Advertisement · 728 × 90
#
Hashtag
#RSAc
Advertisement · 728 × 90
Preview
a man in a suit is drinking a green smoothie with a straw . ALT: a man in a suit is drinking a green smoothie with a straw .

How was #infosec coachella this week? I want to know the details! #RSAC

1 0 0 0

RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging SAN FRANCISCO — Forty-four thousand cybersecurity practitioners converged on Moscone Center this w...

#My #Take #RSAC #Top #Stories

Origin | Interest | Match

0 0 0 0

RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging SAN FRANCISCO — Forty-four thousand cybersecurity practitioners converged on Moscone Center this w...

#My #Take #RSAC #Top #Stories

Origin | Interest | Match

0 0 0 0

RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging SAN FRANCISCO — Forty-four thousand cybersecurity practitioners converged on Moscone Center this w...

#My #Take #RSAC #Top #Stories

Origin | Interest | Match

0 0 0 0
Preview
RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging # RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging ##### By Byron V. Acohido SAN FRANCISCO — Forty-four thousand cybersecurity practitioners converged on Moscone Center this week with an urgent question: how do you secure a network when everything — the technology, the threats, the tools — is changing faster than anyone can govern it? Microsoft’s Vasu Jakkal set the scale on day one. She noted that IDC projects 1.3 billion AI agents in operation by 2028 — each one requiring the same governance and protection organizations currently apply to human users. That number puts a concrete frame around both waves: the tools needed to defend AI-native infrastructure, and the tools needed to secure AI systems themselves. Neither problem is theoretical anymore. The week’s most unexpected signal came not from the vendor floor but from the main stage, where former New Zealand Prime Minister Jacinda Ardern joined new RSAC CEO Jen Easterly for a conversation on leading through crisis. The message landed differently in this room than it might have elsewhere: the challenge in front of this industry has grown past what any single organization, or any single technology, solves alone. What’s required now is the kind of collective will that Ardern built in the aftermath of Christchurch — clear values, shared purpose, leaders who show up. The tools and practices to respond are further along than the headlines suggest. The cybersecurity industry has always been fast to adapt. What’s different this time is that adaptation can’t happen company by company, SOC by SOC. It has to be built across organizations, disciplines, and technologies simultaneously — and that work is already underway. The tools and practices required to do it look nothing like what worked five years ago. The practitioners on the following pages are working the problem from the inside — each one a piece of what a coordinated response looks like. **Tony Anscombe, Chief Security Evangelist, ESET** Anscombe has spent years pushing a reframe the industry resists: a cyberattack is a business disruption event, not a technical incident, and the tools for managing it should be measured against financial exposure, not threat intelligence. The Jaguar Land Rover ransomware attack makes the case concretely — five weeks of factory shutdown, 5,000 supplier businesses paralyzed, a £1.5 billion UK government bailout. Supply chain risk and business risk are the same risk. He also flagged PromptLock, an NYU academic proof-of-concept for AI-powered ransomware that found its way into the wild. His warning: adversaries are reading the research papers too. **Kevin Surace, CEO, TokenCore** The industry drove attackers to the front door and left it unlocked. That was Surace’s blunt assessment heading into RSAC — and the Tycoon2FA kit validated it: 96,000 successful break-ins before Microsoft dismantled the tool, every one bypassing a legitimate authentication app. When Salesforce and Microsoft mandated MFA, they inadvertently handed attackers a map. TokenCore’s answer is fingerprint-based hardware authentication where biometrics never leave the device, access is proximity-bound, and there is nothing to phish, replay, or socially engineer. Gartner projects the biometric assured identity market at $16 billion within seven years. Surace calls that conservative. **Dwayne McDaniel, Developer Advocate, GitGuardian** GitGuardian’s 2026 State of Secrets Sprawl report delivered the week’s most arresting number: 64 percent of secrets that leaked in 2022 are still valid and exploitable today. The industry has a detection capability. It does not have a retirement discipline. McDaniel’s deeper point is structural — standing privilege is the root flaw. Any entity holding a credential inherits whatever that credential was authorized to do, permanently, until someone actively revokes it. Nobody does. AI-accelerated development is compounding the exposure: commits co-authored by Claude Code are twice as likely to contain leaked secrets. **Amit Sinha, CEO, DigiCert** Sinha The alarmists calling agentic AI an identity crisis are half right — the problem is real, but so is the framework for solving it. AI agents need digital passports: cryptographic, immutable identities that travel with them and can be revoked. The sharper near-term pressure is a mandate most organizations haven’t absorbed. The CA/Browser Forum is shrinking TLS certificate lifetimes from 398 days to 47 — an 8X increase in renewal volume. A bank CSO told Sinha his network already logs three certificate-related outages daily. Without automation, that number becomes one per hour. **Ted Miracco, CEO, Approov** Every mobile API was built around a single assumption: a human being on the other end. Agentic AI has broken that assumption — and Miracco calls the gap it leaves the Agency Gap. Mobile is the least prepared surface for what follows. API keys are compiled directly into app packages, where they’re extractable through standard monitoring tools. Once an attacker has a valid key, an AI agent can replay authenticated requests at machine speed, cycling through permutations indefinitely. Approov’s answer: move secrets off the device entirely, delivering them just-in-time only to verified, untampered apps. **Jamison Utter, Field CISO, A10 Networks** Utter’s