend into robots that speak, listen, and move among people. Researchers Neziha Akalin and Alberto Giaretta examine the European Union’s proposed Chat Control regulation and its unintended impact on human robot interaction. The continuum of surveillance, from watching public spaces, to listening in private communications, to acting within embodied environments. A brief look … More → The post EU’s Chat Control could put government monitoring inside robots appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6h

Downtime pushes resilience planning into security operations

CISOs describe a shift in how they define success. New research from Absolute Security shows broad agreement that resilience outweighs security goals centered on prevention alone. Security leaders increasingly define their role around keeping the business operating through disruption. The cost of recovery (Source: Asolute Security) CISOs see themselves as responsible for recovery when incidents interrupt operations. Business continuity, endpoint restoration, and coordination with IT teams fall within their scope. Formal resilience strategies have become … More → The post Downtime pushes resilience planning into security operations appeared first on Help Net Security.
http://news.poseidon-us.com/TQHn6N

This new imaging technology breaks the rules of optics

Scientists have unveiled a new way to capture ultra-sharp optical images without lenses or painstaking alignment. The approach uses multiple sensors to collect raw light patterns independently, then synchronizes them later using computation. This sidesteps long-standing physical limits that have held optical imaging back for decades. The result is wide-field, sub-micron resolution from distances that were previously impossible.
http://news.poseidon-us.com/TQHDNl

NordPass streamlines two-factor authentication with a built-in Authenticator across devices

NordPass simplifies secure logins by including Authenticator on multiple devices in the application for personal use. The time-based one-time password (TOTP) support enables users to add an extra layer of security to their accounts with two-factor authentication, without the need to download or install additional applications. Authentication codes are synchronized within the account, letting users access them on both the mobile app or browser extension. NordPass Authenticator requires biometric verification before revealing the security code. … More → The post NordPass streamlines two-factor authentication with a built-in Authenticator across devices appeared first on Help Net Security.
http://news.poseidon-us.com/TQFZQq

European Commission opens consultation on EU digital ecosystems

The European Commission has opened a public call for evidence on European open digital ecosystems, a step toward a planned Communication that will examine the role of open source in EU’s digital infrastructure. The consultation runs from January 6 to February 3, 2026. Submissions will be used to shape a Commission Communication addressed to the European Parliament, the Council, and other EU bodies, which is scheduled for publication in the first quarter of 2026. Role … More → The post European Commission opens consultation on EU digital ecosystems appeared first on Help Net Security.
http://news.poseidon-us.com/TQFZQH