Navigating Tomorrow's Tech Today
Top Headlines
The Governance Vacuum: AI and Low-Code Are Redefining Enterprise Risk Without Permission
Software development has been fractured across departments, democratized in the name of agility and that has taken a toll on measuring risk...
Leaky DevOps Pose Danger: JINX-0132 Exploited Visibility Gaps
Healthcare Is Primed for IoT Breach, But So Are All Sectors
1
In Case You Missed It: State Department Weakens Cyber Diplomacy, Crypto24 Ups Ransomware Game and Manufacturers Get Wise to Cyber Risk
2
Palo Alto Networks' Acquisition of CyberArk is a Big Deal for Identity Management and Future Security Resilience)
3
Fujitsu’s Multi-AI Agent Security: Building an Autonomous Defense for an Autonomous Threat Landscape
4
Better AI Won’t Necessarily Lead to Better Results, But Better Prompts Will
5
Tennessee and Minnesota Implement Privacy Laws

Cybersecurity’s Blind Spot & The C-Suite Trust Gap
A new EY study exposes a dangerous gap between CISOs and CEOs on cybersecurity threats, revealing leadership misalignment that puts enterpr...

Lifecycle Control Meets Cryptographic Change: PQC Integration Across DevOps Workflows
AppViewX brings post-quantum readiness to DevOps and SecOps with tools that turn cryptographic risk into operational control.

Data Observability Focus Shifts to AI, Unstructured Data, and Integrated Governance
AI is reshaping data observability—demanding focus on unstructured data, integrated governance, and trust in model outputs.

Real-Time Payments Gain Traction With New RTP Networks and Cross-Border Initiatives
Real-time payments are reshaping finance as RTP networks expand and cross-border initiatives grow, pushing fintechs to act fast and innovat...

Banks Accelerate AI Deployment in the Cloud, Touting Efficiency and Sustainability Gains
Banks are accelerating AI migration to the cloud for greater efficiency &sustainability, while navigating new risks tied to provider relian...

Java Turns 30 with Enhanced Data Handling Capabilities
Oracle introduces Java 24 to improve data management and performance.

As CISA Limps, the Private Sector Must Step In
Businesses don’t have the luxury of waiting for the government to sort out CISA or flesh out its responsibilities. Read how companies are f...

AppSec Delays Are Real, and Risky: Security Leaders Say It’s Security, Not Bugs, Holding Back Releases
New research underscores the need to embed security earlier in the development lifecycle, invest in expert support, and make AppSec a strat...

AWS Lays Out Blueprint for Breach Resilience
See how AWS has laid a blueprint to make cloud security both more resilient and scalable with the AWS Shield Network Security Director.
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
Virtual Event | Apr 18, 2024 | 5:30PM - 6:45 PM ET |
As email security measures have evolved, cybercriminals have adapted by employing more advanced attack methods, particularly artificial intelligence (AI), to circumvent existing protections. However, security defenders are harnessing the power of AI in innovative ways to strengthen their networks.
Hosted by KnowBe4 and Energize Marketing, this event brings together industry experts James McQuiggan, Security Awareness Advocate for KnowBe4, and Brandon Smith, Product Manager at KnowBe4, alongside our esteemed host David Steifman, TechEvents host and Managing Partner at Energize Marketing. Together, they will delve into the insights gleaned from KnowBe4's latest Osterman joint report on The Role of AI in Email Security, offering invaluable tips on harnessing AI to bolster your anti-phishing defense.
Don't let cybercriminals dictate the narrative. Empower your SOC team with the knowledge and tools they need to thwart emerging threats.
Learn More
Speakers
%20(4).png?width=126&height=126&name=James%20McQuiggan%20KnowBe4%20(200%20%C3%97%20200%20px)%20(4).png)
James McQuiggan
Security Awareness Advocate, KnowBe4

Brandon Smith
Product Manager at KnowBe4
%20(3).png?width=126&height=126&name=David%20Steifman%20(200%20%C3%97%20200%20px)%20(3).png)
David Steifman
Host TechEvents & Managing Partner, Energize Marketing

Megan Lynch
Lead Mixologist

Top 5 Cyber Regulations in 2025
Explore the top 5 cybersecurity regulations shaping 2025—from DORA to the ROUTERS Act—and what they mean for risk, compliance, and resilien...

Top 5 Industries Facing Persistent Cybersecurity Challenges in 2025
Explore the top 5 cybersecurity regulations shaping 2025—from DORA to the ROUTERS Act—and what they mean for risk, compliance, and resilien...

Top 5 Cyber Vulnerabilities Exploited by Hackers
Most breaches aren’t caused by elite hackers—they exploit basic cybersecurity gaps. Discover the top 5 vulnerabilities putting businesses a...

Q&A: Cybersecurity Consultant Doug Cahill Explains the Role of Identity and Access Management in the Enterprise and in the Cloud
Gain expert insights on the critical role of identity and access management (IAM) in cybersecurity and how it adapts to evolving threats.

Q&A: Voodoo Security Founder and Principal Consultant, David Shackleford, Outlines How SMBs Can Implement Cloud Security Successfully
Learn how small to midsize businesses can effectively implement cloud security by understanding the shared-responsibility model, selecting ...

Q&A: Deloitte Zero Trust Leader Wayne Mattadeen on how SMBs can Deploy a Zero Trust Architecture
This interview provides insights into deploying a Zero Trust architecture for SMBs, featuring expert advice from Wayne Mattadeen at Deloitt...