SIEM News Archives - Best Network Monitoring Vendors, Software, Tools and Performance Solutions https://solutionsreview.com/network-monitoring/category/siem-news/ Solutions Review Network Monitoring Thu, 01 May 2025 21:22:05 +0000 en-US hourly 1 https://wordpress.org/?v=6.4.2 https://solutionsreview.com/network-monitoring/files/2024/01/cropped-android-chrome-512x512-1-32x32.png SIEM News Archives - Best Network Monitoring Vendors, Software, Tools and Performance Solutions https://solutionsreview.com/network-monitoring/category/siem-news/ 32 32 RSA Conference 2025: The Top News and Announcements https://solutionsreview.com/security-information-event-management/rsa-conference-2025-the-top-news-and-announcements/ Thu, 01 May 2025 21:22:05 +0000 https://solutionsreview.com/network-monitoring/rsa-conference-2025-the-top-news-and-announcements/ The editors at Solutions Review have curated this list to spotlight some of the most noteworthy news and announcements made at the RSA Conference 2025, held at Moscone Center in San Francisco from April 28th to May 1st. For the last 30+ years, the RSAC Conference has been a leading example of the power of […]

The post RSA Conference 2025: The Top News and Announcements appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>
RSA Conference 2025: - The Top News and Announcements

The editors at Solutions Review have curated this list to spotlight some of the most noteworthy news and announcements made at the RSA Conference 2025, held at Moscone Center in San Francisco from April 28th to May 1st.

For the last 30+ years, the RSAC Conference has been a leading example of the power of the cybersecurity community. Over the last several days, companies worldwide have come together—virtually and on-site in San Francisco, California—to share timely insights and actionable intelligence with peers and customers alike. With nearly 700 sessions, events, and opportunities for interaction scheduled during the three-day event, there was no shortage of avenues for cybersecurity professionals across markets to discuss and learn about the latest ideas and insights across critical AI topics.

Additionally, with so much of the cybersecurity community coming together for RSAC, many of the leading companies in the space capitalized on the opportunity to announce new products, features, enhancements, and partnerships to help their clients and each other build smarter, faster, and more resilient cyber defense strategies. The Solutions Review editors have summarized some top headlines in the curated list below. The list is organized alphabetically by company name.

For early access to all the expert insights published on Solutions Review, join Insight Jam, a community dedicated to enabling the human conversation on AI.

The Top News and Announcements From the RSA Conference 2025


Abnormal AI Announces New AI Agents

Abnormal AI, an AI-native human behavior security solution, has announced autonomous AI agents. With the AI Phishing Coach and AI Data Analyst agents, organizations can revolutionize how they train employees, report on risks, prevent advanced email attacks, turn complex security data into instantly usable intelligence, explore specific data points, and more. Abnormal AI is also expanding its Inbound Email Security with three new tools: Quarantine Release, URL Rewriting, and Enterprise Remediation Settings.

Read on for more.


Anetac Details a New Feature for Managing Identity Vulnerabilities

Anetac, a company focused on protecting its clients from identity-based vulnerabilities in hybrid environments, has announced the global rollout of Human Link Pro. This new capability aims to unify the management of human and non-human identity vulnerabilities within the Anetac Identity Vulnerability Management Platform. The capability can also help users address the challenges of managing complex identity infrastructures that span both on-premises and cloud environments.

Read on for more.


AppOmni Expands the Capabilities of Its AskOmni Solution

AppOmni, a SaaS security company, has announced that AskOmni, its AI-powered SaaS security companion, can now operate as a Model Context Protocol (MCP) server. The advancement will enable seamless integration with security-focused AI agents and security platforms, including SIEM, NDR, XDR, and IAM solutions. The AppOmni MCP server also aims to provide deeper insights into SaaS identities, security posture, data exposures, and user behaviors.

Read on for more.


AuditBoard Reveals a New AI Governance Solution

AuditBoard, a global platform for connected risk that transforms audit, risk, and compliance, announced a new AI governance solution at the RSAC Conference. With this AI governance platform, customers can implement AI best practices outlined in frameworks like the National Institute of Standards and Technology’s AI Risk Management Framework (NIST AI RMF) to protect their organizations from the cyber, reputational, and financial risks associated with non-compliance.

Read on for more.


Cisco Announces Several New Partnerships and Feature Updates

Cisco made several partnership and feature announcements at the RSA Conference to help security professionals secure and harness the power of AI. The updates include the Instant Attack Verification feature, which integrates data from the Splunk platform, endpoints, networks, threat intelligence, and more; new automated XDR Forensics capabilities to provide more visibility into endpoint activity; the XDR Storyboard, which helps visualize complex attacks; an integration with ServiceNow; and new AI Supply Chain Risk Management security controls.

Read on for more.


Cymulate and SentinelOne Announce Their Partnership

Cymulate, a threat exposure validation company, has partnered with SentinelOne, an AI-powered cybersecurity platform.​​ The collaboration will combine Cymulate and SentinelOne’s security offerings to deliver self-healing endpoint security that empowers organizations to increase protection for every endpoint on their network. Additionally, Cymulate has become a member of SentinelOne’s Singularity Marketplace.

Read on for more.


Dataminr Unveils its Agentic AI Roadmap

Dataminr, a global AI company, has unveiled its Agentic AI roadmap, starting with Intel Agents, its first Agentic AI capability. Intel Agents will allow businesses to task AI agents to autonomously generate critical context as events, risks, and threats unfold. The agents are powered solely by Dataminr’s internally developed and operated LLMs, which are all trained on Dataminr’s proprietary 15-year data and event archive. This enables them to fuse relevant information from external public sources with rich insights from internal data sources.

Read on for more.


Diligent Details Its Partnership with Cloudflare and Qualys

Diligent—a governance, risk, and compliance (GRC) SaaS company—has announced a strategic partnership with Cloudflare, a connectivity cloud company, and Qualys, a disruptive cloud-based IT, security, and compliance solution provider. Together, the companies will launch the Cyber Risk Report, which can revolutionize how Chief Information Security Officers (CISOs) and security leaders communicate cyber risk to the board of directors.

Read on for more.


Entrust Releases the Entrust Cryptographic Security Platform

Entrust, a global provider of identity-centric security solutions, has announced the Entrust Cryptographic Security Platform, a unified, end-to-end cryptographic security management solution for keys, secrets, and certificates. With this platform, security, IT, and DevOps teams will have the control they need to streamline the deployment of cryptographic solutions. It will also equip teams with the centralized inventory and visibility required to manage increasingly complex operations and prepare for the shift to post-quantum cryptography.

Read on for more.


Flashpoint Introduces New Features to Its Platform

Flashpoint, the global provider of threat data and intelligence, has announced new capabilities for its flagship platform, Flashpoint Ignite. The new features include AI-powered risk discovery, curated threat feeds, asset-centric intelligence, and on-demand expansion of highly relevant data sources. These updates deliver actionable insights aligned with customers’ threat and intelligence needs, enabling organizations to make informed decisions and protect their critical assets.

Read on for more.


Forcepoint Showcases the Forcepoint Data Security Cloud Solution

Forcepoint, a global data security company, has launched the Forcepoint Data Security Cloud, an AI-powered data security platform designed to unite the visibility and control of data everywhere it’s created, stored, or moved. The platform is built for today’s hybrid, cloud- and AI-driven environments. Its features include automated, behavior-aware analytics, continuous monitoring, and other tools to help organizations improve their clarity, confidence, and control of the entire data security lifecycle.

Read on for more.


Graylog Launches the Spring 2025 Release of Its Security Solution

Graylog, a platform for Security, API protection, and IT Operations, has launched the Spring 2025 release of its Graylog Security solution. Building on the Fall 2024 release (version 6.1), this update will enhance analyst workflows, accelerate time-to-value, and help users set a new bar for speed and flexibility in their threat detection efforts. Specifically, the new Adversary Campaign Intelligence, Data Lake Preview, Selective Data Restore, and Threat Coverage Analyzer tools can equip teams with better detection, real-time context, and more control over what matters.

Read on for more.


Lineaje Debuts New Capabilities to Improve Software Supply Chain Security

Lineaje, a full-lifecycle software supply chain security company, has launched a collection of end-to-end capabilities to transform how organizations protect their critical software. With these features, companies can contextualize risks at all software development stages, proactively address the escalating dangers of software supply chain attacks, and autonomously secure open-source software, source code, and containers with agentic AI-powered self-healing agents.

Read on for more.


Menlo Security Enhances Its Solutions With New Features

Menlo Security, a Secure Enterprise Browser provider, has revealed several enhancements for its solution to give security teams the visibility and control they need to stay ahead of rising AI-powered browser threats. Debuting at the RSA Conference 2025, the latest features include a dedicated dashboard that allows customers to view and manage Secure Application Access and a new, advanced workflow process for the company’s Browsing Forensics offering.

Read on for more.


NetApp Reveals New Capabilities for Strengthening Cyber Resiliency

NetApp, an intelligent data infrastructure company, has announced new security capabilities to help customers strengthen their cyber resiliency. With these updates, security teams can now leverage NetApp to take a proactive approach to data security at the storage layer and enhance their overall security posture. The new additions include embedding post-quantum cryptography into its storage portfolio, updates to its ransomware protection tools,  additional support for its backup and recovery offerings, and expanded professional security assessment and security hardening services.

Read on for more.


Netwrix Adds New Capabilities to Its 1Secure Platform

Netwrix, a cybersecurity solutions provider focused on data and identity threats, unveiled new solutions and capabilities across its 1Secure SaaS platform during the RSA Conference 2025. The company also announced several new risk assessment features for the 1Secure platform, enabling companies to quickly scan their Active Directory, Entra ID, and Microsoft 365 environments to gain insight into security risks and misconfigurations.

Read on for more.


NVIDIA Announces the NVIDIA DOCA Software Framework

NVIDIA has announced a new NVIDIA DOCA software framework, part of the NVIDIA cybersecurity AI platform, which will bring runtime cybersecurity to AI factories. Running on the NVIDIA BlueField networking platform, NVIDIA DOCA Argus is designed to operate on every node to immediately detect and respond to attacks on AI workloads, all while integrating seamlessly with enterprise security systems to deliver instant threat insights.

Read on for more.


Oasis Security Announces the Oasis NHI Provisioning Solution

Oasis Security, a Non-Human Identity Management (NHIM) solution, announced the launch of Oasis NHI Provisioning at the RSA Conference. The new capability can automate the creation, governance, and security of Non-Human Identities (NHIs) from their inception. Built into the Oasis NHI Security Cloud, the solution addresses the critical challenges of fragmented processes, ungoverned sprawl, and manual workflows that plague NHI provisioning today.

Read on for more.


Palo Alto Networks Launches the Prisma AIRS Platform

Palo Alto Networks, a global AI cybersecurity company, has announced Prisma AIRS, a new AI security platform designed to protect the entire enterprise AI ecosystem, including AI apps, agents, models, and data. The Prisma AIRS platform aims to help customers deploy AI confidently and address the critical need for robust security in the face of rapid AI adoption across enterprises. Its capabilities include AI model scanning, posture management, AI red teaming, runtime security, and AI agent security tools.

Read on for more.


PRE Security Releases New AI-Powered Cybersecurity Solutions

PRE Security, an AI-native cybersecurity company, has launched GenAI EDR and MiniSOC, two solutions that aim to “redefine” the future of cybersecurity for organizations of all sizes. The GenAI Native EDR replaces outdated static, rule-based approaches with a fully Generative and Agentic AI design at the endpoint. Additionally, the MiniSOC solutions pair PRE Security’s AI SecOps platform with Apple’s M4-based Mac mini and M3 Ultra Mac Studio to eliminate the need for costly GPU servers while maintaining enterprise-class performance and efficiency.

Read on for more.


RSA Details Its New Help Desk Security Solution

RSA, a security-first identity company, has announced several cybersecurity innovations at the RSAC Conference 2025 that will help defend organizations against the next wave of AI-powered identity attacks, including IT Help Desk bypasses, malware, social engineering, and other threats. One of the major additions announced is the RSA Help Desk Live Verify feature, which uses bi-directional identity verification to prevent social engineering and technical support scams by ensuring users and IT staff are who they say they are.

Read on for more.


Saviynt Debuts an Identity Security Posture Management Solution

Saviynt, a provider of cloud-native identity security solutions, has launched its AI-powered Identity Security Posture Management (ISPM) solution as part of its converged Identity Cloud platform. With Saviynt’s ISPM offering, companies can utilize actionable insights into their identity and access posture, improve data hygiene, boost the efficiency of their governance controls, reduce audit findings, maintain continuous compliance, and bring application owners into the center of identity management.

Read on for more.


SecurityScorecard and BlinkOps Announce a New Alliance

SecurityScorecard, a supply chain detection and response (SCDR) solution, has announced a new technical alliance with BlinkOps, an AI-powered security automation platform. The partnership will integrate BlinkOps’ generative AI-driven automation capabilities with SecurityScorecard’s risk ratings to equip global security teams with a solution that gives them unparalleled visibility, automation, and control over their cybersecurity posture.

Read on for more.


Silverfort Introduces New Protections for Cloud-Based Identities

Silverfort, an identity security company, has expanded the protection of its non-human identity (NHI) security product to include cloud-based identities, covering NHIs in cloud identity providers, cloud infrastructure, and SaaS applications. The added capabilities will help businesses stop lateral movement, enforce service account protection, get actionable remediation recommendations, and discover and visualize the connections between human and non-human identities across hybrid environments.

