#blackhatusa — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #blackhatusa, aggregated by home.social.
-
82% of enterprises are running AI agents they don't know about.
That number came out of #RSAC Conference 2026 — and it wasn't the most alarming stat on the table.
Sean Martin sat back down with Itamar Apelblat, Co-Founder and CEO of Token Security, to unpack what he heard walking the show floor and what the CSA data now makes impossible to ignore: 65% of organizations have already had an AI agent-related incident in the last twelve months. 82% found agents in their environment that nobody authorized. Only 21% have any formal process to retire an agent when it's done.
Discovery alone is not governance. Intent-based enforcement is. That's where this conversation lands — and it's worth your time.
A huge thank you to the team at Token Security for joining Sean Martin and Marco Ciappelli on this journey — both on the floor at #RSAC2026 and in the recap. We loved sharing your story and we're looking forward to many more conversations ahead. 🙌
📍 Where are we headed next? Glad you asked: Infosecurity Europe and Black Hat USA — see you there.
🎙️ Recap: https://youtu.be/ZeI5bSbQ070
🎙️ On Location: https://youtu.be/uWjCQC3LnaY
🌐 RSAC Coverage: https://www.itspmagazine.com/rsac
🌐 Next Coverages: https://www.itspmagazine.com/technology-and-cybersecurity-conference-coverage#TokenSecurity #AIAgents #AgentSecurity #CyberSecurity #CISO #CloudSecurity #AIGovernance #IdentitySecurity #CSAReport #InfoSec #RSAC2026 #InfosecurityEurope #BlackHatUSA #CyberSecurityPodcast
-
After #RSAC Conference 2026, the vendors were louder, the booths were bigger, and the AI claims were everywhere.
So Sean Martin & Marco Ciappelli reconnected with Michael Parisi, Chief Growth Officer at Steel Patriot Partners, to ask what was actually happening beneath all that noise — and where the conversations that actually matter were taking place.
Mike's read from the floor is simple: the "fog of more" is winning. Not because the technology is bad, but because every vendor is saying nearly the same thing and CISOs are running out of ways to tell them apart.
The real conversations? Not in the keynote halls. They're happening in hallways, at dinners, in closed-door rooms where buyers can finally speak honestly.
A huge thank you to the team at Steel Patriot Partners for joining us on this journey — both on the floor at #RSAC2026 and in the recap. We loved sharing your story and we're looking forward to many more conversations ahead. 🙌
📍 Where are we headed next? Glad you asked: Infosecurity Europe and Black Hat USA — see you there.
🎙️ Recap: https://lnkd.in/ggGQtz2t
🎙️ On Location: https://lnkd.in/gYRuPaPe
🌐 RSAC Coverage: https://lnkd.in/gW-6ZtH
🌐 Next Coverages: https://lnkd.in/gaGVUjgg#SteelPatriotPartners #CISO #CyberSecurity #RSACConference #FogOfMore #SecurityStrategy #VendorNoise #InfoSec #GRC #CyberSecurityLeadership #RSAC2026 #InfosecurityEurope #BlackHatUSA #CyberSecurityPodcast
-
After #RSAC Conference 2026, the vendors were louder, the booths were bigger, and the AI claims were everywhere.
So Sean Martin & Marco Ciappelli reconnected with Michael Parisi, Chief Growth Officer at Steel Patriot Partners, to ask what was actually happening beneath all that noise — and where the conversations that actually matter were taking place.
Mike's read from the floor is simple: the "fog of more" is winning. Not because the technology is bad, but because every vendor is saying nearly the same thing and CISOs are running out of ways to tell them apart.
The real conversations? Not in the keynote halls. They're happening in hallways, at dinners, in closed-door rooms where buyers can finally speak honestly.
A huge thank you to the team at Steel Patriot Partners for joining us on this journey — both on the floor at #RSAC2026 and in the recap. We loved sharing your story and we're looking forward to many more conversations ahead. 🙌
📍 Where are we headed next? Glad you asked: Infosecurity Europe and Black Hat USA — see you there.
🎙️ Recap: https://lnkd.in/ggGQtz2t
🎙️ On Location: https://lnkd.in/gYRuPaPe
🌐 RSAC Coverage: https://lnkd.in/gW-6ZtH
🌐 Next Coverages: https://lnkd.in/gaGVUjgg#SteelPatriotPartners #CISO #CyberSecurity #RSACConference #FogOfMore #SecurityStrategy #VendorNoise #InfoSec #GRC #CyberSecurityLeadership #RSAC2026 #InfosecurityEurope #BlackHatUSA #CyberSecurityPodcast
-
After #RSAC Conference 2026, the vendors were louder, the booths were bigger, and the AI claims were everywhere.
