logo
#

Latest news with #RSAConference

AI cybersecurity risks and deepfake scams on the rise
AI cybersecurity risks and deepfake scams on the rise

Fox News

time27-05-2025

  • Business
  • Fox News

AI cybersecurity risks and deepfake scams on the rise

Imagine your phone rings and the voice on the other end sounds just like your boss, a close friend, or even a government official. They urgently ask for sensitive information, except it's not really them. It's a deepfake, powered by AI, and you're the target of a sophisticated scam. These kinds of attacks are happening right now, and they're getting more convincing every day. That's the warning sounded by the 2025 AI Security Report, unveiled at the RSA Conference (RSAC), one of the world's biggest gatherings for cybersecurity experts, companies, and law enforcement. The report details how criminals are harnessing artificial intelligence to impersonate people, automate scams, and attack security systems on a massive scale. From hijacked AI accounts and manipulated models to live video scams and data poisoning, the report paints a picture of a rapidly evolving threat landscape, one that's touching more lives than ever before. One of the biggest risks of using AI tools is what users accidentally share with them. A recent analysis by cybersecurity firm Check Point found that 1 in every 80 AI prompts includes high-risk data, and about 1 in 13 contains sensitive information that could expose users or organizations to security or compliance risks. This data can include passwords, internal business plans, client information, or proprietary code. When shared with AI tools that are not secured, this information can be logged, intercepted, or even leaked later. AI-powered impersonation is getting more advanced every month. Criminals can now fake voices and faces convincingly in real time. In early 2024, a British engineering firm lost 20 million pounds after scammers used live deepfake video to impersonate company executives during a Zoom call. The attackers looked and sounded like trusted leaders and convinced an employee to transfer funds. Real-time video manipulation tools are now being sold on criminal forums. These tools can swap faces and mimic speech during video calls in multiple languages, making it easier for attackers to run scams across borders. Social engineering has always been a part of cybercrime. Now, AI is automating it. Attackers no longer need to speak a victim's language, stay online constantly, or manually write convincing messages. Tools like GoMailPro use ChatGPT to create phishing and spam emails with perfect grammar and native-sounding tone. These messages are far more convincing than the sloppy scams of the past. GoMailPro can generate thousands of unique emails, each slightly different in language and urgency, which helps them slip past spam filters. It is actively marketed on underground forums for around $500 per month, making it widely accessible to bad actors. Another tool, the X137 Telegram Console, leverages Gemini AI to monitor and respond to chat messages automatically. It can impersonate customer support agents or known contacts, carrying out real-time conversations with multiple targets at once. The replies are uncensored, fast, and customized based on the victim's responses, giving the illusion of a human behind the screen. AI is also powering large-scale sextortion scams. These are emails that falsely claim to have compromising videos or photos and demand payment to prevent them from being shared. Instead of using the same message repeatedly, scammers now rely on AI to rewrite the threat in dozens of ways. For example, a basic line like "Time is running out" might be reworded as "The hourglass is nearly empty for you," making the message feel more personal and urgent while also avoiding detection. By removing the need for language fluency and manual effort, these AI tools allow attackers to scale their phishing operations dramatically. Even inexperienced scammers can now run large, personalized campaigns with almost no effort. With AI tools becoming more popular, criminals are now targeting the accounts that use them. Hackers are stealing ChatGPT logins, OpenAI API keys, and other platform credentials to bypass usage limits and hide their identity. These accounts are often stolen through malware, phishing, or credential stuffing attacks. The stolen credentials are then sold in bulk on Telegram channels and underground forums. Some attackers are even using tools that can bypass multi-factor authentication and session-based security protections. These stolen accounts allow criminals to access powerful AI tools and use them for phishing, malware generation, and scam automation. Criminals are finding ways to bypass the safety rules built into AI models. On the dark web, attackers share techniques for jailbreaking AI so it will respond to requests that would normally be blocked. Common methods include: Some AI models can even be tricked into jailbreaking themselves. Attackers prompt the model to create input that causes it to override its own restrictions. This shows how AI systems can be manipulated in unexpected and dangerous ways. AI is now being used to build malware, phishing kits, ransomware scripts, and more. Recently, a group called FunkSac was identified as the leading ransomware gang using AI. Its leader admitted that at least 20% of their attacks are powered by AI. FunkSec has also used AI to help launch attacks that flood websites or services with fake traffic, making them crash or go offline. These are known as denial-of-service attacks. The group even created its own AI-powered chatbot to promote its activities and communicate with victims on its public website.. Some cybercriminals are even using AI to help with marketing and data analysis after an attack. One tool called Rhadamanthys Stealer 0.7 claimed to use AI for "text recognition" to sound more advanced, but researchers later found it was using older technology instead. This shows how attackers use AI buzzwords to make their tools seem more advanced or trustworthy to buyers. Other tools are more advanced. One example is DarkGPT, a chatbot built specifically to sort through huge databases of stolen information. After a successful attack, scammers often end up with logs full of usernames, passwords, and other private details. Instead of sifting through this data manually, they use AI to quickly find valuable accounts they can break into, sell, or use for more targeted attacks like