Read on for more.


Skyhigh Security Integrates DSPM Capabilities Into Its SSE Solution

Skyhigh Security, a global provider of Security Service Edge (SSE) and data security, has announced the integration of Data Security Posture Management (DSPM) capabilities into its data-centric SSE platform. The new capabilities will build on Skyhigh Security’s existing data classification and protection platform services to provide organizations with deeper visibility into sensitive data and streamlined compliance management.

Read on for more.


SOCRadar Details Its New AI-Powered Cybersecurity Assistant

SOCRadar, a global extended threat intelligence and cybersecurity solution provider, has announced SOCRadar Copilot, an AI-powered cybersecurity assistant designed to enhance platform efficiency, automate routine security operations, and share knowledge and insights. The tool aims to help time-strapped security teams streamline their security and reporting processes while learning, adapting, and evolving to help those teams future-proof their defenses against changing risks.

Read on for more.


Sonatype Expands Its Repository Firewall Offering with New Features

Sonatype, an end-to-end software supply chain security company, has introduced several enhancements to its Repository Firewall offering. These updates will expand proactive malware protection efforts across the enterprise, from developer workstations to the network edge. The specific additions include an integration with Zscaler Internet Access (ZIA), Docker registry support, automated malware detection, and support for Hugging Face AI models.

Read on for more.


Superna Launches a Data Attack Surface Manager Platform

Superna, a CyberStorage security provider, has launched Superna Data Attack Surface Manager (DASM), a new platform that enables organizations to continuously identify, prioritize, and control exposure at the data layer. The company’s DASM includes features for data-first risk prioritization, continuous asset monitoring, compensating controls engine, workflow automation, and zero-day readiness. The solution is available now.

Read on for more.


Tuskira Debuts an AI Analyst Workforce

Tuskira, an  AI-native platform built to unify and optimize proactive and responsive security operations, has announced its fully autonomous AI Analyst Workforce at the RSA Conference 2025. The AI workforce includes analysts for detecting novel attacks, correlating emerging IOCs and TTPs, triaging alerts for detection, and identifying toxic security risks of vulnerabilities based on reachability, exposure, exploitability, business context, and defense coverage.

Read on for more.


The post RSA Conference 2025: The Top News and Announcements appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>
Identity Management and Information Security News for the Week of March 21st: Wiz, Trend Micro, Cytex, and More https://solutionsreview.com/identity-management/identity-management-and-information-security-news-for-the-week-of-march-14th-2/ Fri, 21 Mar 2025 17:13:44 +0000 https://solutionsreview.com/network-monitoring/identity-management-and-information-security-news-for-the-week-of-march-14th-2/ The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of March 21st. This round-up covers announcements and updates from Wiz, Trend Micro, Cytex, and more. Keeping tabs on all the most relevant Identity Management and Information Security news can be time-consuming. As a result, our […]

The post Identity Management and Information Security News for the Week of March 21st: Wiz, Trend Micro, Cytex, and More appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>
Identity Management and Information Security News for the Week of March 21st

The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week of March 21st. This round-up covers announcements and updates from Wiz, Trend Micro, Cytex, and more.

Keeping tabs on all the most relevant Identity Management and Information Security news can be time-consuming. As a result, our editorial team aims to summarize some of the top headlines in the space by curating a collection of the latest vendor product news, mergers and acquisitions, venture capital funding, talent acquisition, and other noteworthy news. With that in mind, here is some of the top identity management and information security news from March 21st.

For early access to all the expert insights published on Solutions Review, join Insight Jam, a community dedicated to enabling the human conversation on AI.

Identity Management and Information Security News for the Week of March 21st


Bedrock Security Launches a Metadata Lake Solution

Bedrock Security, a data security and management company, has launched a metadata lake technology solution. The new tool is designed to provide continuous visibility across enterprise metadata by automatically cataloging all existing data, where it resides, who is allowed to access it, and its level of sensitivity, alongside over fifty additional parameters. Bruno Kurtic, the CEO and co-founder at Bedrock Security, says, “Our metadata lake technology eliminates blind spots by putting data at the core of security and data management.”

Read on for more.


Cytex Debuts an LLM Firewall Solution

Cytex, an AI-driven cybersecurity company, has launched AICenturion, a new LLM Firewall solution outfitted with Data Loss Prevention (DLP) capabilities. The AICenturion solution will provide enterprises with the trust, risk, and security management they need to enable their AI model discovery, threat mitigation, data loss prevention, and compliance framework policy enforcement efforts. With its policy enforcement and contextual awareness functionalities, AICenturion can restrict access to sensitive data by preventing unauthorized internal users.

Read on for more.


HUMAN Security Releases New Bot Management Capabilities

HUMAN Security, a cybersecurity company committed to safeguarding customers’ online journeys, has announced HUMAN Sightline, a new suite of capabilities that detects, isolates, and tracks individual bot profiles. These tools are built to help security teams conduct faster investigations and optimize their response to evolving threats in the era of AI. For example, HUMAN Sightline comes equipped with sophisticated data modeling and a secondary detection engine that analyzes all the automated activity on an application and segments it into distinct profiles. This makes it easier for teams to identify and track shifts in bot behavior as they occur.

Read on for more.


Keyfactor Expands its Partnership with Utimaco

Keyfactor, an identity-first security solution for modern enterprises, has expanded its partnership with Utimaco, a global cybersecurity solution provider. As part of the collaboration, Keyfactor’s EJBCA Hardware Appliance will integrate with Utimaco’s General Purpose Hardware Security Module (HSM). Joe Tong, SVP of Global Channel at Keyfactor, says, “Together, through this integration, we’re empowering organizations to build trusted digital ecosystems that scale with their needs while providing the tools needed to prepare their environments for the arrival of post-quantum cryptography.”

Read on for more.


Proofpoint and Microsoft Expand Their Global Partnership

Proofpoint, a cybersecurity and compliance company, has announced an expansion to its global partnership with Microsoft. The partnership will leverage Microsoft Azure’s AI capabilities and cloud infrastructure to host Proofpoint’s future innovations and scale its AI-powered threat and data protection efforts. The expansion will also focus on driving scalable innovation and providing mutual customers with the human-centric security features they need to proactively detect and mitigate the threats that target people and the data they work with.

Read on for more.


Sift Introduces New Innovations to its Fraud Platform

Sift, an AI-powered fraud platform, has announced several product innovations to provide its clients with rapid and accurate risk decisioning. The enhancements include the introduction of Global Identity Insights, payment data intelligence for cryptocurrency transactions, risk signals, several Sift Console upgrades designed to streamline operations, and an Account Takeover (ATO) Activity Analyzer that will be released in April. Sift also introduced several industry-specific solutions to help businesses track betting patterns with increased precision.

Read on for more.


Trend Micro Announces the Open-Sourcing of Trend Cybertron

Trend Micro, a global cybersecurity provider, has announced the open-sourcing of Trend Cybertron, an AI model and agent framework designed to accelerate the development of autonomous cybersecurity agents. Trend Cybertron is fine-tuned by Llama 3.1 and supports rapid deployment with NVIDIA NIM inference microservices on NVIDIA’s accelerated infrastructure. The framework currently consists of an 8-billion parameter AI model alongside an initial specialized AI agent, with additional models and agents currently in development.

Read on for more.


Varonis Systems Acquires Cyral, a Database Activity Monitoring Provider

Varonis Systems, a data security company, has announced the acquisition of Cyral, a next-generation database activity monitoring (DAM) provider. The acquisition will allow Varonis to combine Cyral’s cloud-native DAM solution with its growing suite of database security capabilities. This will make it easier for customers to start upgrading their legacy solutions and eliminate the silos that separate their structured and unstructured data security. Yaki Faitelson, Varonis CEO, President, and Co-founder, says, “With this acquisition, we are addressing the most difficult database security challenges and equipping our customers with a modern, end-to-end platform.”

Read on for more.


Wiz is Acquired by Google’s Parent Company

Wiz, a leading cloud security platform, has announced that Google’s parent company, Alphabet, will acquire it for $32 billion. The acquisition is an investment by Google Cloud that focuses on accelerating cloud security and the ability to use multiple clouds (multi-cloud), two of the most significant trends in the AI era. Once the acquisition closes, Wiz will join Google Cloud. Wiz’s products will continue functioning and remain available across all major clouds, including Amazon Web Services, Microsoft Azure, and Oracle Cloud platforms. It will also be offered to customers through various partner security solutions.

Read on for more.


1Kosmos Details a New Tool for Shared Account Login Environments

1Kosmos, an identity-proofing and passwordless authentication platform, has announced details on 1Kosmos 1Key, a new tool for shared account login environments. 1Kosmos Key is outfitted with FIDO-compliant biometric authentication and aims to address the growing need for security, accountability, and auditability in environments where multiple users access shared accounts. With 1Kosmos 1Key, a user can log in with a FIDO-compliant biometric key that securely authenticates their identity and provides access to the shared accounts they are authorized to access. The tool will also monitor every login to maintain a secure, auditable record of every session.

Read on for more.


Expert Insights Section


Watch this space each week as our editors will share upcoming events, new thought leadership, and the best resources from Insight Jam, Solutions Review’s enterprise tech community for business software pros. The goal? To help you gain a forward-thinking analysis and remain on-trend through expert advice, best practices, trends and predictions, and vendor-neutral software evaluation tools.


Security and Governance of Edge AI Devices

Aparna Achanta, the Security and Compliance Lead at IBM Consulting, shares her insights into the role security and governance can (and should) play in Edge AI devices. In her article, Achanta discusses the growing need for Edge AI, how it might affect the future of IoT devices, what industries will most benefit from it, and the need for stronger regulations and governance.

Read on for more.


Rethinking Security in the Age of Agentic AI

James White, the President and Chief Technology Officer at CalypsoAI, recently commented on why companies need to rethink their security initiatives in the age of agentic AI. For example, his article says, “While agentic AI promises a major leap in efficiency—reducing the need for human involvement in certain tasks—it also presents significant new security risks. Crucially, those risks are either not very well understood or are being overlooked in the race for cost savings and productivity gains.”

Read on for more.


For consideration in future news round-ups, send your announcements to wjepma@solutionsreview.com.

The post Identity Management and Information Security News for the Week of March 21st: Wiz, Trend Micro, Cytex, and More appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>
What to Expect from the Solutions Spotlight with Secureworks on January 30th, 2025 https://solutionsreview.com/security-information-event-management/what-to-expect-from-the-solutions-spotlight-with-secureworks-on-january-30th-2025/ Thu, 09 Jan 2025 15:41:13 +0000 https://solutionsreview.com/network-monitoring/what-to-expect-from-the-solutions-spotlight-with-secureworks-on-january-30th-2025/ Solutions Review’s Solution Spotlight with Secureworks is part of an exclusive webinar series for enterprise business software users. This event will feature an hour-long discussion and software demo to help viewers improve their exposure management processes. What is a Solutions Spotlight? Solutions Review’s Solution Spotlights are exclusive, expert webinar events for industry professionals across the enterprise […]

The post What to Expect from the Solutions Spotlight with Secureworks on January 30th, 2025 appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>

Solutions Review’s Solution Spotlight with Secureworks is part of an exclusive webinar series for enterprise business software users. This event will feature an hour-long discussion and software demo to help viewers improve their exposure management processes.

What is a Solutions Spotlight?

Solutions Review’s Solution Spotlights are exclusive, expert webinar events for industry professionals across the enterprise technology and MarTech fields. Since its first virtual event in June 2020, Solutions Review has expanded its multimedia capabilities in response to the overwhelming demand for these events. Solutions Review’s current menu of online offerings includes the Demo Day, Solution Spotlight, Expert Webinars, and panel discussions. And the best part about the “Spotlight” series? They are free to attend!

Why You Should Attend

Solutions Review is one of the largest communities of IT executives, directors, and decision-makers in enterprise technology marketplaces. Every year, over 10 million people visit Solutions Review’s collection of sites for the latest news, best practices, and insights into solving some of their most complex problems.

For this Solutions Spotlight event, the Solutions Review team has partnered with Secureworks, a cybersecurity company that offers a combination of cloud-native, SaaS security platforms and intelligence-driven security solutions. The hour-long webinar will discuss global cybersecurity legislation trends, provide a high-level description of NIS2, and go into Articles 20, 21, and 23, providing viewers with insight into the governance, cybersecurity risk-management measures, and reporting obligations associated with each.

Speakers

Marco Ratto, Data Protection Officer and Global Contract Director: Marco brings over 15 years of expertise in the cybersecurity and IT sectors. He holds certifications from the International Association of Privacy Professionals and World Commerce & Contracting. Marco is highly skilled in managing data protection compliance matters and inquiries, as well as in leading complex contract negotiations.

Ritesh Singhai, Vice President of Global Solution Engineering: As the lead of Secureworks’ Global Solution Engineering function, Ritesh is focused on designing innovative, future-proof solutions to defend our customers’ environments. He joined Secureworks in 2009 to drive growth in EMEA, and since then, he has held various leadership roles, building world-class solutions teams to support global initiatives.