framing cut through the noise: language is now an attack surface. Not SQL injection, not malware — language itself. What makes LLMs powerful also makes them vulnerable to semantic manipulation that no existing tool was built to detect. His four words for the moment: machines fighting machines. A10 built its answer in-house — an AI Firewall using a small language model trained on attack data to inspect prompts inbound and responses outbound in real time, at carrier scale. Most guardrail products failed under production load, Utter noted. This one was built to survive it. General availability: April 7. **Rajiv Pimplaskar, CEO, Dispersive** Few practitioners on the floor were tracking Whisper Leak — and that, Pimplaskar suggested, is exactly the problem. The side-channel attack flagged by Microsoft in late 2025 allows a passive listener to infer the content of TLS-encrypted LLM communications by analyzing packet sizes and timing cadence alone. No decryption required. TLS protects the data; it does not hide the pattern. Dispersive’s answer is to make the pattern disappear — splitting and obfuscating traffic across dynamically shifting paths. A multi-month pilot with American Tower just completed, validating the architecture for AI and GPU workloads at the edge. **Hallgrimur (Halli) Bjornsson, CEO, Varist** Varist’s roots trace to Iceland’s Frisk Software — one of the original antivirus pioneers — which means Bjornsson was thinking about malware at machine scale long before most of this week’s vendors existed. The company nearly deleted its decades-deep malware dataset before he recognized what ChatGPT 3 made possible: a strategic training asset, not a storage liability. At RSAC, Varist launched a free community malware scanner powered by its Hybrid Detection Engine, processing files in 8.5 milliseconds versus the 30-minute sandbox defenders have quietly hated for years. AI-generated, self-mutating malware is now confirmed in the wild. **Yogita Parulekar, CEO, InviGrid** Parulekar put it plainly in a brief floor exchange: writing an AI agent has become easy. Deploying it securely is where organizations fall apart. Developers who can build an agent over a weekend expect production deployment at the same speed — but they’re not security engineers and aren’t slowing down to become ones. InviGrid’s platform closes that gap automatically: securing connections, enabling encryption and logging, enforcing least privilege at the moment of deployment, not after. Her read on where things stand: 2025 was AI agent experimentation. 2026 is when enterprises take them to production and discover what they missed. **Mike Bell, CEO, Suzu Labs** Bell’s story is the BYOAI thesis made flesh. A medically retired Army veteran who taught himself AI in his garage, he built a penetration testing integration for PlexTrac, sold it for $100,000, then launched Suzu Labs — now carrying $2.5 million in pipeline across cybersecurity consulting and custom AI deployments. The pitch is precise: enterprises want AI but cannot send proprietary data to OpenAI or Anthropic. Suzu builds localized implementations on open-source models running entirely on client infrastructure. Nothing leaves the building. No outbound API calls. At RSAC, the company swept four Global InfoSec Awards. **Rajeev Raghunarayan, Head of Go-to-Market, Averlon** The remediation gap is not where most security programs are looking for it. Scanners have gotten good at finding vulnerabilities — the failure is everything that happens next: prioritization, context, and fix. Averlon works that second half of the workflow, using AI to determine which findings trace to high-value data and which ones actually need to move. In some deployments, it has cut the critical and high vulnerability workload by 90 to 95 percent. A shift-left capability — intercepting risky code before it commits — entered the market just two months ago. **Noam Issachar, Chief Business Officer, Jazz Security** Jazz Security made the week’s sharpest entrance: walked in with a thesis and walked out with a trophy. Legacy DLP never worked, and AI has made the gap untenable. The startup won the CrowdStrike-AWS-NVIDIA Cybersecurity Startup Accelerator by doing what the old tools couldn’t — understanding not just what data moved, but why, who touched it, and what the intent was. Its agentic investigator, Melody, replaces alert triage with pre-investigated answers. In a world where AI agents reach data across every application layer, context isn’t a nice-to-have. It’s the whole game. **Ambuj Kumar, CEO, Simbian** Simbian arrived at RSAC with two years of momentum behind it and a platform announcement that crystallized what that momentum has been building toward. The unified platform Kumar unveiled brings together three coordinated agents — SOC response, penetration testing, and threat hunting — operating on a shared intelligence layer called the Context Lake, which stores the institutional knowledge security teams usually pass between people. The business case is already in the market: 15x customer growth over the past year. Kumar’s thesis hasn’t shifted — AI agents can outperform L1 and L2 analysts — but at RSAC, the architecture to prove it at scale arrived. * * * Forty-four thousand practitioners came to Moscone with an urgent question. They didn’t leave with an answer — but they left with something more useful: proof that the work is already underway, distributed across dozens of organizations, each building a piece of the response the question demands. The infrastructure is arriving. I’ll keep reporting and keep watching. Acohido _Pulitzer Prize-winningbusiness journalist Byron V. Acohido is dedicated to fostering public awareness about how to make the Internet as private and secure as it ought to be._ _(**Editor’s note** : I used Claude and ChatGPT to assist with research compilation, source discovery, and early draft structuring. All interviews, analysis, fact-checking, and final writing are my own. I remain responsible for every claim and conclusion.)_ March 27th, 2026 | My Take | RSAC | Top Stories *** This is a Security Bloggers Network syndicated blog from The Last Watchdog authored by bacohido. Read the original post at: https://www.lastwatchdog.com/rsac-2026-no-easy-fixes-for-expanding-ai-attack-surface-but-a-coordinated-response-is-emerging/

RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging SAN FRANCISCO — Forty-four thousand cybersecurity practitioners converged on Moscone Center this w...

#SBN #News #Security #Bloggers #Network #My #Take #rsac #Top #Stories

Origin | Interest | Match

0 0 0 0

RSAC 2026: No easy fixes for expanding AI attack surface, but a coordinated response is emerging SAN FRANCISCO — Forty-four thousand cybersecurity practitioners converged on Moscone Center this w...

#My #Take #RSAC #Top #Stories

Origin | Interest | Match

0 0 0 0
Post image

Still thinking about #RSAC? @rickatron.bsky.social, Emilee Tellez & @explosive.cloud pulled together the biggest takeaways from the show in yesterday’s Tech Bites — resilience, trusted AI, and more!

Watch the replay now >> https://bit.ly/3NsiyLi

1 2 0 0
Post image

The #RSAC conference has once again descended upon San Francisco and delivered an event that brings together the largest collection of industry leaders, technologies, and #cybersecurity community events!

Full Details: open.substack.com/pub/matthewr...

0 0 0 0
Post image

New #RSAC hoodie, my first in like 4yrs. Sorta perfect. Oddly happy about this! Especially on a chilly #Bellingham morning 🥶

0 0 0 0
Original post on cyberscoop.com

Security leaders say the next two years are going to be ‘insane’ Kevin Mandia, Morgan Adamski, and Alex Stamos tell CyberScoop that AI is finding bugs faster than anyone can fix them, exploit d...

#AI #Cybersecurity #Exclusive #Technology #Threats #2026 #RSAC […]

[Original post on cyberscoop.com]

0 0 0 0
Video

What a week! Thank you to everyone who came out to visit us at #RSAC, took the Dojo AI Challenge, and experienced true agentic AI-powered threat detection and response. We had a blast and hope you did too!

#AI #SOC #cybersecurity #events #agentic

0 0 0 0
Video

That’s a wrap on #RSAC!

We came, we saw, we showed the power of continuous exploit-validated testing and what it unlocks for modern security operations. 🏹

Thanks to everyone who stopped by our booth, tuned into our fireside chat, and booked a meeting this week. 🙌

0 0 0 0
Post image Post image

One week. Two events. A lot of great conversations. Thanks to everyone who stopped by, said hi, and took a shot at the dart board 🎯

We’ll see you at the next one!

#Minimus #KubeConEU #RSAC

1 0 1 0
Cybersecurity Hot Takes 🔥 (JJ, Rich, & Wolf Don’t Hold Back)
Cybersecurity Hot Takes 🔥 (JJ, Rich, & Wolf Don’t Hold Back) YouTube video by IANS

A round of hot or not, at #rsac.

youtu.be/D2BgOCm_WhE?...

2 0 0 0
Preview
Google Sets 2029 Deadline for Quantum-Safe Cryptography The post-quantum future may be coming sooner than you think, as Google plans to have PQC migration in place by 2029.

Google Sets 2029 Deadline for Quantum-Safe Cryptography: https://bit.ly/4dwQjFV by Alexander Culafi #RSAC

0 0 0 0
Original post on securityweek.com

RSAC 2026 Conference Announcements Summary (Days 3-4) A summary of the announcements made by vendors on the third and fourth days of the RSAC 2026 Conference. The post RSAC 2026 Conference Announce...