ransomware. Get a free scan to find out if your personal information is already out on the web Sometimes, attackers do not need to hack an AI system. Instead, they trick it by feeding it false or misleading information. This tactic is called AI poisoning, and it can cause the AI to give biased, harmful, or completely inaccurate answers. There are two main ways this happens: In 2024, attackers uploaded 100 tampered AI models to the open-source platform Hugging Face. These poisoned models looked like helpful tools, but when people used them, they could spread false information or output malicious code. A large-scale example came from a Russian propaganda group called Pravda, which published more than 3.6 million fake articles online. These articles were designed to trick AI chatbots into repeating their messages. In tests, researchers found that major AI systems echoed these false claims about 33% of the time. AI-powered cybercrime blends realism, speed, and scale. These scams are not just harder to detect. They are also easier to launch. Here's how to stay protected: 1) Avoid entering sensitive data into public AI tools: Never share passwords, personal details, or confidential business information in any AI chat, even if it seems private. These inputs can sometimes be logged or misused. 2) Use strong antivirus software: AI-generated phishing emails and malware can slip past outdated security tools. The best way to safeguard yourself from malicious links that install malware, potentially accessing your private information, is to have strong antivirus software installed on all your devices. This protection can also alert you to phishing emails and ransomware scams, keeping your personal information and digital assets safe. Get my picks for the best 2025 antivirus protection winners for your Windows, Mac, Android & iOS devices. 3) Turn on two-factor authentication (2FA): 2FA adds an extra layer of protection to your accounts, including AI platforms. It makes it much harder for attackers to break in using stolen passwords. 4) Be extra cautious with unexpected video calls or voice messages: If something feels off, even if the person seems familiar, verify before taking action. Deepfake audio and video can sound and look very real. 5) Use a personal data removal service: With AI-powered scams and deepfake attacks on the rise, criminals are increasingly relying on publicly available personal information to craft convincing impersonations or target victims with personalized phishing. By using a reputable personal data removal service, you can reduce your digital footprint on data broker sites and public databases. This makes it much harder for scammers to gather the details they need to convincingly mimic your identity or launch targeted AI-driven attacks. While no service can guarantee the complete removal of your data from the internet, a data removal service is really a smart choice. They aren't cheap - and neither is your privacy. These services do all the work for you by actively monitoring and systematically erasing your personal information from hundreds of websites. It's what gives me peace of mind and has proven to be the most effective way to erase your personal data from the internet. By limiting the information available, you reduce the risk of scammers cross-referencing data from breaches with information they might find on the dark web, making it harder for them to target you. Check out my top picks for data removal services here. 6) Consider identity theft protection: If your data is leaked through a scam, early detection is key. Identity protection services can monitor your information and alert you to suspicious activity. Identity Theft companies can monitor personal information like your Social Security Number (SSN), phone number, and email address, and alert you if it is being sold on the dark web or being used to open an account. They can also assist you in freezing your bank and credit card accounts to prevent further unauthorized use by criminals. See my tips and best picks on how to protect yourself from identity theft. 7) Regularly monitor your financial accounts: AI-generated phishing, malware, and account takeover attacks are now more sophisticated and widespread than ever, as highlighted in the 2025 AI Security Report. By frequently reviewing your bank and credit card statements for suspicious activity, you can catch unauthorized transactions early, often before major damage is done. Quick detection is crucial, especially since stolen credentials and financial information are now being traded and exploited at scale by cybercriminals using AI. 8) Use a secure password manager: Stolen AI accounts and credential stuffing attacks are a growing threat, with hackers using automated tools to break into accounts and sell access on the dark web. A secure password manager helps you create and store strong, unique passwords for every account, making it far more difficult for attackers to compromise your logins, even if some of your information is leaked or targeted by AI-driven attacks. Get more details about my best expert-reviewed Password Managers of 2025 here. 9) Keep your software updated: AI-generated malware and advanced phishing kits are designed to exploit vulnerabilities in outdated software. To stay ahead of these evolving threats, ensure all your devices, browsers, and applications are updated with the latest security patches. Regular updates close security gaps that AI-powered malware and cybercriminals are actively seeking to exploit. Cybercriminals are now using AI to power some of the most convincing and scalable attacks we've ever seen. From deepfake video calls and AI-generated phishing emails to stolen AI accounts and malware written by chatbots, these scams are becoming harder to detect and easier to launch. Attackers are even poisoning AI models with false information and creating fake tools that look legitimate but are designed to do harm. To stay safe, it's more important than ever to use strong antivirus protection, enable multi-factor authentication, and avoid sharing sensitive data with AI tools you do not fully trust. Have you noticed AI scams getting more convincing? Let us know your experience or questions by writing us at Your story could help someone else stay safe. For more of my tech tips & security alerts, subscribe to my free CyberGuy Report Newsletter by heading to Follow Kurt on his social channels Answers to the most asked CyberGuy questions: New from Kurt: Copyright 2025 All rights reserved.