About Secureworks

Secureworks is a global cybersecurity leader focused on helping its customers and partners in the education, financial, government, and manufacturing markets outpace and outmaneuver adversaries with more precision, enabling them to adapt and respond to market forces with increased agility. Its solution suite includes Network Security, Endpoint Security, Vulnerability Management, Identity Security, OT Security, and Detection and Response offerings.

FAQ

  • What: NIS2 Directive and How Secureworks Can Help
  • When: Thursday, January 30th, 2025, at 12:00 PM Eastern Time
  • Where: Zoom meeting (see registration page for more details), LinkedIn, and Insight Jam.

Register for the Solutions Spotlight with Secureworks for FREE

The post What to Expect from the Solutions Spotlight with Secureworks on January 30th, 2025 appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>
74 Cybersecurity Predictions from Industry Experts for 2025 https://solutionsreview.com/security-information-event-management/cybersecurity-predictions-from-industry-experts-for-2025/ Thu, 12 Dec 2024 16:31:34 +0000 https://solutionsreview.com/network-monitoring/62-cybersecurity-predictions-from-industry-experts-for-2025/ As part of this year’s Insight Jam LIVE event, the Solutions Review editors have compiled a list of predictions for 2025 from some of the most experienced professionals across the SIEM, Endpoint Security, Networking Monitoring, and broader cybersecurity marketplaces. As part of Solutions Review’s annual Insight Jam LIVE event, we called for the industry’s best […]

The post 74 Cybersecurity Predictions from Industry Experts for 2025 appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>
Cybersecurity Predictions from Industry Experts for 2025

As part of this year’s Insight Jam LIVE event, the Solutions Review editors have compiled a list of predictions for 2025 from some of the most experienced professionals across the SIEM, Endpoint Security, Networking Monitoring, and broader cybersecurity marketplaces.

As part of Solutions Review’s annual Insight Jam LIVE event, we called for the industry’s best and brightest to share their SIEM, endpoint, and cybersecurity predictions for 2025 and beyond. The experts featured represent some of the top solution providers with experience in these marketplaces, and each projection has been vetted for relevance and ability to add business value.

Cybersecurity Predictions for 2025 and Beyond


Idan Plotnik, co-founder and CEO of Apiiro

Security architects will surrender to genAI and open-source developments:

“In 2025, the rise of generative AI and open-source developments will bring new layers of complexity to software architecture, challenging consistent security oversight. As development velocity accelerates, manual security reviews and checklists won’t keep up, and application security engineers and security architects will lose all control. Companies should pivot toward automation and integrated security tools that provide continuous, scalable oversight while embracing a shift-left security approach to keep pace with agile, AI-driven application development cycles.”

Software architecture complexity will challenge security posture control

“With AI and code generation becoming core to software development, we’re on the verge of unprecedented architectural complexity that will make traditional security posture control nearly impossible. By 2025, new forms of malware and open-source codebase vulnerabilities will emerge, and attackers will leverage AI to craft advanced, evasive malware.”

The rise of AI-driven threats in open-source

“In 2025, open-source software threats will shift from traditional vulnerabilities to AI-generated backdoors and malware embedded in open-source packages. With attackers leveraging AI tools to develop and disguise malware within open source code, addressing these new threats will require a significant advancement in security tools to stay ahead of these quickly evolving challenges.”


Nadir Izrael, co-founder and CTO at Armis Security

Unified Security Management for Holistic Risk Prioritization

“The rise of AI-driven cyber weapons and the increasingly blurred lines between military and civilian targets underscores the need for a holistic approach to security. A “single-pane-of-glass” strategy—one that consolidates security insights from diverse inputs like source code, misconfigurations, and vulnerabilities—will become essential to navigating the complexities of cyberwarfare in 2025.

“Unified security management platforms that integrate early-warning intelligence and risk prioritization across an enterprise’s entire infrastructure will be the cornerstone of cyber defense strategies. By offering a clear, comprehensive view of security vulnerabilities, risks, and threats, organizations can make more informed decisions and mitigate risks before they materialize into full-scale attacks.”


Yevgeny Dibrov, co-founder and CEO at Armis

Cybersecurity as a Board-Level Concern

“In 2025, cybersecurity will no longer solely be a technical issue relegated to IT teams—it increasingly becomes a board-level priority. With the rising frequency and severity of cyber-attacks, boards of directors will require platforms that provide executive-level visibility into their organization’s security posture. Platforms that offer executive dashboards and comprehensive reporting will empower board-level decision-making, ensuring cybersecurity is integrated into the organization’s strategic vision, thus aligning security efforts with business goals.”

Focus on Organizational Resilience

“In an era where cyber breaches are virtually inevitable, resilience will be as important as prevention. The ability to recognize an attack early, quickly recover from a breach, and continue operations with minimal to no impact on daily operations will be a key metric of success for organizations facing increasingly sophisticated, multi-stage cyber-attacks.”


Mark Lambert, Chief Product Officer at ArmorCode

Fragmentation of tools will lead to a focus on correlation and prioritization.

“In 2025, we will continue to see an influx of new application security solution providers entering the market. The pendulum has swung back from enterprises looking for single-vendor tool platforms back to best-of-breed tools that deliver more accurate results. However, this leads to an increase in siloed data and security debt, or backlog, which teams will struggle to address. There has already been a clear shift away from viewing security as a ‘zero-sum game’ and towards a focus on ‘business risk.’ Next year, the focus will be further refined to correlate data from across these disconnected tools and focus on the vulnerabilities at the top of the pyramid from a business impact perspective – and prioritize the reduction of technical debt in the areas that matter most.”

Vulnerability chaining

“AI-powered attacks will become significantly more aggressive in 2025, with vulnerability chaining emerging as a major threat. Attackers will leverage AI for more effective vulnerability identification and rapid exploitation by chaining multiple CVEs together to launch successful attacks. Once they find a vulnerability that allows a foothold into a network or system, they will use the chain of vulnerabilities to expand deeper or laterally. This also allows attackers to game-plan their approaches in advance. It will present a greater challenge for organizations to defend themselves while providing attackers with more opportunities to achieve their objectives.”


Chris Borkenhagen, CDO/CISO at AuthenticID

Staying Ahead of Cyber Threats

“Adopting a customized and business-specific zero-trust security strategy is critical for security leaders to combat cyber threats effectively. This approach treats every access request as a potential risk, with the adoption of complex multi-factor authentication (MFA) adding an extra layer of security. Staying informed about regulatory developments paralleled with retrospective reviews of industry breach incidents can provide valuable lessons for strengthening security postures. Embracing a ‘think like a hacker’ mentality also helps identify potential vulnerabilities and enhances proactive measures against unauthorized access.”


Ameesh Divatia, Co-Founder and CEO of Baffle

“Data security posture management has been perceived by many as a way to address the prevalence of data breaches today when, in fact, it’s just monitoring by a different name. Just like monitoring, there’s a good chance that the data has already been breached when you notice the problem. In the coming year, enterprises that actually care about their data will realize that protecting the data is the only answer. Lock the data up with encryption and hold the key tight, and the hacker will look for another target to breach.

“We are seeing an explosion of ‘security posture’ management for every aspect of the IT infrastructure—network, device, application, cloud, attack surface, identity, and finally, data. The perfect analogy is a guard outside your neighborhood bank or a security desk in your office building. It is a deterrent but by no means a protector of the asset. As engineers, we believe in designing a solution, not just monitoring for bad things to happen. 2025 will see the beginning of the end of posture management and the dawn of the ‘mitigation’ era, where we do something about attacks on our assets. We protect them in a way where the effort required to steal the asset outweighs the benefit, and the hacker moves on to an easier target.”


Gaurav Banga, the Founder and CEO at Balbix

“In 2025, GenAI will be more effective than ever. It will transform and reimagine business operations completely. Many cybersecurity programs will look to the technology for growth by increasing efficiency, limiting time spent on intensive tasks, and enabling teams to do more with less across the board. This will be especially helpful for industries operating with narrow margins and increased regulatory activity, like healthcare and smaller manufacturing companies. For these companies, their bottom line is dependent on improving operational efficiencies. These efficiencies powered by GenAI can make the difference in reducing overall cyber risk, despite smaller team sizes, due to its ability to identify anomalies and risks at speed and at scale, outpacing traditional methods.

“Companies that are slow to adopt GenAI will risk becoming obsolete, while forward-thinking companies that adopt the technology across all aspects of operations will come out on top. Additionally, we’ll see an increase in specialized GenAI models, fine-tuned to specific industries and regulatory requirements, fast-tracking further GenAI adoption and implementation.”


David Wiseman, the Vice President of Secure Communications at BlackBerry

Unseen Vulnerabilities: The Hidden Risks of ‘Free’ Communication Apps in 2025 

“It is not only espionage at the network level that is of concern; mobile spying is on the rise. People should think twice about what they are sharing on so-called ‘free’ messaging apps like WhatsApp and Signal.  The perceived security of popular communication apps like these will face growing scrutiny as their vulnerabilities become more apparent in 2025. In fact, it was recently found that the group APT41 is using updates to the LightSpy malware campaign to infiltrate common communications systems, notably WhatsApp. A rule of thumb: If it is free, you are the product, and your data can be sold, moved, and targeted. This leaves users’ metadata and personal information at risk of exposure or misuse by third parties.

“This concern goes beyond system availability; it’s about the uncertainty surrounding who has access to sensitive information and what they might do with it. As attackers increasingly weaponize insights from this data, the risks surrounding these tools grow significantly. Many assume these widely used communication apps are secure enough for sensitive information, trusting that their internal security teams would intervene if they weren’t secure. However, these platforms are often used without proper oversight or security controls, exposing both individuals and organizations to unnecessary risk.”


Jeffrey Wheatman, the SVP and Cyber Risk Strategist at Black Kite

There will be a rise in the vCISO and CISO consultants

“It’s no secret that there has been increased pressure on the CISO role over the past several years. From the rise of ransomware attacks, AI sparking new tactics, and more sophisticated social engineering attacks, companies now have to play good offense and defense to stay ahead of bad actors. With these pressures—plus often stretched security teams—CISOs will move out of in-house positions and into more consulting roles or vCISO roles in the coming year to better manage their workloads. If this trend comes to fruition, the impact on the industry could be immense. Having security leaders who are not in-house could create vulnerabilities or gaps in security, which can stifle organizations’ strategies and leave them open to attacks.”

There will be more shareholder action against companies that drop the cybersecurity ball

“It is not uncommon for shareholders to file lawsuits against companies for not doing ‘the right thing,’ and in 2025, we can expect to see more of this action being taken. When cyber incidents occur, they lead to substantial financial losses, regulatory fines, and damage to brand reputation—all of which directly impact shareholder value. Investors argue that neglecting cybersecurity reflects inadequate governance and risk management, especially when companies don’t prioritize safeguarding data and operational systems. In today’s threat landscape, a proactive approach to cybersecurity is essential for corporate responsibility. Shareholders will increasingly take legal action against companies that fail to implement effective cybersecurity measures, viewing it as a breach of fiduciary duty to protect assets.”


Mehdi Daoudi, CEO of Catchpoint

2025: The Year of Comprehensive Third-Party Risk Management in Business Continuity

“Third-party risk will dominate business continuity planning as companies rely more heavily not just on SaaS and cloud providers but also on a complex web of APIs, partner integrations, supply chains, and third-party code. This intricate network means that disruptions from any single vendor—or even a single integration—will have ripple effects across operations, potentially impacting entire supply chains and revenue. To mitigate these risks, proactive, real-time monitoring of all third-party interactions will be critical, with companies demanding full transparency and accountability on performance and recovery plans from all their critical vendors and partners.”

Digital Experience Becomes a Business Imperative, Powered by a Strong Internet Infrastructure

“Digital experience will emerge as a critical pillar of business success, supported by robust internet infrastructure. Each layer of the internet stack—DNS, APIs, CDNs, and other foundational components—will serve as the backbone of IT operations, ensuring the performance and reliability needed for an optimal digital experience. As businesses increasingly depend on seamless digital interactions, monitoring and optimizing these layers will become as essential as financial oversight. Companies will prioritize internet stack management to safeguard digital experience, recognizing it as a key driver of customer satisfaction, loyalty, and overall business growth.”


Tim Golden, CEO and Founder of Compliance Scorecard

Resource Constraints Hindering Compliance Efforts

“The ongoing shortage of skilled cybersecurity professionals will exacerbate staffing challenges for MSPs, leaving teams stretched thin and under-resourced. This could hamper their ability to meet compliance demands effectively. Resource limitations may result in compliance gaps and heightened vulnerability to security breaches, making workforce development a pressing need for MSPs in 2025.”

Increased Legal Accountability and Liability

“In 2025, evolving legal frameworks will place greater responsibility on MSPs for their clients’ cybersecurity, holding them liable for security breaches and compliance lapses. This heightened accountability is set to redefine service contracts and risk management strategies. MSPs without a thorough understanding of legal obligations may find themselves vulnerable to lawsuits and significant financial losses, emphasizing the need for legal expertise in their operations.”


Sri Sreenivasan, President at ConnectSecure 

Secure Data Clouds Become Non-Negotiable for Compliance

“With compliance frameworks like CMMC (Cybersecurity Maturity Model Certification) and stricter global regulations, secure data clouds will shift from being optional enhancements to essential infrastructure. Organizations in defense, healthcare, and other regulated industries will prioritize secure, compliant cloud solutions to meet mandatory standards and avoid penalties. Businesses not adopting these technologies risk falling behind or being excluded from critical contracts.”

