Navigating Tomorrow's Tech Today
Top Headlines
When Ransomware Hits the High Street: Inside the M&S and Harrods Breaches
M&S and Harrods hit by cyberattacks linked to Scattered Spider, exposing growing threats to UK retail and digital infrastructure.
Defending the Cloud: Microsoft’s Geopolitical Break with the White House
Inside Trump’s First 100 Days of Ripping Up the Cyber Rulebook
1
Regulators Flag Systemic Concerns about the Risks of AI in Finance
2
AWS Supercharges DevOps with Generative AI in OpenSearch
3
UniCredit Leads the Rise of AI-driven Mergers & Acquisitions
4
The Tax-Time Trap & What Phishing Campaigns Reveal About the State of Threat Intelligence
5
Critical, But at What Cost? Hong Kong’s New Cyber Law and the Global Stakes of Securing Infrastructure

Cybersecurity’s Blind Spot & The C-Suite Trust Gap
A new EY study exposes a dangerous gap between CISOs and CEOs on cybersecurity threats, revealing leadership misalignment that puts enterpr...

Lifecycle Control Meets Cryptographic Change: PQC Integration Across DevOps Workflows
AppViewX brings post-quantum readiness to DevOps and SecOps with tools that turn cryptographic risk into operational control.

Data Observability Focus Shifts to AI, Unstructured Data, and Integrated Governance
AI is reshaping data observability—demanding focus on unstructured data, integrated governance, and trust in model outputs.

Real-Time Payments Gain Traction With New RTP Networks and Cross-Border Initiatives
Real-time payments are reshaping finance as RTP networks expand and cross-border initiatives grow, pushing fintechs to act fast and innovat...

Banks Accelerate AI Deployment in the Cloud, Touting Efficiency and Sustainability Gains
Banks are accelerating AI migration to the cloud for greater efficiency &sustainability, while navigating new risks tied to provider relian...

Java Turns 30 with Enhanced Data Handling Capabilities
Oracle introduces Java 24 to improve data management and performance.

Quantum Computing Application Development Gains Traction as Hardware Advances
Quantum computing is gaining traction, with advances in hardware and growing urgency around quantum cryptography driving real-world applica...

Platform Engineering Takes Center Stage, Promising Improved Developer Experiences
Platform engineering and internal developer platforms help DevOps tackle rising complexity, technical debt, and accelerate software deliver...

Neobanks expand Services, Driving Open Banking Adoption
Neobanks are expanding services and embracing Open Banking, driving innovation, better customer experiences, and competition with tradition...
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
Virtual Event | Apr 18, 2024 | 5:30PM - 6:45 PM ET |
As email security measures have evolved, cybercriminals have adapted by employing more advanced attack methods, particularly artificial intelligence (AI), to circumvent existing protections. However, security defenders are harnessing the power of AI in innovative ways to strengthen their networks.
Hosted by KnowBe4 and Energize Marketing, this event brings together industry experts James McQuiggan, Security Awareness Advocate for KnowBe4, and Brandon Smith, Product Manager at KnowBe4, alongside our esteemed host David Steifman, TechEvents host and Managing Partner at Energize Marketing. Together, they will delve into the insights gleaned from KnowBe4's latest Osterman joint report on The Role of AI in Email Security, offering invaluable tips on harnessing AI to bolster your anti-phishing defense.
Don't let cybercriminals dictate the narrative. Empower your SOC team with the knowledge and tools they need to thwart emerging threats.
Learn More
Speakers
%20(4).png?width=126&height=126&name=James%20McQuiggan%20KnowBe4%20(200%20%C3%97%20200%20px)%20(4).png)
James McQuiggan
Security Awareness Advocate, KnowBe4

Brandon Smith
Product Manager at KnowBe4
%20(3).png?width=126&height=126&name=David%20Steifman%20(200%20%C3%97%20200%20px)%20(3).png)
David Steifman
Host TechEvents & Managing Partner, Energize Marketing

Megan Lynch
Lead Mixologist

Top 5 Cyber Regulations in 2025
Explore the top 5 cybersecurity regulations shaping 2025—from DORA to the ROUTERS Act—and what they mean for risk, compliance, and resilien...

Top 5 Industries Facing Persistent Cybersecurity Challenges in 2025
Explore the top 5 cybersecurity regulations shaping 2025—from DORA to the ROUTERS Act—and what they mean for risk, compliance, and resilien...

Top 5 Cyber Vulnerabilities Exploited by Hackers
Most breaches aren’t caused by elite hackers—they exploit basic cybersecurity gaps. Discover the top 5 vulnerabilities putting businesses a...

Q&A: Cybersecurity Consultant Doug Cahill Explains the Role of Identity and Access Management in the Enterprise and in the Cloud
Gain expert insights on the critical role of identity and access management (IAM) in cybersecurity and how it adapts to evolving threats.

Q&A: Voodoo Security Founder and Principal Consultant, David Shackleford, Outlines How SMBs Can Implement Cloud Security Successfully
Learn how small to midsize businesses can effectively implement cloud security by understanding the shared-responsibility model, selecting ...

Q&A: Deloitte Zero Trust Leader Wayne Mattadeen on how SMBs can Deploy a Zero Trust Architecture
This interview provides insights into deploying a Zero Trust architecture for SMBs, featuring expert advice from Wayne Mattadeen at Deloitt...