Latest news with #RSAConference2025
Yahoo
3 days ago
- Business
- Yahoo
Anchoring Innovation and Community: EC-Council's RSA 2025 Yacht Reception Sets the Stage for Black Hat USA
From RSA's luxury yacht reception to Black Hat's TopGolf Las Vegas event, EC-Council's leadership and community-led conversations shape a more secure and connected digital world. Anchoring Innovation and Community: EC-Council's RSA 2025 Yacht Reception Sets the Stage for Black Hat USA Tampa, Florida, June 05, 2025 (GLOBE NEWSWIRE) -- Against the backdrop of RSA Conference 2025, EC-Council- the global leader in cybersecurity education and training, and creator of the world-renowned Certified Ethical Hacker (CEH) credential; hosted a landmark executive cocktail reception aboard a luxury yacht. This invite-only event brought together a handpicked network of cybersecurity decision-makers from across continents, creating a powerful forum for strategic exchange, global connection, and collective foresight. With its unique setting and high-caliber attendees, the evening served as a catalyst for industry-shaping dialogue at a time when cybersecurity is undergoing one of its most pivotal transformations. The event brought together 150 senior executives from a pool of over 650 registrants, the reception represented a powerful cross-section of sectors, technology, finance, healthcare, consulting, and featured leaders from renowned global powerhouses like Amazon, Bank of America, Cisco, Google, Microsoft, Uber, and Wells Fargo. This diversity reflected the depth of leadership fuelling the evening's high-level discussions. From North America to Europe and Asia, participants From North America to Europe and Asia, this international community of cybersecurity professionals united around a shared mission: defending digital ecosystems amid the rise of AI-driven threats. The yacht setting offered a rare chance to move beyond formal sessions, enabling candid, forward-looking conversations about the rapidly shifting threat landscape and the technologies that will define the future of cyber defense. Jay Bavisi, Group President, EC-Council, shared: 'Cybersecurity cannot remain the domain of a few, it must be accessible to all. At EC-Council, we are building not just certifications, but a movement. One that empowers professionals across geographies and generations through high-impact training, real-world simulation, and community-led collaboration. Events like this reception are a reminder that the future of cybersecurity is collective, and we are proud to nurture the global community that drives it forward.' The reception also marked a defining moment for EC-Council's continued innovation. From the launch of CEH with AI-powered capabilities to the release of CPENT AI, and the introduction of The Hackerverse - a global competition platform that immerses learners in simulated real-world attack scenarios each initiative reflects EC-Council's deep commitment to preparing professionals for tomorrow's threats, today. With its $100 million cybersecurity innovation initiative now underway, EC-Council is accelerating the development of solutions that bridge capability gaps, empower learners, and fuel next-gen defense strategies, creating a future where cybersecurity expertise is scalable, inclusive, and globally accessible. Bavisi concluded, 'By engaging with leaders at RSA and Black Hat, EC-Council continues to build a global movement focused on empowering professionals and democratizing access to critical cybersecurity skills. These conversations are shaping the future of digital defense.' Next Stop: Black Hat USA 2025 at Top Golf Building on the momentum from RSA, EC-Council is set to host its next major gathering during Black Hat USA 2025, this time at Top Golf Las Vegas. This high-energy, immersive experience will blend cybersecurity insights with interactive networking, bringing together industry leaders, innovators, and rising talent for an unforgettable evening of connection and collaboration. For media inquiries or to connect with EC-Council at Black Hat USA 2025, please contact: press@ About EC-Council: EC-Council is the creator of the world-renowned Certified Ethical Hacker (CEH) program and a leader in cybersecurity education. Founded in 2001, EC-Council's mission is to provide high-quality training and certifications for cybersecurity professionals to keep organizations safe from cyber threats. EC-Council offers over 200 certifications and degrees in various cybersecurity domains, including forensics, security analysis, threat intelligence, and information security. An ISO/IEC 17024 accredited organization, EC-Council has certified over 350,000 professionals worldwide, with clients ranging from government agencies to Fortune 100 companies. EC-Council is the gold standard in cybersecurity certification, trusted by the U.S. Department of Defense, the Army, Navy, Air Force, and leading global corporations. For more information, visit: Attachment Anchoring Innovation and Community: EC-Council's RSA 2025 Yacht Reception Sets the Stage for Black Hat USA CONTACT: EC-Council press@ in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Business Wire