Exploited Vulnerabilities Emerge as the Fastest-Growing Threat

“By 2025, exploited vulnerabilities will surpass phishing as the most rapidly growing cybersecurity threat. Attackers are increasingly automating the discovery and exploitation of unpatched systems, leaving organizations exposed. The sheer volume and sophistication of attacks will force Managed Service Providers (MSPs) to evolve, incorporating proactive vulnerability management solutions into their service offerings to protect clients and mitigate risks.”

Demand for Proactive Cybersecurity Outpaces Traditional Approaches

“As exploited vulnerabilities dominate headlines and compliance mandates intensify, businesses will demand proactive cybersecurity measures over reactive ones. MSPs that offer real-time threat detection, vulnerability assessments, and patching services will become the trusted partners of the future. The expectation will shift from simply responding to incidents to ensuring systems are continually hardened against evolving threats.”


Edward Bailey, Staff Senior Technical Evangelist at Cribl

“I believe that in late Q1 or Q2 2025, an industry trade group will file suit to challenge key Federal cybersecurity regulations. My guess is it will start with the SEC’s proposed amendments to Regulation SCI. Cybersecurity regulations created under the umbrella of the Gramm-Leach-Bliey Act are at risk as well. Healthcare cybersecurity regulations tied to reimbursements under the authority of the Centers for Medicare and Medicaid Services (CMS) are another set of regulations that may be targeted.

“A federal judge will grant an injunction that stops updates to Regulation SCI. The SEC’s position is given minimal weight by the court, substituting its own expertise and judgment over the law and factual issues, overruling the SEC, and striking down the proposed rule. After 3-5 years of appeals, the issue makes its way to SCOTUS, the judgment is affirmed, and the proposed rule is dead.

“In addition, perhaps Congress responds by passing a clear set of laws that creates even more regulations, and then IT and Security teams have to scramble to comply. Meanwhile, life continues for IT and Security teams who are already overwhelmed and simply want a clear set of rules.”


David Primor, Founder and CEO at Cynomi

“2025 will redefine the cybersecurity landscape as AI evolves into a cornerstone of strategic decision-making for CISOs and security leaders. In a world where cyber threats grow in both frequency and sophistication—and where attackers increasingly deploy AI to craft adaptive and evasive attacks—defenders must adopt tools that deliver both effectiveness and efficiency.

“AI’s role will extend far beyond traditional detection and response. Advanced systems will act as strategic advisors, analyzing vast volumes of data in real-time to uncover risks, prioritize responses, and smartly automate tasks that once consumed significant time and resources. By streamlining operations and providing actionable insights, AI will free security leaders to focus on long-term planning and risk mitigation rather than firefighting.

“For enterprises, the ability to predict and neutralize threats proactively will be game-changing. AI-powered tools will identify vulnerabilities way before adversaries can exploit them. This shift will also prove vital as businesses contend with compliance demands and board-level scrutiny, where fast, accurate reporting and strategic foresight are critical. Ultimately, I believe 2025 will highlight that success lies in leveraging AI not just as a defensive tool but as a driver of smarter, faster, and more strategic cybersecurity.”


Nicole Carignan, VP of Strategic Cyber AI at Darktrace

The year of AI agents and multi-agent systems: A challenge for cyber professionals, and an opportunity for threat actors.

“If 2023 was the year of generative AI and 2024 was the year of AI agents, 2025 is set to be the year of multi-agent systems (or ‘agent swarms’). That means we’ll see increasing use cases across businesses where teams of autonomous AI agents are working together to tackle more complex tasks than a single AI agent could alone. However, the rise of multi-agent systems, particularly in cybersecurity, is a double-edged sword.

“The rising use of multi-agent systems will introduce new attack vectors and vulnerabilities that could be exploited if they aren’t secured properly from the start. Attacks that we see today impacting single-agent systems, such as data poisoning, prompt injection, or social engineering to influence agent behavior, could all be vulnerabilities within a multi-agent system, with even wider-reaching impacts and harms because of the increasing volume of connection points and interfaces. Agents can discover other agents and communicate, collaborate, and interact. Without clear and distinct communication boundaries and explicit permissions, this can be a huge risk to data privacy as well as influence actionable agents (which is a security concern). These are not issues that traditional application testing alone can address.”


John Bennett, CEO of Dashlane

“In 2025, AI will grow increasingly central to both cyber-attacks and defenses, driving a significant evolution in the threat landscape. The commoditization of sophisticated attack tools will make large-scale, AI-driven campaigns accessible to attackers with minimal technical expertise. At the same time, malware and phishing schemes will grow more advanced as cyber-criminals leverage AI to create highly personalized and harder-to-detect attacks tailored to individual targets.

“However, there are two sides to every coin, and AI also has a key role to play in cyber defense. Cybersecurity solutions are advancing to combat the alarming surge of large-scale AI-driven attacks. This includes more AI-discovered vulnerabilities, as well as autonomous real-time threat detection and mitigation systems, powered by predictive analytics capable of anticipating and countering attacks–even before they occur.”


Jim Broome, President and CTO at DirectDefense

Data exfiltration and extortion will eclipse ransomware as the primary threat.

“In 2025, ransomware will increasingly be used as a precursor to larger attacks, where the real threat is data exfiltration and extortion. Attackers will leverage stolen data as a bargaining tool, especially in highly regulated industries like healthcare, where companies are forced to disclose breaches. As a result, we’ll see more sophisticated ransom demands based on exfiltrated data.”

AI in cybersecurity will bolster defenses but amplify risks.

“In the coming year, organizations will face the challenge of balancing AI’s security advantages with the mounting risks it introduces. While AI strengthens threat detection and response, attackers are equally adept at harnessing its power, rendering traditional employee training methods obsolete. Common indicators of phishing, like grammatical errors and unnatural phrasing, are vanishing as generative AI and deepfakes enable more convincing and sophisticated attacks. To combat these evolving threats, businesses must continually refresh employee training and adopt advanced AI tools, such as Microsoft’s Azure sandbox, to maintain robust security control.”


TK Keanini, CTO at DNSFilter

Zero Trust

“Zero Trust will be the dominant architecture model in 2025, fully replacing outdated perimeter-based models. Security controls will focus increasingly on the workforce and workloads rather than just the workplace, leading to enhanced protection across diverse environments.”

Tools

“By 2025, many current cybersecurity tools will become outdated, as they still reflect a perimeter-based mindset. In today’s world, effective defense is necessary for every device and at every location where people live, work, and play. Organizations will need proactive tools that don’t wait for an attack to happen. Instead, these tools will run tests and simulations on themselves to ensure they can maintain operational continuity in both good times and bad. Automation will be crucial, as it must continuously test and model threats with every network change before attackers can exploit vulnerabilities.

“A key shift in cybersecurity strategies will be ‘tempo.’ As the pace of change and attacks increases, defenders must also quicken their responses. Those who don’t keep up will be vulnerable.”


Neil Jones, CISSP and Director of Cybersecurity Evangelism at Egnyte

Intersection of AI & Cybersecurity

“Recent reports indicate that nearly 100 percent of IT leaders consider AI models crucial for their business success, but only 48 percent of IT professionals are confident about their ability to execute a strategy for leveraging AI in cybersecurity. In 2025, we can anticipate the knowledge gap widening, as AI models’ technical capabilities will likely outstrip IT teams’ ability to govern their responsible use.

“The gap can be closed by providing technical teams with advanced AI training, adopting company-wide responsible AI usage policies, and encouraging users to access generative AI solutions that are formally blessed by the organization.”


Dwayne McDaniel, Developer Advocate at GitGuardian

The Cyber Resilience Act Will Reshape Software Development

“The European Union’s Cyber Resilience Act (CRA) is poised to have a significant impact on how software is developed and secured. By mandating stricter requirements for vulnerabilities, the CRA will force organizations to reassess their development pipelines, especially in areas like secret management and secure coding practices.

“One of the most pressing vulnerabilities in modern software is the accidental exposure of sensitive information, such as API keys, tokens, and credentials, in source code. As the CRA drives stricter compliance standards, organizations will need to integrate secret detection tools directly into their CI/CD workflows. This integration will foster a stronger emphasis on security within DevSecOps, ensuring that software is both resilient and compliant from the earliest stages of development.

“For businesses, this represents both a challenge and an opportunity. Those that adapt quickly to the CRA’s requirements will not only reduce their risk of breaches but also demonstrate leadership in secure software practices—a critical factor in maintaining trust with customers and partners in regulated markets.”


Attila Török, CISO at GoTo

GenAI will be an asset, not an adversary, for CISOs

“AI tools have been a double-edged sword from a security standpoint ever since their first public availability, but the focus for CISOs in 2025 should be viewing AI as an asset rather than an adversary. As these tools continue to evolve, they should be integrated into security operations to improve threat detection, response times, and predictive analytics on an ongoing basis. In a slow market, this is a material, pragmatic way to demonstrate ROI while keeping pace with the evolving threat landscape.”


Chris Scheels, VP of Product Marketing at Gurucul

Organizations will increasingly turn to AI to power improved security posture.

“AI-powered threat hunting will play a crucial role in detecting and responding to advanced threats. As AI models continue to evolve, they will be able to identify sophisticated attacks that traditional methods might miss. By automating routine tasks and recommending effective response strategies, AI can significantly reduce the impact of security incidents and improve overall security posture.”

Automation becomes a must in SecOps.

“The increasing volume and complexity of data necessitate automation in security operations. By optimizing data ingestion and leveraging advanced machine learning models, organizations can efficiently analyze critical data, detect emerging threats, and automate routine tasks. This allows our security teams to focus on high-priority incidents, reducing response times and minimizing potential damage.”

The skills gap will drive MSSP growth.

“A continued and increased demand for managed security services from small and mid-sized businesses will continue in 2025. A significant factor driving this growth is the shortage of skilled cybersecurity professionals. This makes these organizations more vulnerable to cyber-attacks, including ransomware. As cyber threats evolve and become increasingly sophisticated, the need for managed security solutions will remain strong.”


Houbing Herbert Song, IEEE Fellow

Neuro-symbolic AI for Cybersecurity: The Enabler of Cybersecurity Threat Early Detection and Rapid Response

“The top cybersecurity threats emerging in 2025 are AI-powered cyber-attacks, which are characterized by their ability to learn and adapt to new defenses. In fact, according to “The Impact of Technology in 2025 and Beyond: an IEEE Global Study,” 48 percent of experts said a top potential use for AI is real-time cybersecurity vulnerability identification and attack prevention. In 2025, AI-powered cyber-attacks are expected to be more believable and less detectable. For example, deepfakes will continue to impact every aspect of our society, from personal to business to politics. AI can be leveraged by attackers to carry out more sophisticated and effective cyber-attacks. For example, with AI-enhanced social engineering, AI can assist in analyzing and predicting human behavior, allowing hackers to craft more convincing social engineering attacks that exploit psychological factors.

“The emerging trends in cybersecurity defense in 2025 will be establishing trust in cybersecurity defense and ensuring trustworthiness in cybersecurity defense towards a secure cyberspace. AI is the enabler of cybersecurity threat early detection and rapid response. AI can help solve complex security challenges by assisting human system managers with automated monitoring, analysis, and responses to cybersecurity attacks. Predictive analytics is an invaluable stepping stone in applying AI for cybersecurity. More specifically, neuro-symbolic AI, which integrates neural networks with symbolic representations, is a game changer by enabling high levels of trust in cybersecurity threat early detection and rapid response. Zero trust is expected to be the unquestioned gold standard of cybersecurity.”


Theodore Krantz Jr., CEO of interos.ai

Attack surface security risk in supply chains.

“As global interconnectivity deepens, the scale and speed of cyber breaches ripple across the globe quicker than ever, amplifying the ‘blast radius’ of attacks. In the first 10 months of 2024, 15,137 companies were impacted by reported cyber-attacks, according to interos data. This multiplied out to 1.3 million tier 1 suppliers, 3.1 million tier 2 suppliers, and 3.8 million tier 3 suppliers. As today’s supply chains rely more heavily on networks with many tiers of suppliers, the expanded attack surface of businesses must be approached with more diligence.

“In 2025, organizations must adopt advanced attack surface management strategies to gain visibility into their entire supplier networks to fully assess their exposure to cyber-attacks. These strategies include uncovering hidden supplier relationships, evaluating the cyber vulnerabilities of both direct and sub-tier suppliers, and assessing a broad spectrum of risk categories. Companies will also focus on identifying over-reliance on single suppliers and visualizing geographic clusters to mitigate cyber risks when they are impacted. By embracing these measures in the upcoming year, organizations can reduce their exposure to cyber threats, protect their digital supply chains, and ensure resilience in an era of ever-expanding cyber-attack surfaces.”


Itai Tevet, CEO and co-founder of Intezer

“In the past couple of years, we’ve seen AI used to automate many aspects of cybersecurity. That’s great because we know that attackers are using AI, too, but there will also be some unintended consequences that we need to address. AI typically automates tasks that entry-level employees tend to have and that prevents those employees from getting the skills they need to move into other roles—it’s going to exacerbate the existing cybersecurity talent shortage. It’s something that we are already seeing in the sales world with AI automating much of what entry-level SDRs do in their day-to-day. We are going to need to get ahead of this by rethinking training and education for cybersecurity professionals.”