So Sean Martin & Marco Ciappelli reconnected with Michael Parisi, Chief Growth Officer at Steel Patriot Partners, to ask what was actually happening beneath all that noise — and where the conversations that actually matter were taking place.
Mike's read from the floor is simple: the "fog of more" is winning. Not because the technology is bad, but because every vendor is saying nearly the same thing and CISOs are running out of ways to tell them apart.
The real conversations? Not in the keynote halls. They're happening in hallways, at dinners, in closed-door rooms where buyers can finally speak honestly.
A huge thank you to the team at Steel Patriot Partners for joining us on this journey — both on the floor at #RSAC2026 and in the recap. We loved sharing your story and we're looking forward to many more conversations ahead. 🙌
📍 Where are we headed next? Glad you asked: Infosecurity Europe and Black Hat USA — see you there.
🎙️ Recap: https://lnkd.in/ggGQtz2t
🎙️ On Location: https://lnkd.in/gYRuPaPe
🌐 RSAC Coverage: https://lnkd.in/gW-6ZtH
🌐 Next Coverages: https://lnkd.in/gaGVUjgg#SteelPatriotPartners #CISO #CyberSecurity #RSACConference #FogOfMore #SecurityStrategy #VendorNoise #InfoSec #GRC #CyberSecurityLeadership #RSAC2026 #InfosecurityEurope #BlackHatUSA #CyberSecurityPodcast
-
🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!
Access Roulette: How to Stop Betting Your Security on Standing Privileges
This wraps up our on-location content from Las Vegas!
Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!
Our final floor conversation comes thanks to our friends at Apono 🙏
Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.
At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.
The stakes keep rising:
• Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
• Organizations discover risks during audits but lack scalable remediation
• #Business teams need rapid access while security teams battle expanding #attacksurfacesApono's Zero Standing Privilege model:
• Removes ALL permanent access by default
• Grants access dynamically based on business context
• Automatically revokes permissions when tasks complete
• Works for both human AND non-human identities
• Integrates with existing #identity providers—no rip and replaceKey capabilities:
• Context-based policy management aligned with business objectives
• Continuous discovery of identities, privileges
• Automated remediation of unnecessary privileges
• Real-time anomaly detection feeding #SOC workflows
• Scalable across centralized and decentralized environmentsThe result?
Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.📺 Watch the video: https://youtu.be/ciBsH84PVQU
➤ Learn more about Apono: https://itspm.ag/apono-1034
✦ Catch more stories from Apono: https://www.itspmagazine.com/directory/apono
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities
-
🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!
Access Roulette: How to Stop Betting Your Security on Standing Privileges
This wraps up our on-location content from Las Vegas!
Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!
Our final floor conversation comes thanks to our friends at Apono 🙏
Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.
At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.
The stakes keep rising:
• Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
• Organizations discover risks during audits but lack scalable remediation
• #Business teams need rapid access while security teams battle expanding #attacksurfacesApono's Zero Standing Privilege model:
• Removes ALL permanent access by default
• Grants access dynamically based on business context
• Automatically revokes permissions when tasks complete
• Works for both human AND non-human identities
• Integrates with existing #identity providers—no rip and replaceKey capabilities:
• Context-based policy management aligned with business objectives
• Continuous discovery of identities, privileges
• Automated remediation of unnecessary privileges
• Real-time anomaly detection feeding #SOC workflows
• Scalable across centralized and decentralized environmentsThe result?
Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.📺 Watch the video: https://youtu.be/ciBsH84PVQU
➤ Learn more about Apono: https://itspm.ag/apono-1034
✦ Catch more stories from Apono: https://www.itspmagazine.com/directory/apono
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities
-
🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!
Access Roulette: How to Stop Betting Your Security on Standing Privileges
This wraps up our on-location content from Las Vegas!
Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!
Our final floor conversation comes thanks to our friends at Apono 🙏
Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.
At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.