22-05-2025
- Business
- Business Wire
CORRECTING and REPLACING Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It
NEW YORK--(BUSINESS WIRE)--Headline of release dated May 20, 2025 should read: Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It (instead of RSA Conference Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It). 'Threat intelligence isn't just about collecting data — it's about connecting people, processes, and platforms to act on it," said Anuj Goel, Co-founder and CEO of Cyware. Share The updated release reads: Cyware survey identifies significant gaps in internal collaboration, tool integration, and automation — with only 13% confident their systems currently work well Cyware, the industry leader in threat intelligence operationalization, collaboration, and orchestrated response, today released the results of an onsite survey conducted at RSA Conference 2025. The survey captured insights from 100 cybersecurity executives and professionals across enterprises, government agencies, and service providers about how organizations are operationalizing threat intelligence across their security operations. The findings reveal a sharp disconnect between awareness and action: While nearly all respondents (92%) said collaboration and information sharing are either 'absolutely crucial' or 'very important' in the fight against cyber threats, the data tells a different story when it comes to the adoption of this practice. Only 13% said their current automation between cyber threat intelligence (CTI) and SecOps tools is working well, and nearly 40% struggle to coordinate data across critical security tools like Threat Intelligence Platforms (TIPs), SIEMs, and vulnerability management platforms. 'The RSAC survey data reveals a serious gap between that belief and the operational reality,' said Anuj Goel, Co-founder and CEO of Cyware. 'Threat intelligence isn't just about collecting data — it's about connecting people, processes, and platforms to act on it. These findings reinforce the need for more unified, automated, and collaborative approaches to security operations.' Key survey findings: Internal collaboration and automation maturity remain major gaps: While 92% of respondents said threat intel sharing is 'absolutely crucial' or 'very important,' only 13% said their automation between CTI and SecOps tools is working well. AI optimism is high, but its implementation is still uneven: 78% of respondents believe AI will improve threat intel sharing within their organization, but only 43% say it's made a meaningful impact so far. Threat intel sharing is not occurring in real time: Only 17% of teams share threat intel across roles like SecOps, IR, and vulnerability management in real time, while another 25% do so daily. 22% reported sharing information rarely or not at all. External threat intel sharing collaboration has much room for improvement: While 57% of respondents said their organization collaborates with industry peers to improve threat intel, 30% were unsure if such collaboration even exists. Automation gaps persist: More than half of respondents (56%) reported either significant or moderate challenges automating workflows across CTI and SecOps teams. ISAC participation is low or unknown: Only 18% confirmed that their organization is part of an Information Sharing and Analysis Center (ISAC) or Organization (ISAO), while 45% said they didn't know. That lack of clarity could be limiting access to valuable sector-specific threat insights — and further compounding intelligence silos. The survey results reflect growing urgency to bridge the gap between threat intel awareness and execution. As cyber threats grow more complex and coordinated, Cyware is helping organizations unify threat ingestion, sharing, and response — powered by AI and hyper-automation. To learn how Cyware is helping organizations transform threat intelligence into coordinated defense, visit About Cyware Cyware is leading the industry in operational threat Intelligence and collective defense, helping security teams transform threat intelligence from fragmented data points to actionable, real-time decisions. We unify threat intelligence management, intel sharing and collaboration, as well as hyper-orchestration and automation — eliminating silos and enabling organizations to outmaneuver adversaries faster and more effectively. From enterprises to government agencies and ISACs, Cyware empowers defenders to turn intelligence into impact.