Marc Gaffan, CEO at IONIX

Breaking Security Silos: The Rise of Unified Cybersecurity Platforms

“By 2025, the cybersecurity market will experience a significant shift toward unified security platforms that dissolve the traditional silos between on-premises, cloud and emerging technologies like AI. Organizations will increasingly adopt solutions that offer cross-environment visibility and management, enabling them to better assess and mitigate actual cyber risks. This convergence will lead to more efficient resource allocation and a more cohesive security posture across all technology stacks.”

Evolution of EASM: From Asset Discovery to Comprehensive Exposure Management

“External Attack Surface Management (EASM) will evolve beyond basic discovery and inventory of externally facing assets. In 2025, the market will demand EASM solutions that provide validation, prioritization, and optimization of security exposures. This evolution will align with analyst perspectives and will see EASM functionalities transition to a focus on exposing validated risks across Vulnerability Management and Posture Management tools.”

Shift from Vulnerability CVEs and CVSS scores to Exploitability

“The industry will move away from prioritizing vulnerabilities based solely on their CVSS scores and the like and will instead focus on their exploitability and potential business impact. By 2025, cybersecurity strategies will emphasize contextual risk assessment, combining vulnerability data with exposure insights to identify the most critical threats. This shift will lead to more effective remediation efforts, ensuring that security teams address issues that pose the greatest risk to the organization rather than being overwhelmed by sheer vulnerability counts.”


Paige Schaffer, CEO of Iris Powered by Generali

“Advancements in AI have already allowed criminals to create highly convincing deepfake content, opening the door for new forms of deception and fraud. In particular, deepfakes could be used by scammers to trick victims into handing over money by impersonating a trusted friend or family member. On the business side, deepfake technology can also be used in elaborate social engineering schemes.”


Greg Parker, Global VP, Security and Fire, Life Cycle Management at Johnson Controls

“As cyber and physical security increasingly intersect, zero-trust architectures will be essential to safeguard access and mitigate vulnerabilities. Organizations must ensure all users, devices and systems are verified continuously with robust access controls to prevent unauthorized intrusions into physical security systems. I anticipate zero trust becoming the industry standard, especially for facilities leveraging IoT and cloud-based solutions, where the stakes for security and operational continuity are higher than ever.

“Managed services that monitor and optimize physical assets throughout their lifecycle will be table stakes. This includes critical functions like firmware updates, system health monitoring, and ensuring proper functionality. Predictive maintenance powered by AI will play a pivotal role in addressing vulnerabilities proactively, minimizing downtime and costs while bolstering security. The growing interconnectivity of building management systems brings new risks, including unvetted device access and limited visibility into system components. In 2025, facility managers need a layered risk management strategy that incorporates tiered system criticality, comprehensive remediation plans, and continuous auditing.”


Elad Schulman, CEO and co-founder of Lasso Security

Tempering the Rise of RAG Threats

“Retrieval-augmented generation (RAG) is a technique for enhancing the accuracy and reliability of generative AI models with facts fetched from external sources, enabling users to check claims, which, in turn, builds trust. Attacks on RAG pipelines have been optimized to boost the ranking of malicious documents during the retrieval phase, now making Vector and Embedding Weaknesses one of OWASP’s top 10 use cases for LLM Security.

“Rather than relying solely on static permissions, more dynamic methods such as Context-Based Access Control (CBAC) will come into play. CBAC evaluates the context of both the request and the response, incorporating the user’s role and behavioral patterns, the specifics of the query, and the relevance and sensitivity of the retrieved data. When necessary, CBAC blocks sensitive or out-of-scope information.”


Andrew Harding, VP of Security Strategy at Menlo Security

Cyber-criminals will up the ante on browser-based attacks to deploy ransomware, targeting critical infrastructure in particular.

“Cyber-criminals will leverage browser-based attacks to deploy ransomware, targeting critical infrastructure sectors like healthcare, energy, and transportation. This shift will bypass traditional network defenses, making it easier for attackers to infiltrate systems and encrypt sensitive data. We have seen this trend developing during 2024, with about one significant confirmed browser exploit each month. To mitigate this risk, organizations must prioritize browser security, implement robust security measures, and stay updated on the latest threat intelligence.”

Insider threats will proliferate as widespread remote and hybrid work environments exacerbate risk.

“Insider threats will increasingly originate from well-intentioned users who fall victim to sophisticated targeted attacks. The persistence of widespread remote and hybrid work environments will exacerbate this risk. To combat this emerging threat, new tools and technologies will emerge to assist users, removing the burden of identifying and mitigating potential risks on their own. These tools will detect malicious activity and operate far beyond the capacity of manual human analysis.”


Devin Ertel, CISO at Menlo Security

AI Will Give Certain Security Functions a Boost

“Although there are many functions that AI can’t fully automate or take over, I predict that AI is going to start doing more of the heavy lifting when it comes to security in the coming year. Security tooling will incorporate more AI, helping with defenses that are cumbersome and leave too much room for human mistakes. Organizations will leverage AI to level out their Security Operations Centers (SOCs) so that they don’t need as many resources to run them. This also will free up time for junior security professionals to learn new skills, take on new responsibilities, and generally level up their careers.

“While overall, this trend will be highly positive for cybersecurity teams, we do need to be cautious about how we leverage AI and grant it access to sensitive data and systems. As organizations start to spin up their own AI models and engines, they need to think about how to protect them. Unsecured or unchecked AI could wreak havoc on organizations. For example, chatbots such as Google’s Gemini are powerful tools, but we need to be cognizant of how it touches sensitive customer or employee data. Whether using a tool like Gemini or a propriety internally-built model, security leaders will need to rethink their approach to access privileges in the context of AI tools in 2025.”

Attacks Incorporating Deepfakes Will Have CISOs on High Alert

“Deepfakes are an emerging threat that CISOs will need to keep on their radar. Last month, the CEO of cloud security company Wiz announced that his employees were being targeted by sophisticated deepfakes mimicking his voice. Executives who have many public speaking engagements and a more public presence are easier to target because their voices and likenesses can be tracked down by hackers looking to create a deepfake. Threat actors are continuously developing new ways to weaponize AI, including creating and selling highly sophisticated phishing kits available on the Dark Web. It is only a matter of time before these kits will include more sophisticated tactics, including deepfakes, and we will see more of these attacks in 2025.”

Seth Spergel, Managing Partner at Merlin Ventures

The Best Use Cases for AI will be Blended With Humans

“As a VC firm specializing in cybersecurity innovation, we (like every VC in every segment) have observed a huge influx in startups touting AI technology–to varying levels of success. It’s easy to get lost in a sea of undifferentiated solutions touting AI as a cybersecurity panacea.  Instead, we look for companies that have a clear vision and use case for how AI can help make humans more effective, productive, and/or efficient and are poised to make a meaningful contribution to the cybersecurity community.

“When considering AI innovations, I like to use the Iron Man analogy. On its own, Iron Man’s suit has some pretty cool functions. But to truly have an impact, the suit needs Tony Stark inside. He’s the one with the vision of what needs to be accomplished and how. Today, our best AI models still need human oversight and input, but together, AI and humans can accomplish far more than they could on their own. AI technology can significantly offset the burden on humans when it comes to more mundane tasks like data cleansing and basic correlation, freeing up skilled operators to tackle higher-value projects while making more informed decisions.

“In a sense, AI is helping to scale humans and help them reach new levels of productivity and ingenuity. One example of the type of cybersecurity technology that is leveraging AI in meaningful ways is Tamnoon’s human/AI hybrid cloud management and remediation platform, which is significantly changing the equation on the number of FTEs required to successfully manage cloud security environments. Tamnoon is not only reducing the number of humans needed to do the work, but it is also allowing those few humans who are doing the work to be far more effective than operators working without such an AI platform will ever be.

“For truly rabid Marvel fans, you may recall that at one point, the Iron Man armor technology ‘became so sophisticated that it gained sentience and malevolence.’ Feel free to draw your own analogies between that tidbit and the path we’re on with AI–but I’ll at least say I’m not including that in my predictions of what to expect in the next 12 months.”


Jeremy Ventura, Field CISO at Myriad360

Cybersecurity Workforce Challenges Will Persist

“The talent gap in cybersecurity will remain a pressing issue in 2025, with organizations struggling to find and retain skilled professionals. As threats continue to evolve in sophistication, companies will need to prioritize upskilling existing teams, leverage automation and AI, and explore alternative talent pipelines to mitigate workforce shortages.”

The Evolving Role of the CISO

“In 2025, the role of the Chief Information Security Officer (CISO) will extend far beyond just technical skills, emphasizing people skills, business acumen, and financial knowledge. As security increasingly becomes a business enabler, CISOs will need to communicate risk in terms of business and revenue impact, fostering collaboration with leadership to drive informed decision-making.”


Mike Arrowsmith, Chief Trust Officer at NinjaOne

Ransomware will continue to target legacy systems to maximize ROI.

“Legacy industries and organizations that have been around for decades and are responsible for managing a unique blend of hardware and software across continents—think airlines, railways, energy production, and the like—will be a top target for ransomware attackers in 2025. These organizations move large sums of revenue, and their systems generally aren’t the most modern. Also, due to the sheer size of the business, they typically have smaller IT teams in-house and employ more outside services and third-party partners to help maintain those systems. This exposes them to more methods of attack, which bad actors are increasingly taking advantage of to secure massive paydays.

“As ransomware attackers become even more creative and targeted (thanks to AI), having a good backup system in place will be critical for success. If organizations—legacy or otherwise—don’t have the means to restore to a good-known state before a malicious payload was distributed to the systems in question, they’ll find themselves paying hefty ransoms more often than not.”

Weaponized AI will be the biggest security concern in 2025 – and IT teams will be hit hardest.

“The biggest security threat we’re seeing is the continual evolution of AI. It’s getting really good at content creation and creating false imagery (i.e., deepfakes), and as AI gets better at data attribution, it will become even more difficult for organizations to distinguish between real and malicious personas. Because of this, AI-based attacks will focus more on targeting individuals in 2025. Most of all, IT teams will be hit hardest due to the keys they possess and the sensitive information they have access to. Most AI-based attacks will target individuals to solicit access and money, and IT organizations need to ensure they’re prepared, educating staff, and shoring up defenses accordingly.

“The best way to reign in AI risks is with more employee training. People have to know what to look out for, especially as AI technology evolves. In general, you can’t do enough cyber awareness training. It’s very real—even beyond AI, there are a ton of ways to compromise an individual system or information, and I think the more that we can educate people rather than try to curtail the technology, the better.”


Paul Laudanski, Director of Security Research at Onapsis

New year, same vulnerabilities

“The threat landscape is only getting bigger; the vulnerabilities security teams are facing are the same ones we continue to see every year. Organizations are still not prioritizing securing their business-critical applications and, therefore, often end up in the same situations. Vulnerabilities, old and new, are continuously being leveraged to get through the Internet of Things devices, firewalls, and VPNs. Once threat actors enter an organization’s systems, they go after the most valuable information, which is stored in business-critical applications.

“If nothing changes in 2025, companies will continue to battle these typical, preventable vulnerabilities and put their customer’s data at great risk. When crafting goals for 2025, leaders need to evaluate where security is on their priority list and how they can best combat these threats.”


Balaji Ganesan, co-founder and CEO of Privacera

“As we enter 2025, the urgency to fortify foundational data security becomes even more pronounced. With the evolution of AI technologies, organizations must prioritize data security significantly. A risk-based approach, which involves identifying data, its location, access permissions, and potential vulnerabilities, remains critical to maintaining security in complex data environments. The statistics from 2023 and 2024 serve as a stark reminder of the consequences of data breaches, with the United States facing 3,205 data breaches that exposed over 353 million individuals and reporting the highest average cost of a data breach globally at $9.36 million (IBM: Cost of a Data Breach Report 2024).

“In a rapidly evolving digital world, our greatest defense is precision and deep awareness of where data resides and how it moves. The exponential pace of AI adoption has amplified opportunities and threats, demanding organizations go beyond conventional data protection strategies. To remain resilient, leaders must view data security not merely as a compliance requirement but as a continuous, adaptive process that builds trust and safeguards innovation.”


Itamar Golan, Co-Founder and CEO at Prompt Security

Regulatory Environment

“The regulatory landscape for AI is developing along divergent paths globally. The European Union is taking a risk-based approach to AI through the EU AI Act, implementing comprehensive regulatory frameworks. In contrast, I expect the United States to adopt a more permissive approach under potential libertarian economic policies, allowing for greater flexibility in AI development and deployment, emphasizing national security and economic competition with China.”


Rahul Powar, Founder and CEO at Red Sift

“In 2025, we expect Microsoft will follow suit with Google and Yahoo’s stringent bulk sender email authentication requirements, creating a unified front among major email providers. This means implementing the basics of email security standards such as DMARC, SPF, and DKIM are no longer optional, but are vital protocols for every business moving forward. Bulk sender requirements are very much just the stepping stone towards enforcement, and it is essential that businesses implement effective tools to stay ahead of new regulations rather than being left to catch up.

“Take, for example, the rapid increase in sophisticated attacks in 2024—such as the SubdoMailing threat—bypassing reliant security measures like DMARC. This new method allowed bad actors to mount phishing campaigns and distribute malware through poor DNS hygiene and is a continued problem for known brands. Accessed through passive DNS records, this type of threat is already one step ahead of security standards brought in under bulk sender requirements, so how can businesses stay protected?

