#blackhat2025 — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #blackhat2025, aggregated by home.social.
-
New Episode 🥳
BlackHat Europe 2025: New President Suzy Pallett on Community, Collaboration, and What Comes Next
I had the chance to speak with Suzy Pallett as she wrapped up her first #BlackHatEurope as the brand's new President. The event saw attendance grow more than 25 percent over last year.
Her perspective on #cybersecurity stands out. She called it "collaboration unlike any other industry I've ever been close to." In a world where knowledge is usually guarded, here it gets shared freely. Because the threats affect everyone, and defending together just makes sense.
The keynotes this year pushed some uncomfortable questions. Is ransomware actually stoppable? Are our compliance checklists creating vulnerabilities instead of preventing them? These are the conversations that matter—not just what tool to buy, but how we think about the problems in the first place.
And when I asked about her priorities for the year ahead, she kept coming back to the same word: community. Listening. Building a platform that belongs to the people who use it.
Events like this remind us why this industry, for all its stress and complexity, still feels different.
The cat-and-mouse game continues, but at least we're running together.
Links in the comments.
#BlackHatEurope #Cybersecurity #BlackHat2025 #ITSPmagazine #InfoSec #CyberCommunity #ThreatIntelligence #SuzyPallett #SecurityEvents #OnLocation #infosecurity
Sean Martin, CISSP Studio C60 / ITSPmagazine
Episode Links:
Podcast: https://itspmagazine.simplecast.com/episodes/black-hat-europe-2025-wrap-up-suzy-pallett-on-global-expansion-ai-threats-and-defending-together-on-location-coverage-with-sean-martin-marco-ciappelli
YouTube: https://youtu.be/nTZSaurWv_M
On Location Coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage
Article: https://www.itspmagazine.com/cybersecurity-technology-society-events/black-hat-europe-2025 -
New Episode 🥳
BlackHat Europe 2025: New President Suzy Pallett on Community, Collaboration, and What Comes Next
I had the chance to speak with Suzy Pallett as she wrapped up her first #BlackHatEurope as the brand's new President. The event saw attendance grow more than 25 percent over last year.
Her perspective on #cybersecurity stands out. She called it "collaboration unlike any other industry I've ever been close to." In a world where knowledge is usually guarded, here it gets shared freely. Because the threats affect everyone, and defending together just makes sense.
The keynotes this year pushed some uncomfortable questions. Is ransomware actually stoppable? Are our compliance checklists creating vulnerabilities instead of preventing them? These are the conversations that matter—not just what tool to buy, but how we think about the problems in the first place.
And when I asked about her priorities for the year ahead, she kept coming back to the same word: community. Listening. Building a platform that belongs to the people who use it.
Events like this remind us why this industry, for all its stress and complexity, still feels different.
The cat-and-mouse game continues, but at least we're running together.
Links in the comments.
#BlackHatEurope #Cybersecurity #BlackHat2025 #ITSPmagazine #InfoSec #CyberCommunity #ThreatIntelligence #SuzyPallett #SecurityEvents #OnLocation #infosecurity
Sean Martin, CISSP Studio C60 / ITSPmagazine
Episode Links:
Podcast: https://itspmagazine.simplecast.com/episodes/black-hat-europe-2025-wrap-up-suzy-pallett-on-global-expansion-ai-threats-and-defending-together-on-location-coverage-with-sean-martin-marco-ciappelli
YouTube: https://youtu.be/nTZSaurWv_M
On Location Coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage
Article: https://www.itspmagazine.com/cybersecurity-technology-society-events/black-hat-europe-2025 -
New Episode 🥳
BlackHat Europe 2025: New President Suzy Pallett on Community, Collaboration, and What Comes Next
I had the chance to speak with Suzy Pallett as she wrapped up her first #BlackHatEurope as the brand's new President. The event saw attendance grow more than 25 percent over last year.
Her perspective on #cybersecurity stands out. She called it "collaboration unlike any other industry I've ever been close to." In a world where knowledge is usually guarded, here it gets shared freely. Because the threats affect everyone, and defending together just makes sense.
The keynotes this year pushed some uncomfortable questions. Is ransomware actually stoppable? Are our compliance checklists creating vulnerabilities instead of preventing them? These are the conversations that matter—not just what tool to buy, but how we think about the problems in the first place.
And when I asked about her priorities for the year ahead, she kept coming back to the same word: community. Listening. Building a platform that belongs to the people who use it.
Events like this remind us why this industry, for all its stress and complexity, still feels different.
The cat-and-mouse game continues, but at least we're running together.
Links in the comments.
#BlackHatEurope #Cybersecurity #BlackHat2025 #ITSPmagazine #InfoSec #CyberCommunity #ThreatIntelligence #SuzyPallett #SecurityEvents #OnLocation #infosecurity
Sean Martin, CISSP Studio C60 / ITSPmagazine
Episode Links:
Podcast: https://itspmagazine.simplecast.com/episodes/black-hat-europe-2025-wrap-up-suzy-pallett-on-global-expansion-ai-threats-and-defending-together-on-location-coverage-with-sean-martin-marco-ciappelli
YouTube: https://youtu.be/nTZSaurWv_M
On Location Coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage
Article: https://www.itspmagazine.com/cybersecurity-technology-society-events/black-hat-europe-2025 -
New Episode 🥳
BlackHat Europe 2025: New President Suzy Pallett on Community, Collaboration, and What Comes Next
I had the chance to speak with Suzy Pallett as she wrapped up her first #BlackHatEurope as the brand's new President. The event saw attendance grow more than 25 percent over last year.
Her perspective on #cybersecurity stands out. She called it "collaboration unlike any other industry I've ever been close to." In a world where knowledge is usually guarded, here it gets shared freely. Because the threats affect everyone, and defending together just makes sense.
The keynotes this year pushed some uncomfortable questions. Is ransomware actually stoppable? Are our compliance checklists creating vulnerabilities instead of preventing them? These are the conversations that matter—not just what tool to buy, but how we think about the problems in the first place.
And when I asked about her priorities for the year ahead, she kept coming back to the same word: community. Listening. Building a platform that belongs to the people who use it.
Events like this remind us why this industry, for all its stress and complexity, still feels different.
The cat-and-mouse game continues, but at least we're running together.