Collaboration over competition powers future of cybersecurity, says EVAD
Collaboration over competition powers future of cybersecurity, says EVAD

Tahawul Tech

time26-05-2025

  • Business
  • Tahawul Tech

Collaboration over competition powers future of cybersecurity, says EVAD

Abdullah A. Qaisi, CEO & General Manager of EVAD, shares how collaboration and storytelling are reshaping cybersecurity distribution in the region. The 14th edition of GISEC Global witnessed a remarkable convergence of cybersecurity leaders, with vibrant energy lasting through all three days of the event. Among the notable voices was Abdullah A. Qaisi, CEO & General Manager of EVAD, who reflected on the evolving cybersecurity landscape, both regionally and globally. Having just returned from RSA Conference in San Francisco, Qaisi brought a unique perspective to the table—highlighting how the Middle East, and particularly GISEC, is matching global standards in terms of scale, relevance, and impact. In his conversation with Qaisi emphasised that cybersecurity today is less about product pitches and more about impactful storytelling and ecosystem collaboration. He underscored the importance of moving away from a siloed, competitive mindset toward a community-driven approach where distributors, vendors, and partners collectively raise awareness and readiness in the cybersecurity space. Interview Excerpts: How do you compare the energy and scale of GISEC 2025 with other global cybersecurity events? Recently, I attended the RSA Conference in San Francisco, and coming from RSA to GISEC was a different kind of challenge—but a very exciting one. RSA is known for showcasing cutting-edge technologies, but I must say, coming back to Dubai and experiencing GISEC at this scale fills me with pride. This event truly matches international standards. Compared to last year, GISEC 2025 has seen higher visitor turnout and more focused interactions. The arrangements have been seamless, making it easy to connect and engage. Even on the third day, the energy feels like day one. What did EVAD showcase at GISEC Global 2025? This is our first year exhibiting at GISEC, although we've been part of other events like GITEX in the past. Choosing GISEC this year was the right move—its cybersecurity focus aligns perfectly with our position as a value-added distributor in the field. The audience here knows what they want, and that made it easier to present our offerings. At I(VAD), we believe cybersecurity isn't just a product to sell—it's a story to tell. We've focused on storytelling to help customers understand their needs and how our solutions fit. The cybersecurity distribution space is growing fast. How do you view this evolution and competition? Competition is intense, but I don't see other distributors as competitors. I see them as partners in building a stronger cybersecurity community. If one distributor grows, it benefits the entire ecosystem. For example, where EVAD is strong—like the UAE, Saudi Arabia, or even Kenya—we help others gain ground, and vice versa. This shared growth enriches the community. It's about collaboration, not combat. Our collective goal should be to raise awareness and understanding of cybersecurity together. That's an inspiring perspective. How do you foster this mindset across the cybersecurity community? We need to stop operating in silos. I had a recent experience at our booth where a client arrived with a distributor. The moment I introduced myself, the distributor said they couldn't engage as they were from a competing firm. I told them, 'Let's collaborate. If I can't close the deal, maybe you will. Or maybe we do it together.' That mindset shift—from competition to cooperation—is key. If your competitor is doing well, don't pull them down—rise to their level. Together, we can build a safer ecosystem. What challenges still exist in making cybersecurity more relatable? The issue is that people outside the cybersecurity world still see us as a cost rather than a safeguard. That's because the domain is complex and often poorly understood. To change this perception, we need more storytellers. 'We must humanise cybersecurity through storytelling—explain it in ways that resonate with real business needs. Once we do that, understanding and investment will follow naturally.'