“The key in 2025 will be enabling full visibility over an organization’s digital estate; one example in the case of SubdoMailing is having a clear overview of all your domains and subdomains, auditing, and taking action against compromised records to prevent future attacks. Only by implementing the best email security solutions can businesses ensure they are doing everything they can to prevent costly and damaging threats. Those who fail to adapt can not ensure for certain that they are in full control, creating significant risks to their brand integrity and customer trust.”


Cynthia Overby, Director of Security at Rocket Software

“Over 50 percent of CISOs will start using AI and Machine Learning (ML) in security software solutions in 2025 as they believe generative AI will fill security skills gaps and are also excited about the possibility that it can strengthen cyber defense. Certain AI tools and technologies are viable to meet these requirements, but the term ‘AI-enabled’ is, in most cases, marketing hype. This may lead to negative connotations that could hurt security products that are truly AI-enabled.”

Attackers will significantly impact global business systems and operations.

“Insurance and financial systems will continue to be focal points for attacks, but in 2025, we can expect critical infrastructure operations and corporate data to become a higher priority for nation-state threat actors. These attacks will no longer focus on Ransomware using forward-facing web applications but instead on power grids and corporate data stored on critical hardware. The lack of knowledgeable resources to manage security across an enterprise and the lack of understanding and maturity around critical infrastructure vulnerability management within the C-level community will make for easy targets.”


Eric Schwake, Director of Cybersecurity Strategy at Salt Security

“In 2025, the cybersecurity landscape will continue to evolve rapidly, with a growing focus on API security. As APIs become essential to business operations and digital transformation efforts, they will likely become prime targets for attackers. We anticipate a rise in sophisticated API attacks using automation, artificial intelligence, and advanced evasion techniques to exploit vulnerabilities and bypass traditional security measures. One significant risk will stem from the exploitation of API misconfigurations, which often occur due to the fast pace of development and deployment. This situation will challenge organizations to adopt a more proactive and comprehensive approach to API security.

“To stay competitive, businesses must prioritize API security, recognizing that APIs have become crucial IT assets requiring the same scrutiny and protection as any other valuable resource. This involves implementing robust API posture governance to ensure consistent security configurations and reduce vulnerabilities to lower risk. AI-powered API security solutions, particularly those with strong behavioral threat detection capabilities, are essential for identifying and responding to sophisticated threats in real-time. These solutions can analyze vast amounts of API traffic and highlight genuinely malicious activities within the overwhelming amount of anomalous traffic that might otherwise go unnoticed. By proactively addressing API security challenges, businesses can safeguard their critical assets and ensure the ongoing success of their digital initiatives in the face of evolving threats.”


Avani Desai, CEO of Schellman

AI-Driven Cyber Threats on the Rise

“The biggest cyber threats in 2025 will stem from increasingly sophisticated, AI-driven attacks. As AI evolves at breakneck speed, attackers are deploying machine learning models that adapt, disguise themselves, and evade traditional defenses in real-time. This creates a constant race between defensive and offensive AI technologies, making it harder to detect and combat cyber threats.”

Emergence of Autonomous Malware 

“One under-the-radar development is the rise of autonomous malware. Unlike traditional malware, this next generation can operate independently, learning to bypass security measures as it moves through systems. These self-sustaining attacks refine themselves at each step, presenting a profound challenge for cybersecurity defenses. Few are prepared for this shift, but it has the potential to reshape the entire cybersecurity landscape.”


Pieter Danhieux, co-founder and CEO of Secure Code Warrior

Understanding Shifts in the Regulatory Landscape

“The critical infrastructure industry has, at least in the United States, the UK, and Australia, seen some specific recommendations around how digital risk is managed, and in this age of high tensions in multiple regions, as well as a significant increase in Nation-sponsored cyber-attacks, these trends show no signs of ceasing in 2025, and this vertical in particular will be hit hard. I expect to see more legislative changes in this area very soon, and across other sectors. With NIS2 and the Cyber Resilience Act just being introduced in Europe, we’ll be shortly seeing that any connected consumer product will face much greater scrutiny, especially in terms of Secure-by-Design and software weaknesses.

“This is likely to result in vendors who can prove compliance with specific security mandates and adhere to government-informed guidelines and best practices being viewed as more trustworthy and desirable to partner with, as opposed to those who take these initiatives less seriously. It may also result in their internal security culture changing to adopt more enforced secure development practices overall.”

AI Tools’ Security Standing Will be a Key Measurement for Developers

“Right now, it’s a free-for-all market in terms of LLM-powered coding tools. New additions are popping up all the time, each boasting better output, security, and productivity. As we head into 2025, we need a standard by which each AI tool can be benchmarked and assessed for its security standing. This includes coding capabilities, namely its ability to generate code with good, safe coding patterns that cannot be exploited by threat actors.”


Lou Fiorello, VP and GM of Security Products at ServiceNow

“In 2025, GenAI will reshape the way security teams operate, moving beyond task automation to providing actionable insights that enhance decision-making. This will reduce burnout from manual, repetitive work and allow teams to focus on proactive threat management. As attack sophistication grows, GenAI will serve as a key enabler for faster response times and a stronger, more adaptive security posture.

Additionally, the rapid growth of attack surfaces—from on-premise to the cloud, APIs, operational technology, and more—will push organizations toward unified platforms. These platforms will provide a single source of truth across all environments, enabling businesses to identify risks more clearly and manage them more effectively. In 2025, platforms that integrate vulnerability management with enterprise data foundations, such as CMDBs, will become essential for maintaining end-to-end visibility and control.”


Chen Burshan, CEO of Skyhawk Security

Security teams will need to invest in increased AI automation to stop threats at machine speed.

“The highly publicized cybersecurity skills gap and overwhelming workload mean security teams MUST use automation to have a chance at securing their cloud. However, how can they be sure that alerts that are flagged REALLY pose a risk to their cloud environments and that automation won’t impact production by increasing false positives? This is where an AI-based rehearsal is going to be imperative (in the new year and beyond) to move forward with leveraging automation. We expect to see increased adoption of AI-based simulation twins, which simulate threats to determine whether they have the potential to reach critical business assets. This will increase confidence in the SOC. These AI tools will also rehearse automated responses to increase cloud threat detection and response (CDR) efficiency. Automation can also respond at machine speed, much faster than the SOC analyst.”

Security teams will need to invest in increased automation to stop threats at machine speed.

“The skills gap and overwhelming workload mean security teams MUST use automation in order to have a chance at securing their cloud. However, how can they be sure that the alert is really an alert and that the automation will not impact production? This is where an AI-based rehearsal is going to be imperative in order to move forward with leveraging automation. An AI-based simulation twin simulates the threat, so the SOC knows it is, in fact, a threat, and the automated response is also rehearsed, ensuring this response stops the threat and does not impact production. Automation can also respond at machine speed, much faster than the SOC analyst.”


Ravi Bindra, CISO of SoftwareOne

Evolving CISO role

“The role of the Chief Information Security Officer (CISO) has been rewritten in the past years.  CISOs once worked in a siloed fashion without a seat at the boardroom table. Today, however, they are the bridge between the C-Suite and the entire company, charged with delivering cybersecurity resilience.  In 2025, CISOs can expect their role and responsibilities to keep expanding as enterprise risks grow in both numbers and complexity. Next year, cyber-crime is expected to cost $10.5 trillion a year globally, a staggering figure that explains why the CISO’s role has shifted from tactical to strategic with a need to firmly align cybersecurity solutions with business goals.

“Furthermore, with Gartner forecasts showing that by 2026, over 50 percent of C-Suite executives will have cyber risk performance requirements included in their contracts, it’s clear that the CISO’s role will shift again to accommodate new levels of collaboration to ensure accurate business-wide reporting. In addition to hands-on security duties, regulatory changes such as those from the Securities and Exchange Commission in the US and others globally will occupy even more of the CISO’s time.

“Balancing daily security operational demands with heftier reporting requirements will be an added burden, meaning CISOs will need to think strategically in order to collaborate effectively with business leaders while ensuring they have invested in the best detection and response capabilities to keep pace with threats. 2025 will see CISOs work even more strategically to ensure their time, investments, and effort are keeping pace with endless developments.”


Chris Ortbals, Chief Product Officer at Tangoe

Mobile and SaaS Environments Will Face Heightened Security Threats

“AI and quantum-powered attacks will target mobile devices and SaaS platforms, exploiting gaps in endpoint security and third-party integrations. Social engineering attacks, AI-enhanced phishing, and deepfake scams will exploit mobile vulnerabilities and unsecured third-party APIs. Organizations that prioritize endpoint security and SaaS control will be better positioned to protect their assets and maintain client trust.

“Implement Unified Endpoint Management (UEM) and strict SaaS monitoring policies. Audit user access regularly, ensuring former employees and third-party providers have no residual permissions. 2025 will be a pivotal year for AI, with enterprises embracing its transformative potential while navigating financial, ethical, and security risks. By adopting forward-thinking strategies—such as robust cost management, quantum-safe cryptography, and comprehensive AI governance frameworks—IT leaders can ensure sustainable innovation and a competitive edge in the AI-driven future.”


Ratan Tipirneni, President and CEO at Tigera

Open Source LLM vs. Subscription-Based: Who Will Win in 2025?

“Meta changed the rules of the Large Language Model (LLM) game by open-sourcing their model, Llama. Now, Meta is on track to have the most widely deployed chatbot in the world by the end of the calendar year 2024, despite OpenAI’s initial leadership with ChatGPT.

“As the GenAI race heats up and more native artificial intelligence Independent Software Vendors (ISVs) emerge, open-source models will continue experiencing exponential growth. ISVs will adopt an open-source model like Llama instead of building on top of a model with a licensing fee involved. Ecosystems will form around open-source LLMs, and they will gain critical mass.”


Mark Wojtasiak, Vice President of Product Marketing at Vectra AI

Disillusionment Around AI’s Promise in Cybersecurity Will Push Vendors to Focus on Demonstrating Value

“In the coming year, we’ll see the initial excitement that surrounded AI’s potential in cybersecurity start to give way due to a growing sense of disillusionment among security leaders. While AI adoption is on the rise–89 percent plan to use more AI tools in the coming year–there is still cautious optimism within the industry. Many practitioners worry that adding more AI tools could create more work, and as a result, vendors will need to focus on demonstrating value and proving ROI. Vendors will no longer be able to rely on generic promises of ‘AI-driven security’ to make sales. Instead, they will need to demonstrate tangible outcomes, such as reduced time to detect threats, improved signal accuracy, or measurable reductions around time spent chasing alerts and managing tools.”


Chris Wysopal, the Chief Security Evangelist and Founder of Veracode

GenAI-driven Coding Will Saddle Organizations with More Security Debt

“As AI-fueled code velocity increases, the number of vulnerabilities and level of critical security debt will also grow. With more code created at a rapid pace, developers will become inundated with compliance risks, security alerts, and quality issues. Identifying a solution to help will be key. As security debt grows, so too will the demand for automated security remediation, however using GenAI to write code is still two years ahead of using the same technology for security hardening and remediation. This is why, in 2025, we can expect a rapid increase in the adoption of AI-powered remediation to fix vulnerabilities faster and materially reduce security debt.”


Ben Kliger, CEO and co-founder of Zenity

The rise of Agentic AI will require a rethinking of security strategy 

“Generative AI is quickly moving beyond the capabilities of consumer-first tools like ChatGPT into Agentic AI for the enterprise. AI agents are designed to process information in a new way to make dynamic and autonomous decisions. However, organizations looking to leverage the promise of Agentic AI need to be wary of the security ramifications. They can do so by going beyond analyzing prompts and responses by monitoring and profiling how each AI Agent operates behind the scenes. Given the widespread access these Agents have to sensitive information, this holistic approach can prevent direct and indirect prompt injection attacks, as well as help to manage data leakage risks. Staying secure amid new threats will require security teams to work with the business not as a blocker but as an enabler. ”


Nicolás Chiaraviglio, the Chief Scientist at Zimperium

Mobile Security Platforms Will Increasingly Address Data Privacy Concerns, Not Just Security

“Mobile security plays a crucial role in addressing the needs of data privacy. However, we often see mobile security through the lens of threat defense and application security. However, regulatory compliance is a key piece of the mobile security function. I predict that in 2025, we will see mobile security prioritizing data privacy needs by implementing robust privacy-preserving technologies. According to Zimperium’s 2024 Global Mobile Threat Report, 82 percent of organizations allow bringing your own device (BYOD) to work. A recent survey from Tableau found that 63 percent of Internet users believe most companies aren’t transparent about how their data is used, and 48 percent have stopped shopping with a company because of privacy concerns.

“We will likely see more regulatory compliance baked into mobile security solutions, particularly around data handling and encryption standards. We are already seeing regulatory shifts in the financial sector, holding app developers accountable for any harm to their end-users due to external attacks. Businesses are recognizing that regulatory compliance features are a necessary piece of the mobile security stack, and they are seeking mobile security platforms that address both privacy and security needs.”