Links in the comments.
#BlackHatEurope #Cybersecurity #BlackHat2025 #ITSPmagazine #InfoSec #CyberCommunity #ThreatIntelligence #SuzyPallett #SecurityEvents #OnLocation #infosecurity
Sean Martin, CISSP Studio C60 / ITSPmagazine
Episode Links:
Podcast: https://itspmagazine.simplecast.com/episodes/black-hat-europe-2025-wrap-up-suzy-pallett-on-global-expansion-ai-threats-and-defending-together-on-location-coverage-with-sean-martin-marco-ciappelli
YouTube: https://youtu.be/nTZSaurWv_M
On Location Coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage
Article: https://www.itspmagazine.com/cybersecurity-technology-society-events/black-hat-europe-2025 -
New Episode 🥳
BlackHat Europe 2025: New President Suzy Pallett on Community, Collaboration, and What Comes Next
I had the chance to speak with Suzy Pallett as she wrapped up her first #BlackHatEurope as the brand's new President. The event saw attendance grow more than 25 percent over last year.
Her perspective on #cybersecurity stands out. She called it "collaboration unlike any other industry I've ever been close to." In a world where knowledge is usually guarded, here it gets shared freely. Because the threats affect everyone, and defending together just makes sense.
The keynotes this year pushed some uncomfortable questions. Is ransomware actually stoppable? Are our compliance checklists creating vulnerabilities instead of preventing them? These are the conversations that matter—not just what tool to buy, but how we think about the problems in the first place.
And when I asked about her priorities for the year ahead, she kept coming back to the same word: community. Listening. Building a platform that belongs to the people who use it.
Events like this remind us why this industry, for all its stress and complexity, still feels different.
The cat-and-mouse game continues, but at least we're running together.
Links in the comments.
#BlackHatEurope #Cybersecurity #BlackHat2025 #ITSPmagazine #InfoSec #CyberCommunity #ThreatIntelligence #SuzyPallett #SecurityEvents #OnLocation #infosecurity
Sean Martin, CISSP Studio C60 / ITSPmagazine
Episode Links:
Podcast: https://itspmagazine.simplecast.com/episodes/black-hat-europe-2025-wrap-up-suzy-pallett-on-global-expansion-ai-threats-and-defending-together-on-location-coverage-with-sean-martin-marco-ciappelli
YouTube: https://youtu.be/nTZSaurWv_M
On Location Coverage: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage
Article: https://www.itspmagazine.com/cybersecurity-technology-society-events/black-hat-europe-2025 -
Looking forward to supporting everyone in the #NOC at #BlackHatEurope #BlackHat2025 #blackhat2025 again this year. See you all in #London #networking
-
Looking forward to supporting everyone in the #NOC at #BlackHatEurope #BlackHat2025 #blackhat2025 again this year. See you all in #London #networking
-
Looking forward to supporting everyone in the #NOC at #BlackHatEurope #BlackHat2025 #blackhat2025 again this year. See you all in #London #networking
-
Looking forward to supporting everyone in the #NOC at #BlackHatEurope #BlackHat2025 #blackhat2025 again this year. See you all in #London #networking
-
US denies intervening in case of Israeli official accused of Nevada sex crime
The US State Department said the American government played no role in the release of an #Israeli official charged with soliciting sex electronically from a minor.
Tom Artiom Alexandrovich was charged following an undercover operation “targeting child sex predators,” the Las Vegas Metropolitan Police said.
Israeli media said #Alexandrovich, who they described as a senior department head in Israel’s National Cyber Directorate, was released by US authorities and is back in #Israel.
At the time, Las Vegas was hosting #BlackHat, one of the #cybersecurity industry’s most prominent conferences.
Alexandrovich “did not claim diplomatic immunity and was released by a state judge pending a court date. Any claims that the US government intervened are false,” the State Department said.
Reuters / https://archive.fo/T3YTr
@geopolitics #BlackHat2025 #TomAlexandrovich #ChildSexAbuse #IsraeliValues
-
Reflections from Black Hat USA 2025 on Deception, Disinformation, and the Marketing That Chose Fiction Over Facts... 🤔
As I was driving away from Las Vegas... pretty damn fast -- as you can see -- I couldn't shake a troubling feeling from Black Hat.
The Narrative Attack Paradox: When #Cybersecurity Lost the Ability to Detect Its Own Deception and the Humanity We Risk When Truth Becomes Optional
The paradox? An industry studying "narrative attacks"—AI-powered campaigns that flood information environments with personalized deception at scale—as external threats, while simultaneously being surrounded by their own #marketing language that had become indistinguishable from the very algorithmic content generation they were warning about.
When the canary in the coal mine—the cybersecurity industry that's supposed to detect digital deception—loses its ability to distinguish authentic capability from algorithmic fiction, what hope do other industries have?
We're living in a Borgesian nightmare where marketing descriptions of #AI capabilities have become more influential than actual AI capabilities.
The problem isn't just technological—it's epistemological. We've built machines that decide what questions we should ask and how we should evaluate the answers.
A direct challenge to marketing professionals: This is your wake-up call. Stop letting #algorithms craft your messages. The most respected brands choose honesty over hype, transparency over clever AI-optimized copy. When your audience can't distinguish between human insight and machine-generated claims, authentic communication becomes your only competitive advantage.
The canary may be struggling to breathe, but it's still singing. The question is whether we're still listening.
There's so much more to think about here—from Borges to McLuhan, from recursive information crises to what we risk when truth becomes optional.
Read the full analysis, or if you prefer, listen to the podcast version included in the newsletter.
Let's keep exploring what it means to be human in this Hybrid Analog Digital Society—especially when the stakes have never been higher.
#technology #genau #artificialintelligence #branding #authenticity #BlackHat2025 #narrativeattacks
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
Take a look back at Claroty's presence last week at 🎩 Black Hat USA 2025 in Las Vegas. We had such an awesome time and look forward to next year!
With the right cyber-physical security measures, commitment, budgets and partnerships in place, human safety, business continuity, operational uptime, consumer trust – and life itself – goes uninterrupted.
