Remove CSO Remove Media Remove Threat Detection
article thumbnail

MY TAKE: RSAC 2025’s big takeaway — GenAI is growing up fast, but still needs human direction

The Last Watchdog

SAN FRANCISCO The cybersecurity industry showed up here in force last week: 44,000 attendees, 730 speakers, 650 exhibitors and 400 members of the media flooding Moscone Convention Center in the City by the Bay. Jay” Abdullah , Mastercards Deputy CSO who gave a keynote address at The CSA Summit from Cloud Security Alliance at RSAC 2025.

article thumbnail

Key Cybersecurity Trends for 2025. My Predictions

Jane Frankland

Social engineering tactics such as phishing will not only remain prevalent but evolve as attackers leverage AI to craft highly personalised attacks (spear phishing and whaling) , mimicking a victim’s tone or referencing contextual details with alarming accuracy using data from social media, public records, and other sources.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

News alert: Simbian launches with $10M to build autonomous, GenAI-powered security platform

The Last Watchdog

AI-driven security solutions can greatly improve threat detection, speeding remediation, and reducing complexity,” said Dave Gruber, Principal Analyst at Enterprise Strategy Group. Media contact: Liz Youngs, Spalding Communications, 843-412-6327, liz@spaldingcomm.com

CSO 100
article thumbnail

Meet the 2021 SC Awards judges

SC Magazine

He has 15 years of cybersecurity technical product and program management experience delivering cyber solutions and developing thought leadership across multiple verticals, with a focus on threat detection, threat exposure management, response/remediation and protection. He was also director of the SANS Internet Storm Center.

article thumbnail

Cyber Security Awareness and Risk Management

Spinone

The Global State of Information Security Survey 2017 suggests that companies should look into deploying threat detection tools and processes (including monitoring and analyzing security intelligence information), conducting vulnerability and threat assessments, penetration tests and security information, and event management (SIEM) tools.