The post 74 Cybersecurity Predictions from Industry Experts for 2025 appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>
Cybersecurity Awareness Month Quotes from Industry Experts in 2024 https://solutionsreview.com/security-information-event-management/cybersecurity-awareness-month-quotes-from-industry-experts-in-2024/ Mon, 21 Oct 2024 17:31:55 +0000 https://solutionsreview.com/network-monitoring/cybersecurity-awareness-month-quotes-from-industry-experts-in-2024/ For Cybersecurity Awareness Month, the editors at Solutions Review have compiled a list of comments from some of the top leading industry experts. As part of Cybersecurity Awareness Month, we called for the industry’s best and brightest to share their comments. The experts featured represent some of the top Cybersecurity solution providers with experience in these marketplaces, […]

The post Cybersecurity Awareness Month Quotes from Industry Experts in 2024 appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>

For Cybersecurity Awareness Month, the editors at Solutions Review have compiled a list of comments from some of the top leading industry experts.

As part of Cybersecurity Awareness Month, we called for the industry’s best and brightest to share their comments. The experts featured represent some of the top Cybersecurity solution providers with experience in these marketplaces, and each projection has been vetted for relevance and ability to add business value.

Cybersecurity Awareness Month Quotes from Industry Experts


Ronak Massand, CEO and Co-Founder of Adaptive

“In any organization, data is the most critical asset that must be protected. The primary goal of a hacker in any breach is to exfiltrate this data. The severity of a breach is ultimately measured by the number of sensitive records compromised.”

“Given this, organizations should prioritize data protection, recognizing that all other security measures are simply means to that end. Security leaders must have a deep understanding of how data is stored and how it can be accessed across various services, third-party tools, human identities, and other data consumers within the organization. By gaining a comprehensive understanding of data lineage and managing access and protection at each stage, organizations can invest in fewer tools and focus on deeply integrating them into the infrastructure, ensuring that the most important assets are safeguarded effectively.”


Baber Amin, Chief Product Officer at Anetac

“This Cybersecurity Awareness Month, organizations must address threats to both human and non-human identities. While many focus solely on human users, non-human identities pose equal—if not greater—risks.

“Research conducted in partnership with TechTarget’s Enterprise Security Group (ESG) shows that for every human user, there are 20 non-human identities, often with high-level privileges. These automated accounts are prime targets for attackers, yet their security is frequently overlooked. Back in June, TeamViewer suffered a cyber-attack where bad actors were able to take control of an employee’s account. Now imagine if the same bad actors compromised a non-human account. The response time might have been drastically reduced with the consequences of the breach significantly increasing.

“To minimize the likelihood of a successful attack, enterprises should follow these steps:

  • “Adopt modern Identity and access management tools that can monitor both human and non-human identities.
  • “Password security: implement robust cyber hygiene policies, regular password rotation every 90 days for both human and non-human accounts, and use secure password management software.
  • “Invest in smart cybersecurity tools that can improve the visibility and management of all identities and the activity chains linked to those identities.”

Tim Eades, Chief Executive Officer and Co-Founder of Anetac

Tim Eades“In today’s digital landscape, many security breaches stem from overlooked basic security practices rather than sophisticated attacks. This year’s Cybersecurity Awareness theme, “Secure our World,” reflects this oversight. While advanced security tools are valuable, organizations benefit most when they prioritize fundamental practices, including strong passwords, a password manager, multi-factor authentication, and keeping software up to date.

“The difference between a minor incident and a major breach often comes down to these basics. Our research indicates that 53 percent of organizations take over 13 weeks to rotate passwords—a gap that creates unnecessary vulnerabilities. As we innovate against emerging threats, we can’t neglect the fundamentals. A modern identity security strategy must combine robust security hygiene with advanced tools for complete visibility into both human and machine identities.

“By focusing on a balanced approach—combining sound security practices with advanced tools—organizations can significantly enhance their resilience against potential breaches. Remember: attackers will always choose the path of least resistance. Don’t make it easy for them.”


Doug Murray, CEO at Auvik

“Last year, CISA announced that the enduring theme for all future Cybersecurity Awareness Months would be “Secure Our World.” This theme evokes the sentiment that security is a shared responsibility between individuals, businesses, and governments alike. Even within a specific organization, security is a shared responsibility. Consider the issue of infrastructure sprawl. Both CISOs and CIOs are purchasing and managing tools that support cybersecurity objectives or serve a particular IT function. A big concern here is the cybersecurity risks involved in infrastructure sprawl, as the proliferation of tools and vendors has gotten out of control for many IT teams.

“Another increasing area of risk is shadow IT and shadow AI, which involves the use of IT systems, devices, software, and services without explicit approval from the IT department. SaaS shadow IT is probably one of the biggest hidden risk factors that IT leaders face today, particularly at a time when employees are experimenting with emerging AI tools. Most people who utilize shadow IT tend to think that they’re just using a productivity tool. However, organizations have found shadow IT adoption can open vulnerabilities.

“In purchasing a combination of different tools, companies easily end up with huge overlaps. For example, it’s common for a company to have multiple firewall providers operating within their network all at the same time. This is not only redundant but could actually be introducing even more cybersecurity risk to the business unnecessarily. How can we manage some semblance of consolidation to drive up efficiency and lower costs? What’s needed is a network management platform that gives us a federated view of everything that IT uses for its daily processes, systems, and management. Business leaders must then work together to determine which tools to keep and which they can do without in order to reduce sprawl and overall risk exposure.”


Ian Bramson, Vice President of Global Industrial Cybersecurity at Black & Veatch

“The cybersecurity threat landscape is fundamentally shifting, raising the stakes from data manipulation to impacting physical safety and operational uptime within operational technology (OT) environments, such as power plants, water plants, oil & gas refineries, and other critical infrastructure. As such, the industrial cybersecurity world in 2025 must adapt to a more consequence-driven approach, where safety and uptime are the priorities rather than resources and ROI. After all, the true ROI in industrial cybersecurity–for now–is that nothing bad happens. But how long can we count on that to remain the status quo?

“While there is still time to adapt, there isn’t a nanosecond to lose. As cyber attackers expand their focus to penetrating OT environments, the digital front lines are now being drawn inside the equipment, devices, and operations that drive critical infrastructure. Heavy industry and high-hazard operations are in the cyber crosshairs, driving risks to sites and environmental and public safety. Negative impacts on critical infrastructure also threaten economic stability and national security. And while cybersecurity attacks do not have physical boundaries, they can and do have very real-world impacts.”


Dale “Dr. Z” Zabriskie, Field CISO at Cohesity

“The growing threat of ransomware and insider attacks has made data resilience more critical than ever. According to Cohesity’s Global Cyber Resilience Report, over 3100 IT and Security decision-makers globally were polled and confirmed the threat of cyber-attacks—especially ransomware—continues to rise, with the majority of respondents falling victim to a ransomware attack in the last six months, and most having paid a ransom in the past year. A full 80 percent of those surveyed said they had responded to what they believe to be AI-based attacks or threats within the last 12 months.

“Organizations must have a multi-layered defense strategy to combat these threats. Implementing solutions such as immutable snapshots, encryption, and strict access controls is essential to ensuring critical data is secure. Isolating backup data and employing advanced protections like time-based locks can make the difference between a minor incident and a major disaster. In today’s threat landscape, being prepared with these layers of defense is crucial for cyber resilience in the effort against both ransomware and insider threats.”


Jackie McGuire, Senior Security Strategist at Cribl

“For years, the cybersecurity industry has faced challenges in finding talent with the right skill set to fill roles. However, what’s not often talked about is the disproportionate amount of neurodivergent talent already working in the cybersecurity industry and the untapped talent pool with the potential to fill these roles.

“Neurodiversity is a massive spectrum, and cybersecurity leaders need to rethink how they’re assessing skills and what a ‘typical’ candidate may look like for any position. By embracing unique skill sets of neurodivergent talents, such as the ability to hyper-focus, detect patterns, and identify vulnerabilities that others might miss, security teams can unlock new, meaningful problem-solving solutions.

“Eliminating the stigma around neurodiversity and creating an open dialogue about the resources and accommodations neurodiverse team members need to excel in their roles, such as written materials or subtitles during virtual meetings, enables leaders to tap into the unique strengths of team members and build an environment for them to thrive.”


Omar Khawaja, Field CISO and VP of Security at Databricks

“What I’ve found from talking to hundreds of security leaders across the public and private sectors is that when it comes to generative AI, many leaders are worried they don’t know which risks to worry about. On top of this, they also know that not investing in GenAI may pose a different kind of risk—falling behind. Risks can range from training data poisoning to prompt injection to model theft. While there isn’t a ‘silver bullet’ strategy when it comes to protecting against these threats, companies should focus on the specific risks that matter most to each specific GenAI use case. This means throwing the long list of potential—but ultimately, not relevant—risks out the door and reviewing your deployment architecture, strategy, and end goals for incorporating AI.

“Fear—whether it’s fear of missing out or fear of security risks—cannot drive your AI strategy forward. Fear places you on the fringes of the AI spectrum, and I believe there is a happy medium where your team is aligned on AI goals, risks, and opportunities. That middle ground is foundationally sound for strong decision-making once you truly know how AI works inside and out.”


Jose Seara, CEO and Founder of DeNexus

“This year’s theme for Cyber Awareness Month, “Secure Our World,” highlights the need for increased cyber protection in all aspects of our personal and professional digital lives, including industrial systems—the connected equipment and systems that control factory floors in manufacturing, the buildings hosting data centers, power generation sites, electricity distribution networks, or even the tarmacs and boarding areas in airports.

“Given the gap in cybersecurity resources and the flattening of cybersecurity budgets, cybersecurity leaders need to take a step back and assess where to allocate scarce resources and limited budgets to achieve the greatest return on investment, which, for cybersecurity, is to reduce the probability of material cyber incidents. This starts by identifying and measuring cyber risks in financial terms, the probability and severity of potential cyber incidents due to weaknesses in cyber defenses.”


Chaim Mazal, CSO at Gigamon

“Adversarial AI is outsmarting current security defenses. To stay ahead, organizations must gain deep, real-time visibility into all network traffic. Today, one in three breaches are going undetected and of those that are detected, only 25 percent of breaches are being detected in real-time. Given 93 percent of malware hides in encrypted traffic, prioritizing deep observability across your hybrid cloud infrastructure is mission-critical for securing sensitive data.”


James Hadley, CEO and Founder of Immersive Labs

“Over the past year, we have seen significant cybersecurity events, such as disruptions caused by supply chain, social security number, and Medicare breaches that have highlighted how fragile our digital ecosystem can be. System compromises and ransomware attacks have proven to be devastating to organizations, costing businesses around 5 million dollars on average. These various crises have once again proven that the status quo of traditional cybersecurity certifications and awareness training is simply ineffective.

“Rather than offering realistic crisis simulations, many businesses are mired in the same antiquated training over and over again while the threat landscape has continued to evolve. So, why are leaders still relying on a list of names of employees who watched an outdated video to check the cybersecurity box? How can we be confident in the skills of our cybersecurity professionals if we aren’t evaluating their hands-on skills based on data?

“With cyber drills, CISOs can prove and improve their organization’s knowledge, skills, and judgment against simulated attacks. These drills give leaders the proof they need to better understand their organization’s cyber capabilities and shortcomings. In a world where a data breach or disruption is seemingly inevitable and increasingly expensive, checkbox awareness is no longer enough. Hands-on, measurable exercising programs for specific individuals, teams, and departments are essential in mitigating the impact of these events and ensuring businesses’ most sensitive data remains secure.”


Eric Herzog, CMO at Infinidat

“The merging of cybersecurity and enterprise storage infrastructure has been compelling CIOs, CISOs, and IT team leaders to rethink how to secure enterprise storage across hybrid multi-cloud deployments in light of the dramatic increase in cyber-attacks over the past several years and into the foreseeable future. Sophisticated cyber-attacks, including new forms of AI-driven attacks, are increasingly targeting enterprise storage infrastructure. Enterprises need proactive strategies, seamless integration across data center IT domains, and the most advanced, automated technologies to stay ahead of cyber threats. Comprehensive cyber storage resilience and recovery capabilities improve the ability of an enterprise to combat and protect against ever-increasing cyber-attacks and data breaches by combining automated cyber protection, immutable snapshots, logical air gapping, a fenced forensic environment, cyber detection, and virtually instantaneous data recovery.”


Philip George, Executive Technical Strategist at InfoSec Global Federal

“Cybersecurity Awareness Month this year comes on the heels of NIST releasing post-quantum encryption standards, which are designed to withstand attacks from cryptographically relevant quantum computers (CRQC). For several years, the cybersecurity community and government leaders have been raising awareness around the impending threat of a CRQC and the potential large-scale effort to migrate to quantum-safe encryption, recognizing there is not one area across the information technology domain that does not rely on some aspect of vulnerable classical cryptography. Therefore, the arrival of the new quantum-safe standards is a pivotal moment. These new ciphers provide public and private sectors with the ability to establish an effective bulwark against both present day and emerging cryptographic threats to include the prospect of a CRQC.

“But the very first step for any organization is to conduct an automated discovery and inventory of deployed cryptographic assets. This single act provides the foundation for the development of a comprehensive and effective defense-in-depth strategy that aligns with greater efforts like that of zero-trust (ZT) modernization. If an organization has not conducted an automated discovery and inventory scan in lieu of prior manual efforts, it could be implicitly accepting risk that has neither been accurately assessed nor mitigated. This can create scenarios where PQC migration execution is incomplete at best or fails to mitigate an exposed attack surface of a high-value asset.