Are you ready for Life, uninterrupted? https://claroty.com/life-uninterrupted
#LifeUninterrupted #BHUSA #BlackHatUSA #LifeAtClaroty #BlackHat2025 #BlackHat #BlackHatUSA2025 #BHUSA25 #Claroty
-
Take a look back at Claroty's presence last week at 🎩 Black Hat USA 2025 in Las Vegas. We had such an awesome time and look forward to next year!
With the right cyber-physical security measures, commitment, budgets and partnerships in place, human safety, business continuity, operational uptime, consumer trust – and life itself – goes uninterrupted.
Are you ready for Life, uninterrupted? https://claroty.com/life-uninterrupted
#LifeUninterrupted #BHUSA #BlackHatUSA #LifeAtClaroty #BlackHat2025 #BlackHat #BlackHatUSA2025 #BHUSA25 #Claroty
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
#Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this transformative Brand Story conversation thanks to our friends at CyberSN 🙏
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
The cybersecurity #talentgap isn't just about finding people—it's about understanding who you have and what you actually need.
At #BlackHat2025, Deidre Diamond (CEO of #CyberSN) and Carraig Stanwyck (CEO of 3 Tree Tech) reveal why outdated job descriptions and static spreadsheets are sabotaging your security team's success.
The hidden problems killing your team effectiveness:
• Leaders manage complex teams with tools that can't capture real-time role changes or skill utilization
• Employees burn out doing work outside their job descriptions
• Strategic plans and budgets are built on incomplete or inaccurate information • Generic job postings create the "square peg, round hole" hiring problem
• Retention suffers when skills and roles don't alignCyberSN's workforce risk management platform changes the game by providing:
• Dynamic capability mapping—see how each capability is staffed and identify gaps
• Role realignment insights to match employees with work that fits their strengths
• Accurate job descriptions based on actual needs, not outdated templates
• Employee engagement data for better career planning and retention
• Data-backed insights that strengthen budget requestsThe #business impact?
Improved retention, stronger budgets, reduced burnout, and teams that can proactively adapt to changing priorities. When you truly understand your #workforce, you can transform cybersecurity from a reactive function into a strategic force.📺 Watch the video: https://youtu.be/TIIwtawhGFE
➤ Learn more about CyberSN: https://itspm.ag/cybersn-476941
✦ Catch more stories from CyberSN: https://www.itspmagazine.com/directory/cybersn
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #TalentManagement #WorkforceRisk #CyberHiring #BlackHatUSA #BHUSA25 #SecurityTeams #CyberCareers #TeamBuilding
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
#Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this transformative Brand Story conversation thanks to our friends at CyberSN 🙏
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
The cybersecurity #talentgap isn't just about finding people—it's about understanding who you have and what you actually need.
At #BlackHat2025, Deidre Diamond (CEO of #CyberSN) and Carraig Stanwyck (CEO of 3 Tree Tech) reveal why outdated job descriptions and static spreadsheets are sabotaging your security team's success.
The hidden problems killing your team effectiveness:
• Leaders manage complex teams with tools that can't capture real-time role changes or skill utilization
• Employees burn out doing work outside their job descriptions
• Strategic plans and budgets are built on incomplete or inaccurate information • Generic job postings create the "square peg, round hole" hiring problem
• Retention suffers when skills and roles don't alignCyberSN's workforce risk management platform changes the game by providing:
• Dynamic capability mapping—see how each capability is staffed and identify gaps
• Role realignment insights to match employees with work that fits their strengths
• Accurate job descriptions based on actual needs, not outdated templates
• Employee engagement data for better career planning and retention
• Data-backed insights that strengthen budget requestsThe #business impact?
Improved retention, stronger budgets, reduced burnout, and teams that can proactively adapt to changing priorities. When you truly understand your #workforce, you can transform cybersecurity from a reactive function into a strategic force.📺 Watch the video: https://youtu.be/TIIwtawhGFE
➤ Learn more about CyberSN: https://itspm.ag/cybersn-476941
✦ Catch more stories from CyberSN: https://www.itspmagazine.com/directory/cybersn
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #TalentManagement #WorkforceRisk #CyberHiring #BlackHatUSA #BHUSA25 #SecurityTeams #CyberCareers #TeamBuilding
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
#Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this transformative Brand Story conversation thanks to our friends at CyberSN 🙏
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
The cybersecurity #talentgap isn't just about finding people—it's about understanding who you have and what you actually need.
At #BlackHat2025, Deidre Diamond (CEO of #CyberSN) and Carraig Stanwyck (CEO of 3 Tree Tech) reveal why outdated job descriptions and static spreadsheets are sabotaging your security team's success.
The hidden problems killing your team effectiveness:
• Leaders manage complex teams with tools that can't capture real-time role changes or skill utilization
• Employees burn out doing work outside their job descriptions
• Strategic plans and budgets are built on incomplete or inaccurate information • Generic job postings create the "square peg, round hole" hiring problem
• Retention suffers when skills and roles don't alignCyberSN's workforce risk management platform changes the game by providing:
• Dynamic capability mapping—see how each capability is staffed and identify gaps
• Role realignment insights to match employees with work that fits their strengths
• Accurate job descriptions based on actual needs, not outdated templates
• Employee engagement data for better career planning and retention
• Data-backed insights that strengthen budget requestsThe #business impact?
Improved retention, stronger budgets, reduced burnout, and teams that can proactively adapt to changing priorities. When you truly understand your #workforce, you can transform cybersecurity from a reactive function into a strategic force.📺 Watch the video: https://youtu.be/TIIwtawhGFE
➤ Learn more about CyberSN: https://itspm.ag/cybersn-476941
✦ Catch more stories from CyberSN: https://www.itspmagazine.com/directory/cybersn
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #TalentManagement #WorkforceRisk #CyberHiring #BlackHatUSA #BHUSA25 #SecurityTeams #CyberCareers #TeamBuilding
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
#Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this transformative Brand Story conversation thanks to our friends at CyberSN 🙏
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
The cybersecurity #talentgap isn't just about finding people—it's about understanding who you have and what you actually need.
At #BlackHat2025, Deidre Diamond (CEO of #CyberSN) and Carraig Stanwyck (CEO of 3 Tree Tech) reveal why outdated job descriptions and static spreadsheets are sabotaging your security team's success.