The stakes keep rising:
• Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
• Organizations discover risks during audits but lack scalable remediation
• #Business teams need rapid access while security teams battle expanding #attacksurfacesApono's Zero Standing Privilege model:
• Removes ALL permanent access by default
• Grants access dynamically based on business context
• Automatically revokes permissions when tasks complete
• Works for both human AND non-human identities
• Integrates with existing #identity providers—no rip and replaceKey capabilities:
• Context-based policy management aligned with business objectives
• Continuous discovery of identities, privileges
• Automated remediation of unnecessary privileges
• Real-time anomaly detection feeding #SOC workflows
• Scalable across centralized and decentralized environmentsThe result?
Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.📺 Watch the video: https://youtu.be/ciBsH84PVQU
➤ Learn more about Apono: https://itspm.ag/apono-1034
✦ Catch more stories from Apono: https://www.itspmagazine.com/directory/apono
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities
-
🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!
Access Roulette: How to Stop Betting Your Security on Standing Privileges
This wraps up our on-location content from Las Vegas!
Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!
Our final floor conversation comes thanks to our friends at Apono 🙏
Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.
At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.
The stakes keep rising:
• Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
• Organizations discover risks during audits but lack scalable remediation
• #Business teams need rapid access while security teams battle expanding #attacksurfacesApono's Zero Standing Privilege model:
• Removes ALL permanent access by default
• Grants access dynamically based on business context
• Automatically revokes permissions when tasks complete
• Works for both human AND non-human identities
• Integrates with existing #identity providers—no rip and replaceKey capabilities:
• Context-based policy management aligned with business objectives
• Continuous discovery of identities, privileges
• Automated remediation of unnecessary privileges
• Real-time anomaly detection feeding #SOC workflows
• Scalable across centralized and decentralized environmentsThe result?
Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.📺 Watch the video: https://youtu.be/ciBsH84PVQU
➤ Learn more about Apono: https://itspm.ag/apono-1034
✦ Catch more stories from Apono: https://www.itspmagazine.com/directory/apono
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities
-
🎯 FINAL POST FROM THE FLOOR: #BlackHatUSA 2025 Coverage!
Access Roulette: How to Stop Betting Your Security on Standing Privileges
This wraps up our on-location content from Las Vegas!
Next week we'll reconnect with our main event sponsors— BLACKCLOAK, Dropzone AI, Stellar Cyber, and Akamai Technologies—to bring you their post-event insights and feedback. Of course ThreatLocker's recap was already captured on the floor and published earlier today. Plus, watch for our closing reflection articles from me Marco Ciappelli and Sean Martin, CISSP!
Our final floor conversation comes thanks to our friends at Apono 🙏
Modern enterprises are gambling with security every day. Static permissions, manual approvals, and periodic audits create "privilege creep" that turns every over-privileged account into a potential breach waiting to happen.
At #BlackHat USA 2025, Ofir Stein from #Apono reveals how to break this dangerous cycle.
The stakes keep rising:
• Non-human identities (service accounts, #APIs, #AIagents) retain high-level privileges long after tasks complete
• Organizations discover risks during audits but lack scalable remediation
• #Business teams need rapid access while security teams battle expanding #attacksurfacesApono's Zero Standing Privilege model:
• Removes ALL permanent access by default
• Grants access dynamically based on business context
• Automatically revokes permissions when tasks complete
• Works for both human AND non-human identities
• Integrates with existing #identity providers—no rip and replaceKey capabilities:
• Context-based policy management aligned with business objectives
• Continuous discovery of identities, privileges
• Automated remediation of unnecessary privileges
• Real-time anomaly detection feeding #SOC workflows
• Scalable across centralized and decentralized environmentsThe result?
Engineers gain control over their access (building trust), security teams maintain tight governance, and organizations can finally stop betting their security on standing privileges.📺 Watch the video: https://youtu.be/ciBsH84PVQU
➤ Learn more about Apono: https://itspm.ag/apono-1034
✦ Catch more stories from Apono: https://www.itspmagazine.com/directory/apono
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #IdentityManagement #ZeroTrust #AccessControl #BlackHatUSA #BHUSA25 #PrivilegeManagement #IAM #SecurityAutomation #NonHumanIdentities
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 WRAPPING UP: #BlackHat USA 2025 Coverage Nearly Complete!
With nearly all our on-location content from Las Vegas now published, we're excited to share this recap story.Stay tuned for the closing reflections (Newsletter Articles and Audio version) from Marco Ciappelli and Sean Martin, CISSP coming soon!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to catch those final insights when they drop!