Cyberdefense Cuts Could Sap U.S. Response to China Hacks, Insiders Say
Cyberdefense Cuts Could Sap U.S. Response to China Hacks, Insiders Say

Yomiuri Shimbun

time24-05-2025

  • Politics
  • Yomiuri Shimbun

Cyberdefense Cuts Could Sap U.S. Response to China Hacks, Insiders Say

Tom Brenner/For The Washington Post Homeland Security Secretary Kristi L. Noem testifies on Capitol Hill earlier this month. SAN FRANCISCO – As senior Trump administration officials say they want to amp up cyberattacks against China and other geopolitical rivals, some government veterans warn that such an approach would set the United States up for retaliation that it is increasingly unprepared to counter. Alexei Bulazel, senior director for cyber at the National Security Council, said earlier this month that he wanted to fight back against China's aggressive pre-positioning of hacking capabilities within U.S. critical infrastructure and 'destigmatize' offensive operations, making their use an open part of U.S. strategy for the first time. Bulazel, an Oracle security architect before joining the Trump administration, said such 'exciting' action would be the quickest way to 'change the script' and hopefully curb the rising rate of foreign cyberattacks on U.S. targets. He was speaking at the RSA Conference in San Francisco, the largest annual tech security meetup, where some others inside and outside government echoed his position. 'We have done everything, but it is extreme responses that will convince governments' to change their ways, said Rob Joyce, a former head of cybersecurity at the National Security Agency. Yet far more security experts interviewed at the conference were fretting about recent personnel cuts to the Cybersecurity and Infrastructure Security Agency (CISA), and additional ones ahead under the GOP budget reconciliation bill, in which the administration asked for a 17 percent decrease in the budget of the principal civilian cyber agency. The consensus was that the U.S. is not well-defended now, and multiple security firms reported that the number of Chinese hacking attempts detected in the first quarter of this year more than doubled from a year earlier. In a memo to CISA staff Thursday night, the new No. 2 at the agency wrote that the heads of four of CISA's six main divisions – cybersecurity, infrastructure security, emergency communications and integrated operations, which oversees regional offices – were all leaving this month. The leaders of most of the regional offices also are leaving, the memo said, along with the top CISA officers for finance, strategy, human resources and contracting. U.S. security personnel revealed more than 18 months ago that Chinese military hackers had burrowed into the computer systems linked to infrastructure such as water and electrical utilities, ports and pipelines. That initiative, which the U.S. called Volt Typhoon, was soon supplemented by another, Salt Typhoon, that targets telecommunications networks. Sen. Mark R. Warner (D-Virginia) called it the 'worst telecom hack in our nation's history – by far.' The covert offensive is far from over. Volt Typhoon is showing up in a wider variety of utilities, according to specialists at the cybersecurity firm Dragos, and an FBI official said Salt Typhoon might be able to reinfect carriers after they have been cleaned up. But CISA's parent, the Department of Homeland Security, has now disbanded advisory panels, including the Cyber Safety Review Board, which was investigating Salt Typhoon. 'We need CISA, we need these operations, we need these people and partnerships,' Dave DeWalt, a security industry investor and longtime CISA adviser, told The Washington Post, alluding to the unsettled state of international alliances. 'We've got to go fast, because we are vulnerable – especially if we're doing what we are doing around the world, geopolitically.' Aside from Volt Typhoon and Salt Typhoon, DeWalt said a still-unfolding onslaught of Chinese attacks on water and power utilities and hundreds of other targets using a flaw in SAP business software shows that malicious activity is surging amid trade tensions between Washington and Beijing. Under Homeland Security Secretary Kristi L. Noem, 130 probationary CISA employees have been dismissed, along with a small team dedicated to election security that had come under criticism from Republicans for its reports of misinformation about voting procedures. Many of the agency's numerous contractors have seen their contracts canceled. 'CISA was in disastrous shape when President Trump and Secretary Noem took office,' said a senior official with the Department of Homeland Security who spoke on the condition of anonymity under departmental policy. 