The hidden problems killing your team effectiveness:
• Leaders manage complex teams with tools that can't capture real-time role changes or skill utilization
• Employees burn out doing work outside their job descriptions
• Strategic plans and budgets are built on incomplete or inaccurate information • Generic job postings create the "square peg, round hole" hiring problem
• Retention suffers when skills and roles don't alignCyberSN's workforce risk management platform changes the game by providing:
• Dynamic capability mapping—see how each capability is staffed and identify gaps
• Role realignment insights to match employees with work that fits their strengths
• Accurate job descriptions based on actual needs, not outdated templates
• Employee engagement data for better career planning and retention
• Data-backed insights that strengthen budget requestsThe #business impact?
Improved retention, stronger budgets, reduced burnout, and teams that can proactively adapt to changing priorities. When you truly understand your #workforce, you can transform cybersecurity from a reactive function into a strategic force.📺 Watch the video: https://youtu.be/TIIwtawhGFE
➤ Learn more about CyberSN: https://itspm.ag/cybersn-476941
✦ Catch more stories from CyberSN: https://www.itspmagazine.com/directory/cybersn
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #TalentManagement #WorkforceRisk #CyberHiring #BlackHatUSA #BHUSA25 #SecurityTeams #CyberCareers #TeamBuilding
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
#Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this transformative Brand Story conversation thanks to our friends at CyberSN 🙏
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
The cybersecurity #talentgap isn't just about finding people—it's about understanding who you have and what you actually need.
At #BlackHat2025, Deidre Diamond (CEO of #CyberSN) and Carraig Stanwyck (CEO of 3 Tree Tech) reveal why outdated job descriptions and static spreadsheets are sabotaging your security team's success.
The hidden problems killing your team effectiveness:
• Leaders manage complex teams with tools that can't capture real-time role changes or skill utilization
• Employees burn out doing work outside their job descriptions
• Strategic plans and budgets are built on incomplete or inaccurate information • Generic job postings create the "square peg, round hole" hiring problem
• Retention suffers when skills and roles don't alignCyberSN's workforce risk management platform changes the game by providing:
• Dynamic capability mapping—see how each capability is staffed and identify gaps
• Role realignment insights to match employees with work that fits their strengths
• Accurate job descriptions based on actual needs, not outdated templates
• Employee engagement data for better career planning and retention
• Data-backed insights that strengthen budget requestsThe #business impact?
Improved retention, stronger budgets, reduced burnout, and teams that can proactively adapt to changing priorities. When you truly understand your #workforce, you can transform cybersecurity from a reactive function into a strategic force.📺 Watch the video: https://youtu.be/TIIwtawhGFE
➤ Learn more about CyberSN: https://itspm.ag/cybersn-476941
✦ Catch more stories from CyberSN: https://www.itspmagazine.com/directory/cybersn
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #TalentManagement #WorkforceRisk #CyberHiring #BlackHatUSA #BHUSA25 #SecurityTeams #CyberCareers #TeamBuilding
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
"Data Kidnapping: Because File Encryption Is So 2020" 🫢
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this eye-opening Brand Story conversation thanks to our friends at Zscaler 🙏
#Ransomware has evolved. Attackers no longer need to encrypt your data—they're stealing it and threatening public exposure unless you pay.
At #BlackHat2025, Brett Stone-Gross from #Zscaler reveals how this shift changes everything about defense strategies.
The new reality organizations face:
• Stolen data moves slowly enough to avoid alerts—or quickly enough to overwhelm teams
• File transfer tools and other apps left exposed to the internet create easy entry points
• Advanced groups target single victims for multimillion-dollar payouts based on stolen data value
• The U.S. accounts for ~50% of ransomware incidents, making American companies prime targets
• Legacy systems in #healthcare, #manufacturing, and oil & gas amplify risksZscaler's #zerotrust approach tackles these challenges by:
• Eliminating internet-facing vulnerabilities—hiding applications from public view
• Advanced #threatprevention that blocks exploits before escalation
• Segmentation that prevents lateral movement from compromised accounts
• #DLP that detects and stops unauthorized data transfers
• Continuous monitoring that catches privilege escalation attemptsThe business impact?
Reduced attack surface, faster threat containment, lower risk of repeated incidents, and better security #ROI.When attackers can't see your applications, they can't exploit them.
➤ Learn more about Zscaler: https://itspm.ag/zscaler-327152
✦ Catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscaler
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #Ransomware #ZeroTrust #DataProtection #BlackHatUSA #BHUSA25 #ThreatIntelligence #DLP #CloudSecurity #DataKidnapping #infosec #infosecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
"Data Kidnapping: Because File Encryption Is So 2020" 🫢
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this eye-opening Brand Story conversation thanks to our friends at Zscaler 🙏
#Ransomware has evolved. Attackers no longer need to encrypt your data—they're stealing it and threatening public exposure unless you pay.
At #BlackHat2025, Brett Stone-Gross from #Zscaler reveals how this shift changes everything about defense strategies.
The new reality organizations face:
• Stolen data moves slowly enough to avoid alerts—or quickly enough to overwhelm teams
• File transfer tools and other apps left exposed to the internet create easy entry points
• Advanced groups target single victims for multimillion-dollar payouts based on stolen data value
• The U.S. accounts for ~50% of ransomware incidents, making American companies prime targets
• Legacy systems in #healthcare, #manufacturing, and oil & gas amplify risksZscaler's #zerotrust approach tackles these challenges by:
• Eliminating internet-facing vulnerabilities—hiding applications from public view
• Advanced #threatprevention that blocks exploits before escalation
• Segmentation that prevents lateral movement from compromised accounts
• #DLP that detects and stops unauthorized data transfers
• Continuous monitoring that catches privilege escalation attemptsThe business impact?
Reduced attack surface, faster threat containment, lower risk of repeated incidents, and better security #ROI.When attackers can't see your applications, they can't exploit them.
➤ Learn more about Zscaler: https://itspm.ag/zscaler-327152
✦ Catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscaler
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #Ransomware #ZeroTrust #DataProtection #BlackHatUSA #BHUSA25 #ThreatIntelligence #DLP #CloudSecurity #DataKidnapping #infosec #infosecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
"Data Kidnapping: Because File Encryption Is So 2020" 🫢
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this eye-opening Brand Story conversation thanks to our friends at Zscaler 🙏
#Ransomware has evolved. Attackers no longer need to encrypt your data—they're stealing it and threatening public exposure unless you pay.