This is an event recap from the expo floor with our friends at ThreatLocker 🙏
#ThreatLocker Unveils Configuration Defense & Achieves #FedRAMP Status at #BlackHat2025
#Zerotrust evolved from theory to practical business solution at Black Hat 2025, as Kieran Human from ThreatLocker revealed game-changing announcements that address real-world security challenges.
The standout:
Defense Against Configuration (#DAC)—a monitoring tool that solves a critical zero trust gap. Organizations invest heavily in security but often leave systems vulnerable through poor configuration management. DAC changes this by:
• Continuously monitoring configurations and alerting to potential issues
• Mapping findings to compliance frameworks including Essential 8
• Providing weekly executive reports to ensure oversight
• Preventing the "overly permissive rules" that compromise securityThreatLocker's "denied by default, allowed by exception" approach fundamentally differs from traditional EDR solutions. With 10,000+ built-in application profiles and learning mode capabilities, deployment no longer means business disruption.
Major milestone:
FedRAMP certification opens government sector opportunities, answering strong customer demand from highly regulated environments that previously couldn't adopt their zero trust capabilities.Real impact:
One customer reported preventing THREE breaches after implementing ThreatLocker's solution—proving that properly implemented zero trust delivers measurable security improvements.The key insight? Security must enable business, not hinder it. ThreatLocker's least privilege implementation focuses on meeting business requirements with minimal necessary permissions—protecting assets without hampering productivity.
📺 Watch the video: https://youtu.be/AN5k5-aBwWc
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #BlackHatUSA #BHUSA25 #Compliance #SecurityAutomation #GovTech
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
#Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this transformative Brand Story conversation thanks to our friends at CyberSN 🙏
Cybersecurity Hiring Is Not Broken—Your Job Descriptions Are
The cybersecurity #talentgap isn't just about finding people—it's about understanding who you have and what you actually need.
At #BlackHat2025, Deidre Diamond (CEO of #CyberSN) and Carraig Stanwyck (CEO of 3 Tree Tech) reveal why outdated job descriptions and static spreadsheets are sabotaging your security team's success.
The hidden problems killing your team effectiveness:
• Leaders manage complex teams with tools that can't capture real-time role changes or skill utilization
• Employees burn out doing work outside their job descriptions
• Strategic plans and budgets are built on incomplete or inaccurate information • Generic job postings create the "square peg, round hole" hiring problem
• Retention suffers when skills and roles don't alignCyberSN's workforce risk management platform changes the game by providing:
• Dynamic capability mapping—see how each capability is staffed and identify gaps
• Role realignment insights to match employees with work that fits their strengths
• Accurate job descriptions based on actual needs, not outdated templates
• Employee engagement data for better career planning and retention
• Data-backed insights that strengthen budget requestsThe #business impact?
Improved retention, stronger budgets, reduced burnout, and teams that can proactively adapt to changing priorities. When you truly understand your #workforce, you can transform cybersecurity from a reactive function into a strategic force.📺 Watch the video: https://youtu.be/TIIwtawhGFE
➤ Learn more about CyberSN: https://itspm.ag/cybersn-476941
✦ Catch more stories from CyberSN: https://www.itspmagazine.com/directory/cybersn
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #TalentManagement #WorkforceRisk #CyberHiring #BlackHatUSA #BHUSA25 #SecurityTeams #CyberCareers #TeamBuilding
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
"Data Kidnapping: Because File Encryption Is So 2020" 🫢
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this eye-opening Brand Story conversation thanks to our friends at Zscaler 🙏
#Ransomware has evolved. Attackers no longer need to encrypt your data—they're stealing it and threatening public exposure unless you pay.
At #BlackHat2025, Brett Stone-Gross from #Zscaler reveals how this shift changes everything about defense strategies.
The new reality organizations face:
• Stolen data moves slowly enough to avoid alerts—or quickly enough to overwhelm teams
• File transfer tools and other apps left exposed to the internet create easy entry points
• Advanced groups target single victims for multimillion-dollar payouts based on stolen data value
• The U.S. accounts for ~50% of ransomware incidents, making American companies prime targets
• Legacy systems in #healthcare, #manufacturing, and oil & gas amplify risksZscaler's #zerotrust approach tackles these challenges by:
• Eliminating internet-facing vulnerabilities—hiding applications from public view
• Advanced #threatprevention that blocks exploits before escalation
• Segmentation that prevents lateral movement from compromised accounts
• #DLP that detects and stops unauthorized data transfers
• Continuous monitoring that catches privilege escalation attemptsThe business impact?
