Navigating Tomorrow's Tech Today
Top Headlines
AWS Supercharges DevOps with Generative AI in OpenSearch
How AWS is bringing AI-augmented incident response into mission-critical DevOps workflows.
UniCredit Leads the Rise of AI-driven Mergers & Acquisitions
The Tax-Time Trap & What Phishing Campaigns Reveal About the State of Threat Intelligence
1
Critical, But at What Cost? Hong Kong’s New Cyber Law and the Global Stakes of Securing Infrastructure
2
Cyberhaven’s $100M Bet on Watching the Data, Not the Perimeter
3
Google’s Record-Breaking $32 Billion Wiz Deal as A Cybersecurity Power Play in the AI Era
4
UK regulators tighten grip on fintech companies
5
US government plans to establish crypto reserve

$175 Million and a Cautionary Tale on Fraud in Fintech
Frank founder Charlie Javice convicted of defrauding JPMorgan Chase, highlighting the crucial need for robust due diligence.

MasterCard Introduces Blockchain-based Payments Network
Payments rewired—how MasterCard’s new blockchain infrastructure is changing digital payments.

Credential Chaos and Exploit Overload: The Two Threat Trends Every CISO Should Be Watching in 2025
In 2025, infostealers and exploitable vulnerabilities are reshaping the threat landscape. Here’s what CISOs need to know.

Major Financial Institutions Enter the Stablecoin Market
From tether to trust—why major financial institutions are backing stablecoins.

Who Holds the Keys? Inside the Quiet Boom of Privileged Access Management
Why Privileged Access Management is now mission-critical—and what happens when digital master keys fall into the wrong hands.

US Offers $2 Million Rewards for Chinese Cybercriminals Linked to APT27
The U.S. offers $4M in rewards for two alleged Chinese APT27 hackers, escalating efforts to disrupt state-backed cyber espionage amid risin...

Revolut Secures UK Banking License and Eyes Global Growth
Scaling the fintech ladder—what Revolut’s new UK banking license means for digital finance.

Global Hospitality Under Attack: How a Phishing Plot Exploits Trust and Speed
A phishing campaign impersonating Booking.com is targeting hotels worldwide—exploiting trust to steal data.

2025 Trends & Perils in Application Security
Explore the top application security trends and threats of 2025—from rising attack rates to AI-driven exploits reshaping how apps are targe...
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
Virtual Event | Apr 18, 2024 | 5:30PM - 6:45 PM ET |
As email security measures have evolved, cybercriminals have adapted by employing more advanced attack methods, particularly artificial intelligence (AI), to circumvent existing protections. However, security defenders are harnessing the power of AI in innovative ways to strengthen their networks.
Hosted by KnowBe4 and Energize Marketing, this event brings together industry experts James McQuiggan, Security Awareness Advocate for KnowBe4, and Brandon Smith, Product Manager at KnowBe4, alongside our esteemed host David Steifman, TechEvents host and Managing Partner at Energize Marketing. Together, they will delve into the insights gleaned from KnowBe4's latest Osterman joint report on The Role of AI in Email Security, offering invaluable tips on harnessing AI to bolster your anti-phishing defense.
Don't let cybercriminals dictate the narrative. Empower your SOC team with the knowledge and tools they need to thwart emerging threats.
Learn More
Speakers
%20(4).png?width=126&height=126&name=James%20McQuiggan%20KnowBe4%20(200%20%C3%97%20200%20px)%20(4).png)
James McQuiggan
Security Awareness Advocate, KnowBe4

Brandon Smith
Product Manager at KnowBe4
%20(3).png?width=126&height=126&name=David%20Steifman%20(200%20%C3%97%20200%20px)%20(3).png)
David Steifman
Host TechEvents & Managing Partner, Energize Marketing

Megan Lynch
Lead Mixologist

Top 5 Cybersecurity Scandals Involving Insider Threats
A look back at 5 major insider threat cases—from Tesla to Capital One—showing how internal actors can trigger some of cybersecurity’s most ...

Top 5 Nation-State Cyber Attacks That Changed the Game
A look back at 5 nation-state cyberattacks—from Stuxnet to SolarWinds—that redefined digital warfare and reshaped global geopolitics.

Top 5 Ransomware Groups
A look back at 5 of the most disruptive ransomware groups shaping global cyber threats—from LockBit to Akira.

Q&A: Cybersecurity Consultant Doug Cahill Explains the Role of Identity and Access Management in the Enterprise and in the Cloud
Gain expert insights on the critical role of identity and access management (IAM) in cybersecurity and how it adapts to evolving threats.

Q&A: Voodoo Security Founder and Principal Consultant, David Shackleford, Outlines How SMBs Can Implement Cloud Security Successfully
Learn how small to midsize businesses can effectively implement cloud security by understanding the shared-responsibility model, selecting ...

Q&A: Deloitte Zero Trust Leader Wayne Mattadeen on how SMBs can Deploy a Zero Trust Architecture
This interview provides insights into deploying a Zero Trust architecture for SMBs, featuring expert advice from Wayne Mattadeen at Deloitt...