At #BlackHat2025, Brett Stone-Gross from #Zscaler reveals how this shift changes everything about defense strategies.
The new reality organizations face:
• Stolen data moves slowly enough to avoid alerts—or quickly enough to overwhelm teams
• File transfer tools and other apps left exposed to the internet create easy entry points
• Advanced groups target single victims for multimillion-dollar payouts based on stolen data value
• The U.S. accounts for ~50% of ransomware incidents, making American companies prime targets
• Legacy systems in #healthcare, #manufacturing, and oil & gas amplify risksZscaler's #zerotrust approach tackles these challenges by:
• Eliminating internet-facing vulnerabilities—hiding applications from public view
• Advanced #threatprevention that blocks exploits before escalation
• Segmentation that prevents lateral movement from compromised accounts
• #DLP that detects and stops unauthorized data transfers
• Continuous monitoring that catches privilege escalation attemptsThe business impact?
Reduced attack surface, faster threat containment, lower risk of repeated incidents, and better security #ROI.When attackers can't see your applications, they can't exploit them.
➤ Learn more about Zscaler: https://itspm.ag/zscaler-327152
✦ Catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscaler
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #Ransomware #ZeroTrust #DataProtection #BlackHatUSA #BHUSA25 #ThreatIntelligence #DLP #CloudSecurity #DataKidnapping #infosec #infosecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
"Data Kidnapping: Because File Encryption Is So 2020" 🫢
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this eye-opening Brand Story conversation thanks to our friends at Zscaler 🙏
#Ransomware has evolved. Attackers no longer need to encrypt your data—they're stealing it and threatening public exposure unless you pay.
At #BlackHat2025, Brett Stone-Gross from #Zscaler reveals how this shift changes everything about defense strategies.
The new reality organizations face:
• Stolen data moves slowly enough to avoid alerts—or quickly enough to overwhelm teams
• File transfer tools and other apps left exposed to the internet create easy entry points
• Advanced groups target single victims for multimillion-dollar payouts based on stolen data value
• The U.S. accounts for ~50% of ransomware incidents, making American companies prime targets
• Legacy systems in #healthcare, #manufacturing, and oil & gas amplify risksZscaler's #zerotrust approach tackles these challenges by:
• Eliminating internet-facing vulnerabilities—hiding applications from public view
• Advanced #threatprevention that blocks exploits before escalation
• Segmentation that prevents lateral movement from compromised accounts
• #DLP that detects and stops unauthorized data transfers
• Continuous monitoring that catches privilege escalation attemptsThe business impact?
Reduced attack surface, faster threat containment, lower risk of repeated incidents, and better security #ROI.When attackers can't see your applications, they can't exploit them.
➤ Learn more about Zscaler: https://itspm.ag/zscaler-327152
✦ Catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscaler
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #Ransomware #ZeroTrust #DataProtection #BlackHatUSA #BHUSA25 #ThreatIntelligence #DLP #CloudSecurity #DataKidnapping #infosec #infosecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
"Data Kidnapping: Because File Encryption Is So 2020" 🫢
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this eye-opening Brand Story conversation thanks to our friends at Zscaler 🙏
#Ransomware has evolved. Attackers no longer need to encrypt your data—they're stealing it and threatening public exposure unless you pay.
At #BlackHat2025, Brett Stone-Gross from #Zscaler reveals how this shift changes everything about defense strategies.
The new reality organizations face:
• Stolen data moves slowly enough to avoid alerts—or quickly enough to overwhelm teams
• File transfer tools and other apps left exposed to the internet create easy entry points
• Advanced groups target single victims for multimillion-dollar payouts based on stolen data value
• The U.S. accounts for ~50% of ransomware incidents, making American companies prime targets
• Legacy systems in #healthcare, #manufacturing, and oil & gas amplify risksZscaler's #zerotrust approach tackles these challenges by:
• Eliminating internet-facing vulnerabilities—hiding applications from public view
• Advanced #threatprevention that blocks exploits before escalation
• Segmentation that prevents lateral movement from compromised accounts
• #DLP that detects and stops unauthorized data transfers
• Continuous monitoring that catches privilege escalation attemptsThe business impact?
Reduced attack surface, faster threat containment, lower risk of repeated incidents, and better security #ROI.When attackers can't see your applications, they can't exploit them.
➤ Learn more about Zscaler: https://itspm.ag/zscaler-327152
✦ Catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscaler
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #Ransomware #ZeroTrust #DataProtection #BlackHatUSA #BHUSA25 #ThreatIntelligence #DLP #CloudSecurity #DataKidnapping #infosec #infosecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏
Your Business Apps Are Bringing Friends You Didn't Invite
Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.
At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.
The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:
• Detect malware, tampering, and embedded secrets
• Identify #vulnerabilities and insecure practices
• Uncover undocumented network connections
• Flag #compliance risks from restricted regions
This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.
Real-world applications:
• Procurement: Auto-scan all software before deployment
• Version Monitoring: Detect unexpected behavior changes between releases
• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems
• Risk Management: Assess COTS software as part of ongoing vendor reviews
With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.
📺 Watch the video: https://youtu.be/pU9bHYFND7c
➤ Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57b
✦ Catch more stories from #ReversingLabs: https://www.itspmagazine.com/directory/reversinglabs
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏
Your Business Apps Are Bringing Friends You Didn't Invite
Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.
At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.
The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:
• Detect malware, tampering, and embedded secrets
• Identify #vulnerabilities and insecure practices
• Uncover undocumented network connections
• Flag #compliance risks from restricted regions
This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.
Real-world applications:
• Procurement: Auto-scan all software before deployment
• Version Monitoring: Detect unexpected behavior changes between releases
• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems
• Risk Management: Assess COTS software as part of ongoing vendor reviews
With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.
📺 Watch the video: https://youtu.be/pU9bHYFND7c
➤ Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57b
✦ Catch more stories from #ReversingLabs: https://www.itspmagazine.com/directory/reversinglabs
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏
Your Business Apps Are Bringing Friends You Didn't Invite
Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.
At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.
The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:
• Detect malware, tampering, and embedded secrets
• Identify #vulnerabilities and insecure practices
• Uncover undocumented network connections
• Flag #compliance risks from restricted regions
This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.