Reduced attack surface, faster threat containment, lower risk of repeated incidents, and better security #ROI.When attackers can't see your applications, they can't exploit them.
➤ Learn more about Zscaler: https://itspm.ag/zscaler-327152
✦ Catch more stories from Zscaler: https://www.itspmagazine.com/directory/zscaler
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #Ransomware #ZeroTrust #DataProtection #BlackHatUSA #BHUSA25 #ThreatIntelligence #DLP #CloudSecurity #DataKidnapping #infosec #infosecurity
-
🎉 Big week for the OpenSSF community at #BlackHatUSA + #DEFCON33!
From packed panels to big wins in the #AIxCC, our community showed what’s possible when open source security leaders, researchers, and innovators come together.
Read the full recap: https://openssf.org/blog/2025/08/14/openssf-at-black-hat-usa-2025-def-con-33-aixcc-highlights-big-wins-and-the-future-of-securing-open-source/
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
How to Automate #Cybersecurity Operations Without Coding, Crying, or Calling IT at 2 A.M.
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're delighted to share this game-changing Brand Story conversation thanks to our friends at BlinkOps 🙏
Traditional #SOAR platforms promise automation but deliver complexity—requiring extensive scripting, specialized skills, and weeks to implement new workflows. At #BlackHat2025, Mike Wayne from #BlinkOps reveals a better way.
The breakthrough: Micro agents instead of monolithic #AI. BlinkOps enables you to build small, focused #AI entities designed for specific tasks—minimizing hallucination risks while maximizing control and precision.
What makes this different:
• Describe automation goals in plain language—the system generates working automations
• Low-code/no-code accessibility lets citizen developers across HR, finance, and security build automations
• Smaller context windows = fewer AI mistakes and more predictable outcomes • Deploy as #SaaS, hybrid, or in #FedRAMP #GovCloud environments
Real-world results that matter:
• One customer saved $1.8M in 30 days automating endpoint deployments
• A triage agent processed 400 SOC alerts in 8 days with zero human intervention
• Reduced MTTR through agent-embedded workflows
• Automation extends beyond security into HR, finance, and operationsThe message is clear: Instead of replacing humans, these micro agents work alongside them—taking on repetitive tasks so your team can focus on strategic initiatives. Just blink it!
📺 Watch the video: https://youtu.be/eohOpveUkCQ
➤ Learn more about BlinkOps: https://itspm.ag/blinkops-942780
✦ Catch more stories from BlinkOps: https://www.itspmagazine.com/directory/blinkops
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SecurityAutomation #SOAR #AI #NoCode #BlackHatUSA #BHUSA25 #SOC #AutomationPlatform #MicroAgents
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're thrilled to share this critical Brand Story conversation thanks to our friends at ReversingLabs 🙏
Your Business Apps Are Bringing Friends You Didn't Invite
Every commercial software application is a complex assembly of first-party, contracted, open source, and third-party code. But when #SolarWinds, #Kaseya, and #Ivanti happened, we learned that vendor questionnaires and contractual assurances offer little protection against supply chain compromises.
At #BlackHat2025, Saša Zdjelar, Chief Trust Officer at ReversingLabs, reveals how organizations can finally verify the integrity of #software from outside vendors—without relying on blind trust.
The game-changer: Comprehensive binary analysis that deconstructs any file into its components to:
• Detect malware, tampering, and embedded secrets
• Identify #vulnerabilities and insecure practices
• Uncover undocumented network connections
• Flag #compliance risks from restricted regions
This isn't just another policy checkbox—it's a true technical control that inspects the software itself, regardless of size or complexity.
Real-world applications:
• Procurement: Auto-scan all software before deployment
• Version Monitoring: Detect unexpected behavior changes between releases
• Critical Environments: Verify integrity before software enters OT, ICS, or financial systems
• Risk Management: Assess COTS software as part of ongoing vendor reviews
With regulations like EO 14028 and the EU's #CyberResilience Act demanding transparency, the ability to technically validate every application delivers both strategic protection and measurable benefits.
📺 Watch the video: https://youtu.be/pU9bHYFND7c
➤ Learn more about ReversingLabs: https://itspm.ag/reversinglabs-v57b
✦ Catch more stories from #ReversingLabs: https://www.itspmagazine.com/directory/reversinglabs
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SupplyChainSecurity #SoftwareIntegrity #BlackHatUSA #BHUSA25 #ThirdPartyRisk #SBOM #BinaryAnalysis #Compliance #ZeroTrust
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏
How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity
Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.
