Navigating Tomorrow's Tech Today
Top Headlines
2024 Technology-Services M&A: Scale Over Sustainability?
The robust technology services M&A activity in 2024 can serve as a roadmap for what to watch for and how to adjust in 2025.
Thailand OKs Three New Digital Banking Entrants in a Bid to Redefine Financial Access
$10B AWS North Carolina Data Center Fuses Compute, Cooling and Community
1
NVIDIA, AIST Launch ABCI-Q Testbed for Quantum-AI Convergence
2
China Flexes AI Muscle with Constellation of 2,800 Satellites
3
When Ransomware Hits the High Street: Inside the M&S and Harrods Breaches
4
Defending the Cloud: Microsoft’s Geopolitical Break with the White House
5
Inside Trump’s First 100 Days of Ripping Up the Cyber Rulebook

Cybersecurity’s Blind Spot & The C-Suite Trust Gap
A new EY study exposes a dangerous gap between CISOs and CEOs on cybersecurity threats, revealing leadership misalignment that puts enterpr...

Lifecycle Control Meets Cryptographic Change: PQC Integration Across DevOps Workflows
AppViewX brings post-quantum readiness to DevOps and SecOps with tools that turn cryptographic risk into operational control.

Data Observability Focus Shifts to AI, Unstructured Data, and Integrated Governance
AI is reshaping data observability—demanding focus on unstructured data, integrated governance, and trust in model outputs.

Real-Time Payments Gain Traction With New RTP Networks and Cross-Border Initiatives
Real-time payments are reshaping finance as RTP networks expand and cross-border initiatives grow, pushing fintechs to act fast and innovat...

Banks Accelerate AI Deployment in the Cloud, Touting Efficiency and Sustainability Gains
Banks are accelerating AI migration to the cloud for greater efficiency &sustainability, while navigating new risks tied to provider relian...

Java Turns 30 with Enhanced Data Handling Capabilities
Oracle introduces Java 24 to improve data management and performance.

PayPal, Mastercard See Stablecoins as the Future of Business Payments
Find out about the stablecoin payment systems Mastercard and PayPal are currently testing and which can settle payments in minutes for just...

JINX-0132 Compromises Misconfigured DevOps to Power Cryptojacking Operation
Read how a cryptojacking operation named JINX-0132 compromising misconfigurations made during the DevOps cycle to turn tools into silent cr...

Five Eyes Sound Alarm, Issue First Global Blueprint to Secure AI Data
Learn more about the blueprint for securing AI Data that intelligence agencies under the Five Eyes umbrella recently issued.
The Role of AI in Email Security and How Real-Time Threat Intelligence Can Supercharge Your SOC Team
Virtual Event | Apr 18, 2024 | 5:30PM - 6:45 PM ET |
As email security measures have evolved, cybercriminals have adapted by employing more advanced attack methods, particularly artificial intelligence (AI), to circumvent existing protections. However, security defenders are harnessing the power of AI in innovative ways to strengthen their networks.
Hosted by KnowBe4 and Energize Marketing, this event brings together industry experts James McQuiggan, Security Awareness Advocate for KnowBe4, and Brandon Smith, Product Manager at KnowBe4, alongside our esteemed host David Steifman, TechEvents host and Managing Partner at Energize Marketing. Together, they will delve into the insights gleaned from KnowBe4's latest Osterman joint report on The Role of AI in Email Security, offering invaluable tips on harnessing AI to bolster your anti-phishing defense.
Don't let cybercriminals dictate the narrative. Empower your SOC team with the knowledge and tools they need to thwart emerging threats.
Learn More
Speakers
%20(4).png?width=126&height=126&name=James%20McQuiggan%20KnowBe4%20(200%20%C3%97%20200%20px)%20(4).png)
James McQuiggan
Security Awareness Advocate, KnowBe4

Brandon Smith
Product Manager at KnowBe4
%20(3).png?width=126&height=126&name=David%20Steifman%20(200%20%C3%97%20200%20px)%20(3).png)
David Steifman
Host TechEvents & Managing Partner, Energize Marketing

Megan Lynch
Lead Mixologist

Top 5 Cyber Regulations in 2025
Explore the top 5 cybersecurity regulations shaping 2025—from DORA to the ROUTERS Act—and what they mean for risk, compliance, and resilien...

Top 5 Industries Facing Persistent Cybersecurity Challenges in 2025
Explore the top 5 cybersecurity regulations shaping 2025—from DORA to the ROUTERS Act—and what they mean for risk, compliance, and resilien...

Top 5 Cyber Vulnerabilities Exploited by Hackers
Most breaches aren’t caused by elite hackers—they exploit basic cybersecurity gaps. Discover the top 5 vulnerabilities putting businesses a...

Q&A: Cybersecurity Consultant Doug Cahill Explains the Role of Identity and Access Management in the Enterprise and in the Cloud
Gain expert insights on the critical role of identity and access management (IAM) in cybersecurity and how it adapts to evolving threats.

Q&A: Voodoo Security Founder and Principal Consultant, David Shackleford, Outlines How SMBs Can Implement Cloud Security Successfully
Learn how small to midsize businesses can effectively implement cloud security by understanding the shared-responsibility model, selecting ...

Q&A: Deloitte Zero Trust Leader Wayne Mattadeen on how SMBs can Deploy a Zero Trust Architecture
This interview provides insights into deploying a Zero Trust architecture for SMBs, featuring expert advice from Wayne Mattadeen at Deloitt...