Real-world applications:
• Procurement: Auto-scan all software before deployment
• Version Monitoring: Detect unexpected behavior changes between releases
• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems
• Risk Management: Assess COTS software as part of ongoing vendor reviews
With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.
📺 Watch the video: https://youtu.be/pU9bHYFND7c
➤ Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57b
✦ Catch more stories from #ReversingLabs: https://www.itspmagazine.com/directory/reversinglabs
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏
Your Business Apps Are Bringing Friends You Didn't Invite
Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.
At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.
The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:
• Detect malware, tampering, and embedded secrets
• Identify #vulnerabilities and insecure practices
• Uncover undocumented network connections
• Flag #compliance risks from restricted regions
This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.
Real-world applications:
• Procurement: Auto-scan all software before deployment
• Version Monitoring: Detect unexpected behavior changes between releases
• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems
• Risk Management: Assess COTS software as part of ongoing vendor reviews
With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.
📺 Watch the video: https://youtu.be/pU9bHYFND7c
➤ Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57b
✦ Catch more stories from #ReversingLabs: https://www.itspmagazine.com/directory/reversinglabs
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏
Your Business Apps Are Bringing Friends You Didn't Invite
Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.
At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.
The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:
• Detect malware, tampering, and embedded secrets
• Identify #vulnerabilities and insecure practices
• Uncover undocumented network connections
• Flag #compliance risks from restricted regions
This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.
Real-world applications:
• Procurement: Auto-scan all software before deployment
• Version Monitoring: Detect unexpected behavior changes between releases
• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems
• Risk Management: Assess COTS software as part of ongoing vendor reviews
With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.
📺 Watch the video: https://youtu.be/pU9bHYFND7c
➤ Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57b
✦ Catch more stories from #ReversingLabs: https://www.itspmagazine.com/directory/reversinglabs
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and me, to get this content fresh as it drops!
First up, we're thrilled to share this critical conversation thanks to our friends at Akamai Technologies 🙏
AI bots are rewriting the buyer's journey... sometimes without you knowing it. How can you keep your customers and your brand in the loop?
AI is changing how companies reach customers, but it's also opening new avenues for bots to steal content, bypass your funnel, and even manipulate your brand's recommendations.
In this Black Hat USA 2025 conversation with Rupesh Chokshi, we look at real-world examples and solutions to protect business value while embracing innovation.
📺 Watch the video: https://lnkd.in/e8TAtegH
🎧 Listen to the podcast: https://lnkd.in/eHt5Rccp
📖 Read the blog: https://lnkd.in/exSnjzDA
➤ Learn more about Akamai Technologies: https://lnkd.in/g2FzJVPb
✦ Catch more stories from Akamai: https://lnkd.in/ghTjEAZE
🎪 Follow all of our #BHUSA 2025 coverage: https://lnkd.in/gQ4-g3Ab
#AI #Cybersecurity #BrandTrust #Innovation #BusinessGrowth #tech #api #BlackHatUSA #BHUSA25 #BrandProtection #AIBots #DigitalMarketing #blackhat2025 -
🎯 NOW PUBLISHING: On-Location Coverage from Black Hat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're proud to share this insightful Brand Story conversation thanks to our friends at ThreatLocker 😬
Simplifying #CyberSecurity Without Sacrificing Control
At #BlackHat2025, Danny Jenkins, CEO of #ThreatLocker, proves that effective cybersecurity doesn't have to be overly complex. The key? Security should be simple enough to implement quickly while still addressing evolving organizational needs.
Jenkins shares how ThreatLocker has moved beyond "magic" solutions to deliver tangible results—tools that block threats by default, simplify approvals, and make exceptions easy to manage. With over 54,000 organizations worldwide trusting their platform, they're showing that security doesn't have to slow business down.
A standout feature: ThreatLocker's Defense Against Configurations (#DAC) module performs 170 daily checks on every endpoint, aligning with #NIST and #FedRAMP frameworks. It doesn't just detect misconfigurations—it explains why they matter and how to fix them. Jenkins even admits it revealed gaps in ThreatLocker's own environment, fixed in minutes!
Plus, learn how their recent #FedRAMP authorization validates both product and company security maturity, benefiting federal agencies and commercial clients alike.
📺 Watch the video: https://youtu.be/uYIAEc_ErXo
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/simplifying-security-without-sacrificing-control-a-threatlocker-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-danny-jenkins
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #ZeroTrust #SecuritySimplicity #FedRAMP #Compliance #BlackHatUSA #BHUSA25 #EndpointSecurity #NIST #ThreatPrevention
-
What's in the news this #weekend? This is! 😉
The #AgenticAI Myth in #Cybersecurity and the #Humanity We Risk When We Stop Deciding for Ourselves
Reflections from #BlackHat USA 2025 on the Latest #Tech Salvation Narrative
🤖 What happens to a society that delegates its judgment to machines?
Walking Black Hat this year, I was struck not by the #technology itself, but by the #mythology we're building around it. Agentic #AI promises to think for us, decide for us, act for us. The #marketing speaks of liberation from human fallibility.
But here's what the ancient Greeks understood that we seem to have forgotten: every artificial creation carries within it the seeds of its own limitations—and ours.
We're not just automating workflows. We're reshaping the fundamental social structures that define human competence and authority. When we delegate judgment itself to artificial agents, we risk creating social systems where human thinking becomes an anomaly rather than the norm.
E.M. Forster saw this coming in 1909. In "The Machine Stops," humanity becomes so dependent on automated systems that when the machine finally breaks down, civilization collapses because no one remembers how to function without it.
The question isn't whether these artificial agents can replace human decision-making—it's whether we want to live in a society where they do.
👉 Read my full article below and please share your opinions in the comments!
Are we evolving our humanity or automating it away? What's your take?
But wait—there's more. My next #BlackHat2025 piece is going to tackle something that's been eating at me for years: the absurd theater of #cybersecuritymarketing. The superhero costumes, the merch, the promises, the puppies, the cappuccino -- wait, that's actually ok! 😬 -- and the lies told with such confidence that you'd think #CISOs were born yesterday.