The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."
Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.
Key innovations:
• Semantic knowledge graphs that map relationships across your entire security ecosystem
• Automated investigations using established kill chain methodologies
• Natural language processing that converts descriptions into executable security processes
• Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat huntingThe result?
#Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.📺 Watch the video: https://youtu.be/0GqPtPXD2ik
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity-a-black-hat-usa-2025-conference-on-location-brand-story
📖 Read the blog: https://www.itspmagazine.com/their-stories/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity
➤ Learn more about Crogl: https://itspm.ag/crogl-103909
✦ Catch more stories from Crogl: https://www.itspmagazine.com/directory/crogl🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏
How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity
Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.
The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."
Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.
Key innovations:
• Semantic knowledge graphs that map relationships across your entire security ecosystem
• Automated investigations using established kill chain methodologies
• Natural language processing that converts descriptions into executable security processes
• Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat huntingThe result?
#Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.📺 Watch the video: https://youtu.be/0GqPtPXD2ik
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity-a-black-hat-usa-2025-conference-on-location-brand-story
📖 Read the blog: https://www.itspmagazine.com/their-stories/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity
➤ Learn more about Crogl: https://itspm.ag/crogl-103909
✦ Catch more stories from Crogl: https://www.itspmagazine.com/directory/crogl🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏
How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity
Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.
The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."
Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.
Key innovations:
• Semantic knowledge graphs that map relationships across your entire security ecosystem
• Automated investigations using established kill chain methodologies
• Natural language processing that converts descriptions into executable security processes
• Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat huntingThe result?
#Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.📺 Watch the video: https://youtu.be/0GqPtPXD2ik
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity-a-black-hat-usa-2025-conference-on-location-brand-story
📖 Read the blog: https://www.itspmagazine.com/their-stories/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity
➤ Learn more about Crogl: https://itspm.ag/crogl-103909
✦ Catch more stories from Crogl: https://www.itspmagazine.com/directory/crogl🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏
How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity
Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.
The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."
Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.
Key innovations:
• Semantic knowledge graphs that map relationships across your entire security ecosystem
• Automated investigations using established kill chain methodologies
• Natural language processing that converts descriptions into executable security processes
• Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat huntingThe result?
#Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.📺 Watch the video: https://youtu.be/0GqPtPXD2ik
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity-a-black-hat-usa-2025-conference-on-location-brand-story
📖 Read the blog: https://www.itspmagazine.com/their-stories/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity
➤ Learn more about Crogl: https://itspm.ag/crogl-103909
✦ Catch more stories from Crogl: https://www.itspmagazine.com/directory/crogl🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're excited to share this transformative Brand Story conversation thanks to our friends at Crogl, Inc. 🙏
How #AI Can Help Eliminate Alert Fatigue in #Cybersecurity
Security teams drowning in alerts finally have a lifeline that doesn't compromise their data sovereignty. At #BlackHatUSA 2025, #Crogl CEO monzy merza revealed how they're solving one of cybersecurity's most persistent challenges.
The harsh reality: Analysts routinely close hundreds of alerts with a single click—not from laziness, but from sheer necessity. As Merza notes, "When you look at the history of #breaches, the signal was there. And somebody ignored it."
Traditional approaches fail because they expect analysts to become "unicorns"—experts in multiple platforms while remembering complex query languages. Crogl's solution fundamentally reimagines this relationship between human intuition and #machineautomation.
Key innovations:
• Semantic knowledge graphs that map relationships across your entire security ecosystem
• Automated investigations using established kill chain methodologies
• Natural language processing that converts descriptions into executable security processes
• Privacy-first architecture that runs air-gapped with no internet dependencies • Response times reduced from weeks to minutes for complex threat huntingThe result?