'Under the Biden administration, despite a ballooning budget, CISA's mission was focused on becoming a hub of self-promotion, censorship, misinformation and electioneering.' Noem told the San Francisco conference that while the agency has been doing important work, people 'only heard about it when it was doing something bad,' referring to its past contacts with social media companies about disinformation. She also said more responsibility for infrastructure protection should fall to state and local officials. 'I feel like most of the innovation can happen at the state level,' Noem said. At a small Baltimore security conference more recently, former national cyber director Harry Coker said the opposite. 'My small hometown in rural Kansas is under assault every day from nation-state actors and malicious cybercriminals,' Coker said. 'They're going after the local hospital, the local school system, the local financial systems. And no one, especially our government, should expect my rural hometown to be able to defend itself against a nation-state actor.' Security experts and officials from both major political parties had hoped to avoid cuts to CISA as severe as those being levied in other divisions and federal departments. They pointed to CISA's front-line role helping protect civilian government offices and privately owned critical infrastructure from attacks by highly effective ransomware gangs and geopolitical rivals. 'This is no time to pull defenders from the resilience and continuity of operations of lifeline human needs like water, power and access to emergency care,' said Joshua Corman, a former CISA official who now leads a pilot project with the nonprofit Institute for Security and Technology to improve security communications among people working in critical infrastructure. 'The coming storms need more help and better help. The risks are nonpartisan and affect all communities.' Congress has held several hearings on cyberthreats and introduced bills aimed at deterring Chinese spying successes. At one, Rep. Andrew R. Garbarino (R-New York), chairman of the subcommittee on cybersecurity and infrastructure protection, said even early cuts were going too far and that CISA should take on more responsibility for safeguarding government departments. CISA supporters in Congress and employees were encouraged by Trump's nomination of Sean Plankey to head CISA, though Sen. Ron Wyden (D-Oregon) has put the nomination on hold until he gets more information on telecom security. Plankey served in several high-level cybersecurity posts during the first Trump administration. Concerns about the agency's efficacy have grown with the personnel and budget cuts, despite a recent court injunction against restructuring without congressional input. 'CISA is indirectly decimating our mid- and top ranks and leaving us without capable and experienced leaders,' said a current employee, who spoke on the condition of anonymity for fear of retaliation. Current CISA executives declined to say how many people had left the agency or how it will adapt to the cuts. CISA is 'doubling down and fulfilling its statutory mission to secure the nation's critical infrastructure and strengthen our collective cyberdefense,' Executive Director Bridget Bean said in an emailed statement. 'We have focused our operations on ensuring that we are prepared for a range of cyberthreats from our adversaries.' Especially hard-hit by the cuts are the regional CISA offices that have helped local and state governments targeted by ransomware attacks, officials said. Scores of employees have also left the teams that provide CISA expertise to public and private entities – including hospitals, utilities and local public offices that have proved to be choice targets for foreign-origin hacking. Vermont Secretary of State Sarah Copeland Hanzas expressed concern particularly about local offices. 'We don't have the economies of scale that a New York or a California or a Texas has to staff up in-house to provide some of the cybersecurity support and prevention that CISA has been providing,' she said. Especially in light of the prospect of a more openly offensive U.S. cyber stance toward China, the trend toward a less robust CISA has alarmed many experts in the field. 'We were doing about a C-minus before, at risk of going down,' retired Rear Adm. Mark Montgomery, who led the congressionally chartered Cyberspace Solarium Commission confronting such issues, told attendees of the cybersecurity convention in San Francisco earlier this month. 'We are not ready for a systemic cyberattack in our country.'