Spoiler alert: they weren't. And they're not buying it. 🤔
💌 Want these insights delivered as they're published? Subscribe to my "Musing On Society and Technology" newsletter for deeper reflections on what it means to be human in our hybrid analog-digital world.
https://www.linkedin.com/newsletters/musing-on-society-technology-7079849705156870144/
You don't want to miss what's coming next. 🎯
ITSPmagazine Sean Martin, CISSP
-
🔔 Hear ye, hear ye!
I hereby declare the official beginning of ITSPmagazine’s Black Hat USA 2025 coverage!Yes, we’re back — and yes, we’re doing it in style. Interviews, briefings, and a pre-show webinar to kick it all off… because why wait until Vegas?
💥 With hashtag#AI everywhere, we wanted to find out what else is new at hashtag#BlackHatUSA 2025. From drone hacking to startup buzz, here’s what we learned in our annual “Chats on the Road to Black Hat” with the show’s GM, Steve Wylie.
This year’s themes? Not just AI — but community, growth, and the evolving edge where cybersecurity meets business. Sean Martin, CISSP and I sat down with Steve to get the inside scoop.
🎧 Listen or watch the full convo:
📺 https://www.youtube.com/watch?v=3O78xhYs4ro🔮 And don’t miss our live webinar — “What’s Heating Up Before Black Hat 2025” — where we’ll explore the top trends set to shake up this year’s hacker conference. You’re invited:
📅 https://www.crowdcast.io/c/whats-heating-up-before-black-hat-2025-place-your-bet-on-the-top-trends-set-to-shake-up-this-years-hacker-conference🚨 A few briefing spots are still available for on-location coverage in Vegas — so if you want to be part of the story, now’s the time:
🎪 Full coverage: https://www.itspmagazine.com/black-hat-usa-2025-hacker-summer-camp-2025-cybersecurity-event-coverage-in-las-vegasHuge thanks to our sponsors — go check them out:
• ThreatLocker: https://lnkd.in/gkbteAp9
• BLACKCLOAK: https://itspm.ag/itspbcweb
• Akamai Technologies: https://lnkd.in/g2FzJVPb
• Dropzone AI: https://lnkd.in/e_689C_8
• Stellar Cyber: https://lnkd.in/eWTBK7v2#BlackHat2025 #BHUSA25 #CyberSecurity #AI #DroneHacking #hacking #infosec #defcon #BH #infosecurity #tech #cybersecurity #technology hashtag#StartupZone #Conference #Webinar #Infosec #ITSPmagazine
-
SophosAI at Black Hat USA ’25: Anomaly detection betrayed us, so we gave it a new job – Source: news.sophos.com https://ciso2ciso.com/sophosai-at-black-hat-usa-25-anomaly-detection-betrayed-us-so-we-gave-it-a-new-job-source-news-sophos-com/ #rssfeedpostgeneratorecho #CyberSecurityNews #anomalydetection #ThreatResearch #nakedsecurity #nakedsecurity #blackhat2025 #SophosXOps #FEATURED #SophosAI #featured #LLM
-
A couple more news from #InfosecurityEurope25
Post Event Recordings On ITSPmagazine🎙️ These Aren’t Soft Skills — They’re Human Skills
A post–Infosecurity Europe 2025 conversation with Rob Black and Anthony D'AltonYes, Infosecurity Europe 2025 is behind us, but the most important conversations are still unfolding — like this one.
I (Marco Ciappelli) reconnected with Rob Black (yeah, I kicked Sean Martin, CISSP out again… temporarily 😄) and welcomed Anthony D’Alton to dive into something we all know is important but rarely define properly: so-called soft skills — or as we prefer to call them… human skills.
From communication and trust to team resilience and real-world training, this conversation is a practical look at what truly makes cybersecurity teams work — and why these “intangibles” aren’t soft at all.
🎥 Watch the conversation:
👉 https://youtu.be/iczQBFabLno🎧 Prefer audio? Listen to the podcast:
👉 https://eventcoveragepodcast.com/episodes/these-arent-soft-skills-theyre-human-skills-a-postinfosecurity-europe-2025-conversation-with-rob-black-and-anthony-dalton📚 See all the Infosecurity Europe 2025 coverage:
👉 https://www.itspmagazine.com/infosec25✅ Next stop: Black Hat USA 2025 – Las Vegas
If your company would like to join us for an On Location Brand Story or Editorial Conversation at Black Hat USA — now is the time to book:👉 Full Sponsorship
🔗 Book here: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings👉 On Location Briefing
🔗 Book here: https://www.itspmagazine.com/event-coverage-briefings#Cybersecurity #InfosecurityEurope2025 #HumanSkills #SoftSkills #CyberResilience #SecurityLeadership #StorytellingInCyber #ITSPmagazine #MarcoCiappelli #RobBlack #AnthonyDalton #OnLocation #IncidentResponse #CommunicationSkills #Teamwork #BlackHat2025 #Sponsorship #MediaPartnerships #blackhat
-
A couple more news from #InfosecurityEurope25
Post Event Recordings On ITSPmagazine🎙️ These Aren’t Soft Skills — They’re Human Skills
A post–Infosecurity Europe 2025 conversation with Rob Black and Anthony D'AltonYes, Infosecurity Europe 2025 is behind us, but the most important conversations are still unfolding — like this one.
I (Marco Ciappelli) reconnected with Rob Black (yeah, I kicked Sean Martin, CISSP out again… temporarily 😄) and welcomed Anthony D’Alton to dive into something we all know is important but rarely define properly: so-called soft skills — or as we prefer to call them… human skills.
From communication and trust to team resilience and real-world training, this conversation is a practical look at what truly makes cybersecurity teams work — and why these “intangibles” aren’t soft at all.