#Analysts focus on strategic #threathunting while AI handles routine investigations—all without moving, duplicating, or exposing your data.📺 Watch the video: https://youtu.be/0GqPtPXD2ik
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity-a-black-hat-usa-2025-conference-on-location-brand-story
📖 Read the blog: https://www.itspmagazine.com/their-stories/black-hat-2025-crogls-ceo-monzy-merza-explains-how-ai-can-help-eliminate-alert-fatigue-in-cybersecurity
➤ Learn more about Crogl: https://itspm.ag/crogl-103909
✦ Catch more stories from Crogl: https://www.itspmagazine.com/directory/crogl🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #AIinSecurity #AlertFatigue #ThreatHunting #BlackHatUSA #BHUSA25 #SecurityAutomation #DataPrivacy #SOC #SecurityAnalytics
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHatUSA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're honored to share this eye-opening Brand Story conversation thanks to our friends at runZero 🙏
The Often-Overlooked Truth in #Cybersecurity: Seeing the Unseen in Vulnerability Management
Most successful breaches don't happen because defenders ignored known vulnerabilities. They happen because attackers exploited assets that organizations never knew existed.
HD Moore, founder and CEO of runZero and creator of #Metasploit, reveals the uncomfortable truth: organizations routinely miss half their actual attack surface. Through decades of penetration testing high-security environments, Moore discovered that traditional discovery methods only find properly managed systems while #shadowIT, legacy hardware, and misconfigured devices remain invisible.
Key insights from our conversation:
• When using attacker-grade discovery techniques, asset counts typically DOUBLE what organizations thought they had
• The industry's CVE obsession creates false security while real attacks exploit misconfigurations and zero-days
• Unknown assets—from IoT devices to forgotten servers—bypass even sophisticated security controls
• Traditional agent-based tools can't see what attackers see
#RunZero inverts the traditional model by starting with unauthenticated discovery that mirrors how attackers actually probe networks. This reveals the true attack surface and transforms vulnerability management from reactive patching to strategic risk reduction.
📺 Watch the video: https://youtu.be/hkKJsKUugIU
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story-bM0PrkAw 📖 Read the blog: https://www.itspmagazine.com/their-stories/the-often-overlooked-truth-in-cybersecurity-seeing-the-unseen-in-vulnerability-management-a-brand-story-with-hd-moore-founder-and-ceo-of-runzero-a-black-hat-usa-2025-conference-on-location-brand-story
➤ Learn more about RunZero: https://itspm.ag/runzero-5733
✦ Catch more stories from RunZero: https://www.itspmagazine.com/directory/runzero
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #VulnerabilityManagement #AssetDiscovery #AttackSurface #BlackHatUSA #BHUSA25 #ShadowIT #SecurityVisibility #Metasploit #ZeroDay #tech #technology #cybersecurity
-
🎯 NOW PUBLISHING: On-Location Coverage from Black Hat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're proud to share this game-changing Brand Story conversation thanks to our friends at Stellar Cyber 🙏
#StellarCyber Revolutionizes #SOC Operations with Human-Augmented Autonomous Platform
Security operations centers are drowning in thousands of daily alerts while sophisticated threats demand immediate response. At Black Hat USA 2025, Subo Guha from Stellar Cyber shows how their revolutionary platform transforms this chaos into clarity.
Unlike traditional approaches that pile on more automation, Stellar Cyber recognizes that effective security requires intelligent collaboration between AI and human expertise. Their autonomous SOC concept dramatically reduces alert volume from hundreds of thousands to manageable numbers within days—not weeks.
Key innovations include:
• AI-driven auto-triage that identifies true positives among thousands of false alarms
• Natural language queries
• Advanced #identity threat detection catching physical impossibilities like logins from Portland and Moscow 30 minutes apart
• Vendor-neutral architecture supporting CrowdStrike, SentinelOne, Sophos, and more
The result?
#MSSPs report dramatic efficiency gains, analysts focus on strategic decisions instead of alert fatigue, and organizations achieve faster threat detection with smaller, more focused teams.
📺 Watch the video: https://youtu.be/N3M1fxhMryM
➤ Learn more about Stellar Cyber: https://itspm.ag/stellar-cyber--inc--357947
✦ Catch more stories from Stellar Cyber: https://www.itspmagazine.com/directory/stellarcyber
🎪 Follow all of our #BHUSA 2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #SOC #SecurityOperations #AI #ThreatDetection #BlackHatUSA #BHUSA25 #IdentitySecurity #MSSP #AlertFatigue #agenticAI #infosec #infosecuity
-
🎯 NOW PUBLISHING: On-Location Coverage from #BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and me, to get this content fresh as it drops!
First up, we're thrilled to share this critical conversation thanks to our friends at Akamai Technologies 🙏
AI bots are rewriting the buyer's journey... sometimes without you knowing it. How can you keep your customers and your brand in the loop?