“Migrating to the new post-quantum algorithms will take considerable time and effort. Aligning such activities with similar large-scale modernization efforts like zero-trust will be key. This paired approach will ensure that the adoption of ZTA principles won’t be undone by continuing to rely on soon-to-be-deprecated cryptography. Cryptography is the underpinning of Zero Trust, so aligning PQC migration with Zero-Trust initiatives is imperative.”


Larry Zorio, CISO at Mark43

“To effectively manage organizational risk tolerance, start by identifying your most valuable assets through an inventory of ‘crown jewels.’ Then, build a risk strategy by asking key questions and prioritizing investment in secure, resilient technology, as it will save you time and cost in the long run.

“In addition, adopt a recognized framework like the NIST Cybersecurity Framework (CSF) to provide a structured approach to managing cybersecurity risks. Tactical items to include are vulnerability management, regular backups, monitoring, and audit functions, and incident response tabletop exercises to ensure you build muscle memory for seamless mitigation in the event of a breach.”


Zack Schuler, the Executive Chairman and Founder of NINJIO

“October is National Cybersecurity Awareness Month, an ideal time for companies to focus on how they can defend themselves from rapidly evolving cyber threats. From the exploitation of revolutionary new technology like AI to the proliferation of attack vectors, we have entered a new era of cyber risk—and much of this risk is driven by human vulnerabilities.

“AI has eliminated the barriers to entry for advanced forms of phishing and other social engineering attacks, and cyber-criminals have never had more powerful resources for manipulating victims. Companies need a proactive approach to cybersecurity awareness training, which will help employees anticipate emerging cyber threats, think critically about their digital behavior, and respond to cyber-attacks.”

Read the full article here.


Will LaSala, Field CTO at OneSpan

“As Cybersecurity Awareness Month unfolds, it’s crucial to spotlight how phishing-resistant technologies are revolutionizing defenses across multiple industries. With 95 percent of security breaches resulting from human error, cyber education is undeniably important, but it should not be the only line of defense digital threats encounter. Advanced authentication protocols like FIDO2 and WebAuthn leverage public key cryptography to secure login processes. These methods render stolen credentials useless to attackers, offering a highly secure and user-friendly approach that goes beyond traditional security measures.

“With digital agreements and transactions now integral to business operations and threats continuing to escalate, companies must focus on securing the customer experience from end to end. By integrating advanced authentication methods, organizations can ensure transactions and identities are verified, mitigating the risk of credential theft. Combining these technologies with ongoing user education provides a comprehensive defense, reinforcing our cybersecurity infrastructure against evolving threats. This Cybersecurity Awareness Month, let’s champion these methods as the gold standard in online security.”


Damon Tompkins, President at Pathlock

“As we observe Cybersecurity Awareness Month, it’s essential to highlight the importance of identity security in protecting our digital environments. This includes implementing robust identity and access management systems, which control who has access to what within the organization and continuously monitor those identities to detect and respond to any unusual activity.

“Prioritizing identity security helps organizations enhance their security posture, protect sensitive information, and comply with regulatory requirements. Effective identity security practices, such as adopting a Zero Trust model, ensure that every access request is scrutinized, regardless of its origin. This approach not only safeguards data but also supports operational efficiency by ensuring that users have the appropriate level of access at all times. As we navigate an increasingly digital world, robust identity security measures are more crucial than ever in defending against cyber threats and maintaining a secure and compliant access environment.”


Darryl Jones, Vice President of Consumer Strategy at Ping Identity

“Whether it’s logging into a banking app, making purchases online, or paying through a mobile wallet, consumers use their digital identities every day, often multiple times a day, to interact with businesses online. But this digital experience is not always a pleasant or easy one. A majority of consumers (89 percent) have complaints about passwords, with 61 percent admitting they have too many to keep track of. To no surprise, over half (54 percent) have stopped using an online service because they became frustrated when trying to log in.

“Traditional password-based authentication does not provide the most secure or seamless experiences, two critical elements to earning consumer trust. Adopting a mindset of ‘never trust, always verify’ will not only help improve resilience against emerging AI-based threats but create a better overall digital experience for consumers. This Cybersecurity Awareness Month, I encourage organizations to explore the powerful combination of identity verification and digital credentials to help create a more secure world.”


Tim Perry, Head of Strategy at Prepared

“Emergency systems need to be resilient. They can’t be vulnerable to disruption, whether it’s a storm that knocks down a wire, a cyber-attack, or a failure of one of the PSAP’s legacy software providers to keep their creaky old software up and running. There’s probably a misconception in the market that on-premises solutions are somehow more secure than cloud-based solutions. They are not. Cloud-based solutions do what the next-generation 911 movement has been trying and not always succeeding to do for a couple of decades, which is to improve the resiliency of systems.

“It’s important to stay ahead of cybersecurity compliance requirements and to always evolve as a technology because the threats themselves evolve. Legacy software can be really inadequate or buggy; from our perspective, it’s just a failure to evolve. When you’re thinking about cybersecurity, it’s as important to think about ‘who’ as to think about ‘what.’ Are you concerned about a cyber-criminal or a nation-state actor? Depending on who you think it is, you might choose different approaches to cybersecurity.”


Eric Schwake, Director of CyberSecurity Strategy at Salt Security

“As we enjoy the convenience of digital services, we must also recognize the growing attack surface and evolving threat landscape. APIs, the invisible threads connecting our applications and data, are a prime target for malicious actors.

“Organizations must adopt a comprehensive approach to API security to effectively secure our digital ecosystem. This begins with thorough API discovery, gaining complete visibility into all APIs across the development lifecycle. Understanding the full scope of your API landscape is the crucial first step in identifying potential vulnerabilities and misconfiguration.

“Next, robust API posture governance is essential to ensure that APIs adhere to security best practices and comply with industry regulations. This includes implementing strong authentication and authorization mechanisms, enforcing data validation rules, and proactively managing API access controls.

“Finally, organizations need advanced API behavioral threat protection to detect and prevent malicious activity in real-time. This involves analyzing API traffic patterns to identify anomalies and uncover hidden threats that may bypass traditional security measures. Organizations can proactively defend against attacks and safeguard their critical assets by pinpointing actual malicious traffic within these anomalies.”


Pukar Hamal, Founder and CEO at SecurityPal

“The proliferation of AI over the past few years has introduced new cyber threats to companies. As with any powerful tech, there’s a trade-off between speed and security: while AI helps companies achieve objectives quicker, it also increases the scope for risk and attack. Organizations shouldn’t shy away from AI use altogether but rather do so with security and governance at the top of their minds. Establish a layered security approach—including encryption, behavior monitoring, and automatic alerts for unusual activities—to defend your system from cyber threats. At the same time, prioritize transparency in AI operations across your teams, ensuring your entire organization understands how to safely use AI and interpret its outputs. This is crucial for preventing AI misuse, building trust with internal and external stakeholders, and stymying any cyber threats associated with AI use.”


Patrick Harr, CEO at SlashNext

“Cybersecurity Awareness Month is a reminder that the methods used by cyber-criminals continue to evolve, making it imperative for organizations to have the resources and plans in place to prevent these attacks before they result in data compromise and other security concerns. To stay one step ahead of these sophisticated tactics, organizations must adopt a multi-faceted defense approach, which includes utilizing AI to combat AI-based scams. Even with continuous training to help employees recognize the hallmarks of email and message-based scams, many are still unable to evade complex schemes like 3D phishing. However, while humans may struggle to recognize these threats on their own, AI-based security platforms can detect unusual activities associated with 3D phishing attempts.”


Jason Keenaghan, Director of Product Management, IAM at Thales

“Human error is the leading cause of data breaches, and hackers now have a leg up to take advantage of these weaknesses, thanks to artificial intelligence. Phishing is the second fastest-growing attack, and leveraging generative AI, hackers are able to craft word-perfect emails in any language to help them get a foothold on business networks. Most often, hackers use phishing to steal employee credentials, masquerading as trusted entities to bypass traditional password-based security systems—and this makes passwords even less secure than ever.

“Cyber hygiene training, while wholly necessary, will always be an uphill battle, but shifting away from password credentials can help organizations harden their defenses despite human error. Passkeys can help to eliminate concerns around stolen credentials altogether. Passkeys provide easier, faster, and more secure sign-ins. They’re harder to crack due to their use of cryptographic techniques and often being coupled with biometric authentication. Furthermore, with device-bound passkeys, they cannot be intercepted, as they never leave the user’s device. This shift away from passwords represents a significant leap forward in advancing the security of the digital landscape as a whole and is critical for all organizations to recognize.

“Now is the time to implement passkeys wherever possible and adopt a passwordless 360-degree mindset to address the needs of all users and applications, with none left behind. As it comes to paring down credential-based human risks, the simpler, the better, and passkeys are the strongest defense we have to put an end to the phishing era.”


Ratan Tipirneni, President and CEO of Tigera

“Cybersecurity Awareness Month highlights the importance of implementing stronger defense mechanisms that protect organizations and citizens from increasing cyber-crime. Kubernetes and containerized environments underpin digital innovation and are at the core of modern application development. While these environments boast significant advantages, offering scalability, efficiency, and flexibility, they are also subject to various security risks. This includes vulnerabilities, misconfigurations, network exposures, and both known and zero-day malware threats. The distributed nature of microservices, the dynamic scaling of workloads, and the ephemeral nature of containers introduce unique security challenges.

“Traditional approaches to risk assessment whereby vulnerabilities, misconfigurations, and threats are identified and prioritized in isolation—and each generates its own set of alerts and priorities—are insufficient for the unique nature of Kubernetes. To effectively protect your Kubernetes environment, it is essential to adopt an interconnected security approach that accounts for how these risks interact. Many security risks are associated with specific services. By understanding the relationships between services, security teams can better assess the potential blast radius of risks if left unmitigated. This will enable more accurate and timely risk assessment, prioritization, and mitigation.

“This Cybersecurity Awareness Month, organizations should work to deploy tactics that help evaluate risks holistically and implement controls such as default-deny network policies, workload isolation, IDS/IPS, and WAFs. These tactics will reduce their risk of exploitation, limit lateral movement in the event of a breach, and block known threats before they can manifest.”


Kevin Bocek, Chief Innovation Officer at Venafi

“Rise of the machines is here! As Cybersecurity Awareness Month unfolds, new AI technology, from AI agents to AI coding assistants, is here. But our new superpowers will bring new threats. Opportunities for attackers to authenticate at machine speed and uncertainty about the source and integrity of code have already emerged.  Recent research underscores a growing challenge: 83 percent of security leaders report that developers are using AI to generate code, but 66 percent find it difficult to keep up with these rapid technological advancements. With 92 percent of security leaders expressing concern about the risks posed by AI-generated code, we’re going to find new paths ahead.

“So if the machines are here and security professionals are so concerned, what do we do? Humans and machines have at least one thing in common: they both require identities. We use machine identities to identify machines running and communicating and use code signing to authenticate code from open-source. All of this allows us to use the Internet, install apps on mobile devices, and fly safely on today’s latest digital aircraft.  Applying these same machine identity techniques–when secured–solve the challenges that AI agents to AI coding assistants will present.”


Lynn Dohm, Executive Director of Women in Cybersecurity (WiCyS)

“During Cybersecurity Awareness Month, messaging to already-cyber-conscious audiences is often redundant. It’s time to take a different approach—one that focuses on students and builds real connections. To cut through the clutter, we need to simplify the message and empower the next generation to see themselves in cybersecurity. This month isn’t just about raising awareness; it’s about shaping the future leaders of this field.

“Teenagers are much more likely to listen to someone closer to their age who they can relate to. They’re not going to engage with adults lecturing them about cybersecurity. To shake things up, this Cybersecurity Awareness Month, we’re showing young women that they belong in this field by mobilizing our student chapters to reach high school students directly. We’re showing them that cybersecurity is already a part of their lives and doesn’t have to be intimidating.

“We’ve developed a Cybersecurity Awareness Month toolkit, backed by our top-tier partners, that these student leaders will take into high schools, breaking down cybersecurity into simple, everyday language. Many students don’t realize they’re already practicing cybersecurity when they use things like two-factor authentication. By having peers—people who were recently in their shoes—share this message, we’re making cybersecurity feel relevant and accessible. It’s not a big, scary concept; it’s something they’re already part of.”


Boaz Gorodissky, CTO and Co-Founder at XM Cyber

“Cybersecurity Awareness Month serves as a reminder to organizations that protecting critical assets requires a much more comprehensive approach to exposure management. Organizations typically have around 15,000 exposures scattered across their environments that skilled attackers could potentially exploit, and yet, CVE-based vulnerabilities account for just a small percentage of this massive exposure landscape. Even when looking only at exposures affecting their most critical assets, CVEs represent only a small part of the risk profile. While organizations are focused on patch management and vulnerability management to address CVEs, the maturity to mobilize teams and remediate issues such as misconfigurations and weak credentials is low, leaving organizations exposed.

“This disconnect between the traditional cybersecurity focus and the real-world threatscape demands a paradigm shift in security strategies. This Cybersecurity Awareness Month, organizations should use the opportunity to ensure a comprehensive and proactive approach to cybersecurity. They should ensure they get a continuous and complete view of securing all critical assets (on-prem and cloud) to holistically safeguard their digital assets in today’s increasingly complex threat landscape.”


The post Cybersecurity Awareness Month Quotes from Industry Experts in 2024 appeared first on Best Network Monitoring Vendors, Software, Tools and Performance Solutions.

]]>