Yahoo
22-05-2025
- Business
- Yahoo
CORRECTING and REPLACING Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It
Cyware survey identifies significant gaps in internal collaboration, tool integration, and automation — with only 13% confident their systems currently work well NEW YORK, May 22, 2025--(BUSINESS WIRE)--Headline of release dated May 20, 2025 should read: Cyware Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It (instead of RSA Conference Survey Reveals That 92% Believe Threat Intelligence Is Critical — But Most Organizations Still Struggle to Operationalize It). The updated release reads: CYWARE SURVEY REVEALS THAT 92% BELIEVE THREAT INTELLIGENCE IS CRITICAL — BUT MOST ORGANIZATIONS STILL STRUGGLE TO OPERATIONALIZE IT Cyware survey identifies significant gaps in internal collaboration, tool integration, and automation — with only 13% confident their systems currently work well Cyware, the industry leader in threat intelligence operationalization, collaboration, and orchestrated response, today released the results of an onsite survey conducted at RSA Conference 2025. The survey captured insights from 100 cybersecurity executives and professionals across enterprises, government agencies, and service providers about how organizations are operationalizing threat intelligence across their security operations. The findings reveal a sharp disconnect between awareness and action: While nearly all respondents (92%) said collaboration and information sharing are either "absolutely crucial" or "very important" in the fight against cyber threats, the data tells a different story when it comes to the adoption of this practice. Only 13% said their current automation between cyber threat intelligence (CTI) and SecOps tools is working well, and nearly 40% struggle to coordinate data across critical security tools like Threat Intelligence Platforms (TIPs), SIEMs, and vulnerability management platforms. "The RSAC survey data reveals a serious gap between that belief and the operational reality," said Anuj Goel, Co-founder and CEO of Cyware. "Threat intelligence isn't just about collecting data — it's about connecting people, processes, and platforms to act on it. These findings reinforce the need for more unified, automated, and collaborative approaches to security operations." Key survey findings: Internal collaboration and automation maturity remain major gaps: While 92% of respondents said threat intel sharing is "absolutely crucial" or "very important," only 13% said their automation between CTI and SecOps tools is working well. AI optimism is high, but its implementation is still uneven: 78% of respondents believe AI will improve threat intel sharing within their organization, but only 43% say it's made a meaningful impact so far. Threat intel sharing is not occurring in real time: Only 17% of teams share threat intel across roles like SecOps, IR, and vulnerability management in real time, while another 25% do so daily. 22% reported sharing information rarely or not at all. External threat intel sharing collaboration has much room for improvement: While 57% of respondents said their organization collaborates with industry peers to improve threat intel, 30% were unsure if such collaboration even exists. Automation gaps persist: More than half of respondents (56%) reported either significant or moderate challenges automating workflows across CTI and SecOps teams. ISAC participation is low or unknown: Only 18% confirmed that their organization is part of an Information Sharing and Analysis Center (ISAC) or Organization (ISAO), while 45% said they didn't know. That lack of clarity could be limiting access to valuable sector-specific threat insights — and further compounding intelligence silos. The survey results reflect growing urgency to bridge the gap between threat intel awareness and execution. As cyber threats grow more complex and coordinated, Cyware is helping organizations unify threat ingestion, sharing, and response — powered by AI and hyper-automation. To learn how Cyware is helping organizations transform threat intelligence into coordinated defense, visit About Cyware Cyware is leading the industry in operational threat Intelligence and collective defense, helping security teams transform threat intelligence from fragmented data points to actionable, real-time decisions. We unify threat intelligence management, intel sharing and collaboration, as well as hyper-orchestration and automation — eliminating silos and enabling organizations to outmaneuver adversaries faster and more effectively. From enterprises to government agencies and ISACs, Cyware empowers defenders to turn intelligence into impact. View source version on Contacts Media Contact: Jay SmithTouchdown PR for Cywarecyware@


Forbes
07-05-2025
- Business
- Forbes
RSA Conference 2025 Highlights, Insights And Companies To Watch
