Navigating Tomorrow's Tech Today
Top Headlines
America’s AI Pivot as Trump Dismantles Biden-Era Regulations in Sweeping Order
Trump's sweeping order dismantles Biden-era AI regulations, prioritizing market-driven innovation over federal oversight, sparking debate o...
UK National Lottery to Modernize Payouts with Direct Bank Transfers
DHS Terminates Advisory Committees, Halts Probe into Chinese-Linked Telecom Hack
More News
1
Cash App’s Parent Company Block Inc Receives $80 Million Fine for AML Violations
2
Green Financing to Add Almost $1 Billion to Standard Chartered Revenue, Claims CEO
3
The Department of Justice Indicts Five in North Korean IT Fraud Scheme That Laundered Over $866K
4
FBI Warns of North Korean IT Workers Exploiting U.S. Companies for Cybercrime and Extortion
5
Tech Sell-Off Shakes Dow and Nasdaq as Deep Seek Emerges as a New AI Contender

AI & Identity & Access Management (IAM) – Between Innovation and Risks
AI-driven IAM boosts security but poses risks from automation errors to compliance challenges, demanding careful oversight.

GoDaddy's Cybersecurity Failures: A Wake-Up Call from the FTC
The FTC criticizes GoDaddy for years of cybersecurity failures, exposing millions of users, but imposes no immediate financial penalties.

Indonesia Challenges Google Monopoly with $12.4M Fine and Calls for Fairer App Store Policies
Indonesia fines Google $12.4M for monopolistic app store practices, demanding fairer payment options for developers and consumers.

Routine Interactions, Extraordinary Threats: The Rise of Fake CAPTCHA Malware
Cybercriminals use fake CAPTCHA pages to spread Lumma Stealer malware, stealing sensitive data from over 1.4 million users.

XTX Markets to Invest €1 Billion in New Finnish Data Center for High-Frequency Trading
XTX Markets invests $1 billion in Finland for a cutting-edge, sustainable high-frequency trading data center.

Fintechs Gain Access to SandboxAQ’s Quantum AI Solutions on Google Cloud
Fintechs gain a competitive edge with SandboxAQ's quantum AI solutions.
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
Virtual Event | Apr 18, 2024 | 5:30PM - 6:45 PM ET |
As email security measures have evolved, cybercriminals have adapted by employing more advanced attack methods, particularly artificial intelligence (AI), to circumvent existing protections. However, security defenders are harnessing the power of AI in innovative ways to strengthen their networks.
Hosted by KnowBe4 and Energize Marketing, this event brings together industry experts James McQuiggan, Security Awareness Advocate for KnowBe4, and Brandon Smith, Product Manager at KnowBe4, alongside our esteemed host David Steifman, TechEvents host and Managing Partner at Energize Marketing. Together, they will delve into the insights gleaned from KnowBe4's latest Osterman joint report on The Role of AI in Email Security, offering invaluable tips on harnessing AI to bolster your anti-phishing defense.
Don't let cybercriminals dictate the narrative. Empower your SOC team with the knowledge and tools they need to thwart emerging threats.
Learn More
Speakers
%20(4).png?width=126&height=126&name=James%20McQuiggan%20KnowBe4%20(200%20%C3%97%20200%20px)%20(4).png)
James McQuiggan
Security Awareness Advocate, KnowBe4

Brandon Smith
Product Manager at KnowBe4
%20(3).png?width=126&height=126&name=David%20Steifman%20(200%20%C3%97%20200%20px)%20(3).png)
David Steifman
Host TechEvents & Managing Partner, Energize Marketing

Megan Lynch
Lead Mixologist

Top 10 Ransomware Threats
Uncover the top 10 ransomware threats of 2024, from crypto ransomware to wiper malware, and learn how these evolving tactics are reshaping ...

Top 10 Data Breaches
Explore the year's most alarming cyberattacks, from healthcare breaches to critical infrastructure threats, and uncover lessons in digital ...

Top 10 Cybersecurity Threats
Discover the top 10 cybersecurity threats of 2024, from AI-driven attacks to IoT vulnerabilities, and learn how to safeguard against them.

Q&A: Cybersecurity Consultant Doug Cahill Explains the Role of Identity and Access Management in the Enterprise and in the Cloud
Gain expert insights on the critical role of identity and access management (IAM) in cybersecurity and how it adapts to evolving threats.

Q&A: Voodoo Security Founder and Principal Consultant, David Shackleford, Outlines How SMBs Can Implement Cloud Security Successfully
Learn how small to midsize businesses can effectively implement cloud security by understanding the shared-responsibility model, selecting ...

Q&A: Deloitte Zero Trust Leader Wayne Mattadeen on how SMBs can Deploy a Zero Trust Architecture
This interview provides insights into deploying a Zero Trust architecture for SMBs, featuring expert advice from Wayne Mattadeen at Deloitt...