Saviynt Unveils SaviTalk Podcast on Identity Security
Saviynt Unveils SaviTalk Podcast on Identity Security

Techday NZ

time20-05-2025

  • Business
  • Techday NZ

Saviynt Unveils SaviTalk Podcast on Identity Security

Saviynt has launched SaviTalk, an official audio and visual podcast focused on identity governance, privileged access management, compliance, and the future of cybersecurity. The first episode of the SaviTalk podcast will go in early June, following the recording of initial episodes in April at the RSA Conference in San Francisco. SaviTalk is being positioned as a platform for discussions about the evolving landscape of cybersecurity, identity security, and digital transformation. The podcast has been designed for security professionals, industry leaders, and enterprises who are trying to navigate the complexities of contemporary identity security. SaviTalk's episodes will feature conversations with Saviynt's top executives, customers, and industry influencers. The programme aims to address the major challenges and opportunities found in identity governance, privileged access management, and compliance. It will also highlight the latest developments influencing the future of cybersecurity. "Identity security has never been more critical, and SaviTalk allows us to expand the conversation beyond traditional channels. Through this podcast, we are giving listeners direct access to industry-leading voices, real-world insights, and forward-thinking strategies to help organisations navigate today's complex security landscape," Sachin Nayyar, Chief Executive Officer and Founder of Saviynt, said. The podcast's title draws inspiration from the TED Talks format, promoting concise discussions intended to drive thought leadership whilst staying true to Saviynt's company identity. The naming choice reflects the intent to reinforce Saviynt's role within the identity security sector. "SaviTalk will be more than just a podcast; it will be a cultural movement. It's how we will continue to build trust, share our unique point of view, and shape the future of identity security on our own terms," Tara Ryan, Chief Marketing Officer at Saviynt, commented. SaviTalk will be hosted by Henrique Teixeira, SVP of Strategy; Simon Gooch, Field CIO; David Lee, Field CTO; and Jim Routh, Chief Trust Officer. Each host brings specific expertise in the areas of identity security, technology transformation, enterprise advisory, and cyber risk management. Henrique Teixeira has previously served as an analyst at Gartner and has been involved in shaping the identity and access management market. Simon Gooch has provided advisory services to CIOs and CISOs and has managed digital transformation projects in both Europe and North America. David Lee is recognised in the cybersecurity community for his ability to communicate complex topics, drawing from experience at organisations such as Cloudentity, AWS, and Lockheed Martin. Jim Routh has held CISO roles at Mass Mutual, Aetna, and JP Morgan Chase, and is known for his work in cyber risk and building security cultures. The podcast aims to deliver conversations that educate, challenge, and inspire a wide audience within the security ecosystem. The first episode of SaviTalk will feature CEO Sachin Nayyar, who will discuss his journey in identity security and outline Saviynt's vision for the future. The podcast will be available on major streaming platforms, including Spotify and Apple Podcasts. Saviynt is also opening SaviTalk to participation from security professionals, customers, and partners for future episodes. The company invites suggestions for topics and guest speakers, aiming to highlight diverse perspectives and experiences that are influencing developments in identity security.