🎥 Watch the conversation:
👉 https://youtu.be/iczQBFabLno🎧 Prefer audio? Listen to the podcast:
👉 https://eventcoveragepodcast.com/episodes/these-arent-soft-skills-theyre-human-skills-a-postinfosecurity-europe-2025-conversation-with-rob-black-and-anthony-dalton📚 See all the Infosecurity Europe 2025 coverage:
👉 https://www.itspmagazine.com/infosec25✅ Next stop: Black Hat USA 2025 – Las Vegas
If your company would like to join us for an On Location Brand Story or Editorial Conversation at Black Hat USA — now is the time to book:👉 Full Sponsorship
🔗 Book here: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings👉 On Location Briefing
🔗 Book here: https://www.itspmagazine.com/event-coverage-briefings#Cybersecurity #InfosecurityEurope2025 #HumanSkills #SoftSkills #CyberResilience #SecurityLeadership #StorytellingInCyber #ITSPmagazine #MarcoCiappelli #RobBlack #AnthonyDalton #OnLocation #IncidentResponse #CommunicationSkills #Teamwork #BlackHat2025 #Sponsorship #MediaPartnerships #blackhat
-
A couple more news from #InfosecurityEurope25
Post Event Recordings On ITSPmagazine🎙️ These Aren’t Soft Skills — They’re Human Skills
A post–Infosecurity Europe 2025 conversation with Rob Black and Anthony D'AltonYes, Infosecurity Europe 2025 is behind us, but the most important conversations are still unfolding — like this one.
I (Marco Ciappelli) reconnected with Rob Black (yeah, I kicked Sean Martin, CISSP out again… temporarily 😄) and welcomed Anthony D’Alton to dive into something we all know is important but rarely define properly: so-called soft skills — or as we prefer to call them… human skills.
From communication and trust to team resilience and real-world training, this conversation is a practical look at what truly makes cybersecurity teams work — and why these “intangibles” aren’t soft at all.
🎥 Watch the conversation:
👉 https://youtu.be/iczQBFabLno🎧 Prefer audio? Listen to the podcast:
👉 https://eventcoveragepodcast.com/episodes/these-arent-soft-skills-theyre-human-skills-a-postinfosecurity-europe-2025-conversation-with-rob-black-and-anthony-dalton📚 See all the Infosecurity Europe 2025 coverage:
👉 https://www.itspmagazine.com/infosec25✅ Next stop: Black Hat USA 2025 – Las Vegas
If your company would like to join us for an On Location Brand Story or Editorial Conversation at Black Hat USA — now is the time to book:👉 Full Sponsorship
🔗 Book here: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings👉 On Location Briefing
🔗 Book here: https://www.itspmagazine.com/event-coverage-briefings#Cybersecurity #InfosecurityEurope2025 #HumanSkills #SoftSkills #CyberResilience #SecurityLeadership #StorytellingInCyber #ITSPmagazine #MarcoCiappelli #RobBlack #AnthonyDalton #OnLocation #IncidentResponse #CommunicationSkills #Teamwork #BlackHat2025 #Sponsorship #MediaPartnerships #blackhat
-
A couple more news from #InfosecurityEurope25
Post Event Recordings On ITSPmagazine🎙️ These Aren’t Soft Skills — They’re Human Skills
A post–Infosecurity Europe 2025 conversation with Rob Black and Anthony D'AltonYes, Infosecurity Europe 2025 is behind us, but the most important conversations are still unfolding — like this one.
I (Marco Ciappelli) reconnected with Rob Black (yeah, I kicked Sean Martin, CISSP out again… temporarily 😄) and welcomed Anthony D’Alton to dive into something we all know is important but rarely define properly: so-called soft skills — or as we prefer to call them… human skills.
From communication and trust to team resilience and real-world training, this conversation is a practical look at what truly makes cybersecurity teams work — and why these “intangibles” aren’t soft at all.
🎥 Watch the conversation:
👉 https://youtu.be/iczQBFabLno🎧 Prefer audio? Listen to the podcast:
👉 https://eventcoveragepodcast.com/episodes/these-arent-soft-skills-theyre-human-skills-a-postinfosecurity-europe-2025-conversation-with-rob-black-and-anthony-dalton📚 See all the Infosecurity Europe 2025 coverage:
👉 https://www.itspmagazine.com/infosec25✅ Next stop: Black Hat USA 2025 – Las Vegas
If your company would like to join us for an On Location Brand Story or Editorial Conversation at Black Hat USA — now is the time to book:👉 Full Sponsorship
🔗 Book here: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings👉 On Location Briefing
🔗 Book here: https://www.itspmagazine.com/event-coverage-briefings#Cybersecurity #InfosecurityEurope2025 #HumanSkills #SoftSkills #CyberResilience #SecurityLeadership #StorytellingInCyber #ITSPmagazine #MarcoCiappelli #RobBlack #AnthonyDalton #OnLocation #IncidentResponse #CommunicationSkills #Teamwork #BlackHat2025 #Sponsorship #MediaPartnerships #blackhat
-
A couple more news from #InfosecurityEurope25
Post Event Recordings On ITSPmagazine🎙️ These Aren’t Soft Skills — They’re Human Skills
A post–Infosecurity Europe 2025 conversation with Rob Black and Anthony D'AltonYes, Infosecurity Europe 2025 is behind us, but the most important conversations are still unfolding — like this one.
I (Marco Ciappelli) reconnected with Rob Black (yeah, I kicked Sean Martin, CISSP out again… temporarily 😄) and welcomed Anthony D’Alton to dive into something we all know is important but rarely define properly: so-called soft skills — or as we prefer to call them… human skills.
From communication and trust to team resilience and real-world training, this conversation is a practical look at what truly makes cybersecurity teams work — and why these “intangibles” aren’t soft at all.
🎥 Watch the conversation:
👉 https://youtu.be/iczQBFabLno🎧 Prefer audio? Listen to the podcast:
👉 https://eventcoveragepodcast.com/episodes/these-arent-soft-skills-theyre-human-skills-a-postinfosecurity-europe-2025-conversation-with-rob-black-and-anthony-dalton📚 See all the Infosecurity Europe 2025 coverage:
👉 https://www.itspmagazine.com/infosec25✅ Next stop: Black Hat USA 2025 – Las Vegas
If your company would like to join us for an On Location Brand Story or Editorial Conversation at Black Hat USA — now is the time to book:👉 Full Sponsorship
🔗 Book here: https://www.itspmagazine.com/event-coverage-sponsorship-and-briefings👉 On Location Briefing
🔗 Book here: https://www.itspmagazine.com/event-coverage-briefings#Cybersecurity #InfosecurityEurope2025 #HumanSkills #SoftSkills #CyberResilience #SecurityLeadership #StorytellingInCyber #ITSPmagazine #MarcoCiappelli #RobBlack #AnthonyDalton #OnLocation #IncidentResponse #CommunicationSkills #Teamwork #BlackHat2025 #Sponsorship #MediaPartnerships #blackhat