Palo Alto Networks livestream event at RSA Conference 2025 Will Townsend In my opinion, RSA Conference is becoming a showcase for the application of modern AI within cybersecurity. Last year, the resounding theme for the event was generative AI. It came as no surprise, then, that this year's event focused on agentic AI. In this RSAC wrap-up, I will provide my thoughts on both the transformative power and the challenges of employing agentic AI within cybersecurity protection suites. I will also highlight a handful of announcements that I found noteworthy and share Six Five Media video conversations I had with Cisco and Cohesity that explore several important topics related to modern AI. Let's get started. Many pundits, including myself, speak to the dichotomy of security for AI and AI for security. In other words, there is both a need for securing the use of AI applications and workloads, and a need for leveraging the power of AI to reduce analyst friction and fortify cyber defenses. Given RSAC's heavy focus this year on agentic AI and its potential impact to fortify cybersecurity, two things are very apparent to me. First, the solution providers that avoid AI hype, carefully listen to customer needs and educate in the short term stand to benefit as trusted advisors — and reap commercial rewards in the longer term. Second, a radical evolution in identity access management will be required to manage the permissions, delegation and hierarchy of agents and super-agents. First movers that crack the code for that complexity stand to benefit immensely. The speed at which modern AI applications are moving is exciting to watch, and there is great potential to tip the scales toward defenders. AI is decidedly a double-edged sword, but agentic AI plus automation has great promise to combat the current use of generative AI by bad actors who use it to dramatically improve phishing and lateral movement schemes. As in years past, RSAC 2025 served as a stage for many cybersecurity infrastructure provider announcements. Four stood out as noteworthy for me: Cisco — Cisco announced new functionality tied to its XDR platform, including instant attack verification, improved forensics and a storyboard feature that more clearly visualizes complex attack chains. I like the maturity of the company's endpoint protection suite, and I think that the additional enhancements for supply chain and industrial IoT threat defense have great promise. Furthermore, from my perspective, Cisco's acquisition of Robust Intelligence may be one of its best buys in recent years. It provides the automated red-teaming capability in the company's AI Defense platform , and it supports the newly launched Foundation AI open-source reasoning model that is purpose-built for enhancing security applications. Hewlett Packard Enterprise — HPE announced enhanced network access control features, an OpsRamp integration for more granular network observability and new SSE mesh connectivity — all designed to improve reliability, ensure resiliency and harden security. I like the deeper level of automation and dynamic routing capabilities that are designed to ease both network and security operations. However, there is an opportunity for HPE to use its HP Labs research team to dive deeper into security, providing threat intelligence research like Cisco Talos. Microsoft — On the Sunday before RSAC's official opening, I attended Microsoft's pre-day for a second year, plus I met with executive management during the event. I continue to be impressed with the company's continued focus on its Secure Future Initiative . Microsoft claims that it now employs over 34,000 engineers engaged in cybersecurity application refinement and innovation. That level of technical resource dedication is mind-blowing and speaks to the company's commitment to security. In talking with a handful of smaller security solution providers, I also learned that Microsoft Defender is benefiting from the company's security focus, making significant gains in its ability to provide AI workload alerting, endpoint protection and cyber remediation. Palo Alto Networks — Palo Alto Networks' activity at RSAC was significant. This included its announced intent to acquire Protect AI to further its modern AI security ambitions, as well as enhancements to its AI Cortex exposure management and email security. The company has also seen growing adoption of its secure enterprise browser, which provides layered protection. My conversations with executive management also made it clear that Prisma AIRS is one of the most anticipated cybersecurity solution suites in the company's history; it includes model scanning, posture management, AI red-teaming, runtime security and agent security. I can understand Palo Alto Networks' enthusiasm, because I believe the company has one of the broadest and deepest AI security suites. Deep-Dive Conversations With Cisco And Cohesity At RSAC this year, I had the opportunity to conduct Six Five Media video interviews with Cisco and Cohesity. The first was with Cisco's Tom Gillis , who leads the company's datacenter infrastructure and security businesses. We discussed the company's announcements at RSAC as well as Gillis's vision for the integration of agentic AI and its potential impact for driving improved security outcomes. The second interview was with Vasu Murthy , who leads all of product development for Cohesity. We discussed the company's new RecoveryAgent, which is infused with intellectual property from its Veritas acquisition, along with Murthy's longer-term vision for the product portfolio, as well as how Cohesity protects 100-plus exabytes of enterprise data globally using a zero-trust security architecture, enhanced multi-factor authentication, ML-based ransomware detection and more. Companies To Watch At RSAC, I also had the opportunity to spend time with a handful of companies for the first time, including Forescout, InfoSec Global and Swissbit. Forescout provides cyber risk, compliance and threat mitigation capabilities, enabled through asset intelligence, continuous assessment and ongoing control across IT and OT environments. I like it that the company employs an open platform that integrates