Saviynt to Launch SaviTalk Podcast
Saviynt to Launch SaviTalk Podcast

Associated Press

time20-05-2025

  • Business
  • Associated Press

Saviynt to Launch SaviTalk Podcast

LOS ANGELES--(BUSINESS WIRE)--May 20, 2025-- Saviynt, a leading provider of cloud-native identity and governance platform solutions, today announced the launch of SaviTalk, its official audio and visual podcast, with the first episode going live on Thursday, June 5. Taping of the episodes began in April at the RSA Conference in San Francisco. SaviTalk will provide an engaging platform for thought-provoking discussion on the evolving landscape of cybersecurity, identity security, and digital transformation. Designed to be the go-to resource for security professionals, industry leaders, and enterprises navigating the complexities of modern identity security, SaviTalk will feature insightful conversations with Saviynt's top executives, customers, and industry influencers. The podcast aims to unpack the most pressing challenges and opportunities in identity governance, privileged access management, and compliance, while also exploring the latest innovations shaping the future of cybersecurity. 'Identity security has never been more critical, and SaviTalk allows us to expand the conversation beyond traditional channels,' said Sachin Nayyar, chief executive officer and founder of Saviynt. 'Through this podcast, we are giving listeners direct access to industry-leading voices, real-world insights, and forward-thinking strategies to help organizations navigate today's complex security landscape.' The name SaviTalk was inspired by the concepts of TED Talks – concise, insightful discussions that drive thought leadership and innovation. By incorporating Savi, the podcast stays true to Saviynt's identity while reinforcing its role as a leading voice in identity security. 'SaviTalk will be more than just a podcast; it will be a culture movement,' said Tara Ryan, chief marketing officer at Saviynt. 'It's how we will continue to build trust, share our unique point of view, and shape the future of identity security on our own terms.' Meet the Hosts SaviTalk is hosted by some of the most influential experts in identity security, each bringing a unique perspective and wealth of experience to the conversation: With these industry experts at the helm, SaviTalk will deliver high-impact conversations designed to educate, challenge, and inspire listeners across the security ecosystem. SaviTalk will debut Thursday, June 5, with an exclusive first episode featuring CEO Sachin Nayyar, where he shares his journey in identity security and the vision for Saviynt's future. Listeners can tune in on Spotify, Apple Podcasts, and other major streaming platforms. Additionally, Saviynt is inviting security professionals, customers, and partners to participate in upcoming episodes. Whether it's a customer success story, a major industry trend, or an innovative security approach, SaviTalk aims to spotlight the voices shaping the future of identity security. Interested guests can submit nominations for topics and speakers through Saviynt's website. For more information and to listen to the latest episodes of SaviTalk, visit the website. About Saviynt Saviynt empowers enterprises to secure their digital transformation, safeguard critical assets, and meet regulatory compliance. With a vision to provide a secure and compliant future for all enterprises, Saviynt is recognized as an industry leader in identity security whose cutting-edge solutions protect the world's leading brands, Fortune 500 companies and government organizations. For more information, please visit View source version on CONTACT: Press Contact Jacklyn Kellick [email protected] KEYWORD: NORTH AMERICA UNITED STATES UNITED KINGDOM EUROPE CANADA CALIFORNIA INDUSTRY KEYWORD: TECHNOLOGY MOBILE/WIRELESS ENTERTAINMENT SECURITY SOFTWARE NETWORKS INTERNET DATA MANAGEMENT PODCAST SOURCE: Saviynt Copyright Business Wire 2025. PUB: 05/20/2025 09:51 AM/DISC: 05/20/2025 09:51 AM

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into the world of global news and events? Download our app today from your preferred app store and start exploring.
app-storeplay-store