#Management #& #Strategy #Featured #RSA #Conference […]

[Original post on securityweek.com]

0 0 0 0
Post image Post image Post image

🎧 El fraude digital ya no es solo documental: también es de voz y de vídeo. Nuestro compañero Alexandre T. Meany presenta Veraquo desde #RSAC en Radio Voz: una solución para detectar fraude en contenidos digitales cada vez más sofisticados
🎧 Entrevista (2ª parte, 26/03): https://tinyurl.com/bddmt9h4

0 0 1 0

The Qantas lounge in LAX seems to have the entire #RSAC Aussie contingent in it tonight 😆

2 0 0 0
Post image Post image Post image

Well, that’s a wrap on my first #RSAC since 2019! Great to catch up with old and new friends and and perhaps not so great to be reminded of the sensory overload of the expo hall and unrelenting sessions/events/parties.

But 11/10 would still RSAC again. Now, to sleep.

5 0 0 0
Post image Post image Post image Post image

Thanks to everyone who stopped by to connect with our team at #RSAC!

This week was packed with great conversations, great energy, and valuable insight into today’s security challenges. Let’s keep those conversations going!

1 0 0 0
Post image

#RSAC 2026: Done! ✅

It was fantastic connecting with so many of you and sharing how runZero helps teams gain unrivaled visibility across their entire internal and external attack surface.

Thanks to everyone who joined our events this week. See you next year! 👋

1 0 0 0
Post image Post image Post image

#RSAC 2026, thank you! We had a wonderful time connecting with everyone this week at our booth, the Veeam Leaders’ Lounge, at our sessions, and more.

What was your favorite moment? Let us know!

0 0 0 0
Post image Post image Post image Post image

Another RSAC in the books. We had an incredible time connecting with everyone on the ground this week, from booth visitors to customers, partners, and colleagues from all over.

Thank you to the RSAC organizers for yet another great event!

#RSAC #NozomiNetworks

1 0 0 0
Preview
Vehicle Cybersecurity Threats Grow in Era of Connected Vehicles Experts warn that connected vehicles create new risks as the auto industry works to secure cars against evolving cyber threats

Automotive Cybersecurity Threats Grow in Era of Connected, Autonomous Vehicles: https://bit.ly/4ddeGIm by Bree Fowler #RSAC

1 0 1 0
Picture of little Lego techie selfie figure on a CoSAI brochure, at the OASIS booth at RSA Conference Expo.  This one looks remarkably like a lawyer my age with a bitty cel phone.   I didn't even know they MADE grey haired Lego figures with mustaches

Picture of little Lego techie selfie figure on a CoSAI brochure, at the OASIS booth at RSA Conference Expo. This one looks remarkably like a lawyer my age with a bitty cel phone. I didn't even know they MADE grey haired Lego figures with mustaches

Clearly some of these selfie experiments work out better than others. Thanks, Holly and Kelly...
#OASISopen #CoSAI #RSAc

0 0 0 0
Video

Starting soon #RSAC: Christiaan Beek, VP of Cyber Intelligence, details new research that uncovered stealth “sleeper cell” access embedded in telecommunications networks by a China-nexus threat actor.

This type of compromise impacts everyone - this is a conversation you don’t want to miss.

1 0 0 0
A man handcuffed, sitting on a chair, with the Physical Security Village logo on a tv in the background

A man handcuffed, sitting on a chair, with the Physical Security Village logo on a tv in the background

This guy is handcuffed in our village! If you want to learn how to get out of handcuffs come by RSAC, in Moscone South 204 before we close at 2pm! #RSAC #RSAC2026 #RSAConference #physicalsecurity #handcuffs #physicalsecurityvillage

1 0 1 0
- YouTube Enjoy the videos and music you love, upload original content, and share it all with friends, family, and the world on YouTube.

Tony Anscombe: RSAC 2026 Wrap-Up: RSAC 2026 is wrapping up, but the conversations don’t stop here. 💬
After a week of strong presence, expert talks, and conversations across the cybersecurity community, Tony Anscombe reflects on what stood out most this year. #RSAC #RSAC2026 #Cybersecurity #ESET

0 0 0 0
Post image Post image Post image Post image

#RSAC 2026: It’s been an incredible week for our team, full of meaningful conversations and new connections.

Thanks to everyone who met with us at our Zero-Impact Suite, and explored how Mitiga can help make today’s cloud attacks yesterday’s problem. We look forward to continuing the conversations.

0 0 0 0
Video

Earlier this week at the #RSAC, our Chief Product Officer shared what he’d been hearing in his convos with customers.

#AI #AISecurity #Cloud #ZeroTrust

0 0 0 0