with more than 100 security and IT products. Forescout Research – Vedere Labs also provides deep device intelligence and curates both its unique telemetry and other threat intelligence feeds to enrich its platform. As a pioneer and leader in cryptographic posture management, InfoSec Global aims to secure enterprise digital infrastructure by enabling organizations to discover, inventory, remediate and manage cryptographic assets. Its AgileSec platform orchestrates agile cryptography management through centralized policy enforcement across cloud and on-premises environments — even during the transition from traditional to post-quantum cryptography. The company told me that global financial institutions, large technology companies and government agencies rely on its own capabilities and integrations with third parties to ensure compliance, strengthen resilience and achieve post-quantum readiness. Crypto posture management is somewhat nascent, but the future risks that are associated with breaking encryption using quantum computing certainly warrant closer scrutiny. Swissbit is a security solution provider that combines its strengths in flash memory and embedded IoT device design to enable digital identity authentication and physical access control. The Swissbit iShield Key provides these capabilities in a simple and flexible USB key form factor that actively protects users from online attacks, such as phishing, social engineering and account takeover. Its latest product iteration, iShield Key 2, is the first FIDO security key to be FIPS 140-3 Level 3 certified, ensuring hardened security for demanding applications. I like its flexibility, akin to a Swiss Army knife (pun intended) to address a host of use cases including badge access, device authentication and more. The Power Of The Platform In the bigger picture, cybersecurity solution providers are doubling down on the power of the platform to deliver ease of management and hardened security. Tool sprawl is untenable, especially as bad actors weaponize the use of generative and eventually agentic AI to attack organizations. Platform approaches can go far to deliver higher levels of value and improved protection through a suite of solutions that work better together. From my perspective, RSAC 2025 did a lot to demonstrate the value of security platforms, and although the hype cycle is now squarely focused on agentic AI, it does have great long-term promise. Moor Insights & Strategy provides or has provided paid services to technology companies, like all tech industry research and analyst firms. These services include research, analysis, advising, consulting, benchmarking, acquisition matchmaking and video and speaking sponsorships. Of the companies mentioned in this article, Moor Insights & Strategy currently has (or has had) a paid business relationship with Cisco, Cohesity, HPE, Microsoft and Palo Alto Networks.


Business Wire
02-05-2025
- Business
- Business Wire
Cyble Wins Big at Global Infosec Awards 2025 with Four Prestigious Recognitions
CUPERTINO, Calif.--(BUSINESS WIRE)--Cyble, a global leader in cyber threat intelligence and digital risk protection, has achieved an exceptional milestone by winning four prestigious honors for the fourth consecutive year at the Global Infosec Awards 2025, presented by Cyber Defense Magazine during the RSA Conference 2025. Cyble has been recognized in the following key categories: Editor's Choice – Account Takeover Protection Outstanding – Digital Risk Protection Outstanding – Third Party Risk Management (TPRM) Outstanding – Threat Intelligence The Global Infosec Awards honor cybersecurity innovators that demonstrate a unique ability to prevent and respond to today's most complex cyber threats. Cyble's achievements highlight the company's continued dedication to helping organizations proactively identify and defend against emerging risks across surface, deep, and dark web environments. Cyble's platform is trusted by global enterprises and government entities for delivering real-time, AI-powered threat intelligence, enabling early detection of account takeover attempts, monitoring third-party risks, and offering robust protection against digital threats such as brand impersonation, data leakage, and ransomware. 'Winning across four major categories is a true honor and reflects the tireless innovation and commitment of the Cyble team,' said Beenu Arora, CEO and Co-founder of Cyble. 'As threat actors become more sophisticated, organizations must move beyond reactive measures. Cyble is proud to equip security teams with the intelligence and tools they need to stay ahead of adversaries. These awards reinforce our mission to make the digital world a safer place.' The recognition from Cyber Defense Magazine further solidifies Cyble's position as a frontrunner in cybersecurity, particularly in delivering scalable and actionable intelligence that addresses the evolving needs of modern enterprises. With a strong global presence and an ever-expanding portfolio of advanced threat detection and risk mitigation capabilities, Cyble remains focused on delivering innovation and value across every layer of the cybersecurity ecosystem. About Cyble Cyble is an award-winning cybersecurity firm dedicated to helping enterprises, governments, and individuals secure their digital environments. By leveraging AI, ML, and extended threat intelligence expertise, Cyble provides comprehensive insights into adversaries, infrastructure, vulnerabilities, and potential threats. For more information, visit