AI is changing how companies reach customers, but it's also opening new avenues for bots to steal content, bypass your funnel, and even manipulate your brand's recommendations.
In this Black Hat USA 2025 conversation with Rupesh Chokshi, we look at real-world examples and solutions to protect business value while embracing innovation.
📺 Watch the video: https://lnkd.in/e8TAtegH
🎧 Listen to the podcast: https://lnkd.in/eHt5Rccp
📖 Read the blog: https://lnkd.in/exSnjzDA
➤ Learn more about Akamai Technologies: https://lnkd.in/g2FzJVPb
✦ Catch more stories from Akamai: https://lnkd.in/ghTjEAZE
🎪 Follow all of our #BHUSA 2025 coverage: https://lnkd.in/gQ4-g3Ab
#AI #Cybersecurity #BrandTrust #Innovation #BusinessGrowth #tech #api #BlackHatUSA #BHUSA25 #BrandProtection #AIBots #DigitalMarketing #blackhat2025 -
🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏
Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔
From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.
That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.
📺 Watch the video: https://lnkd.in/euaGvtX2
🎧 Listen to the podcast: https://lnkd.in/eJEKJuJ9
📖 Read the blog: https://lnkd.in/egKFnxgy➤ Learn more about #BLACKCLOAK: https://itspm.ag/itspbcweb
✦ Catch more stories from BlackCloak: https://lnkd.in/eG-c-b4x
🎪 Follow all of our #BHUSA 2025 coverage: https://lnkd.in/gQ4-g3Ab
#Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai -
🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏
Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔
From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.
That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.
📺 Watch the video: https://lnkd.in/euaGvtX2
🎧 Listen to the podcast: https://lnkd.in/eJEKJuJ9
📖 Read the blog: https://lnkd.in/egKFnxgy➤ Learn more about #BLACKCLOAK: https://itspm.ag/itspbcweb
✦ Catch more stories from BlackCloak: https://lnkd.in/eG-c-b4x
🎪 Follow all of our #BHUSA 2025 coverage: https://lnkd.in/gQ4-g3Ab
#Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai -
🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏
Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔
From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.
That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.
📺 Watch the video: https://lnkd.in/euaGvtX2
🎧 Listen to the podcast: https://lnkd.in/eJEKJuJ9
📖 Read the blog: https://lnkd.in/egKFnxgy➤ Learn more about #BLACKCLOAK: https://itspm.ag/itspbcweb
✦ Catch more stories from BlackCloak: https://lnkd.in/eG-c-b4x
🎪 Follow all of our #BHUSA 2025 coverage: https://lnkd.in/gQ4-g3Ab
#Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai -
🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏
Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔
From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.
That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.
📺 Watch the video: https://lnkd.in/euaGvtX2
🎧 Listen to the podcast: https://lnkd.in/eJEKJuJ9
📖 Read the blog: https://lnkd.in/egKFnxgy➤ Learn more about #BLACKCLOAK: https://itspm.ag/itspbcweb
✦ Catch more stories from BlackCloak: https://lnkd.in/eG-c-b4x
🎪 Follow all of our #BHUSA 2025 coverage: https://lnkd.in/gQ4-g3Ab
#Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai -
🎯 NOW PUBLISHING: On-Location Coverage from hashtag#BlackHat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
Next up, we're honored to share this eye-opening conversation thanks to our friends at BLACKCLOAK 🙏
Chris and I went pretty deep in a topic that is really dear to me: the fast-growing overlap between physical and cyber threats, and why hashtag#AI is making attacks faster, more targeted, and more personal than ever. A MUST LISTEN! 🤔
From boardroom to living room ... A compromised personal device at home can cause just as much damage as a breached server at work.
That's why our latest episode tackles the often-missed layer of corporate security—protecting executives and their families outside the office. Chris Pierson joins Marco Ciappelli to explain how combining hashtag#technology, hashtag#privacy safeguards, and concierge-level service creates an always-on shield for high-profile leaders.
📺 Watch the video: https://lnkd.in/euaGvtX2
🎧 Listen to the podcast: https://lnkd.in/eJEKJuJ9
📖 Read the blog: https://lnkd.in/egKFnxgy➤ Learn more about #BLACKCLOAK: https://itspm.ag/itspbcweb
✦ Catch more stories from BlackCloak: https://lnkd.in/eG-c-b4x
🎪 Follow all of our #BHUSA 2025 coverage: https://lnkd.in/gQ4-g3Ab
#Cybersecurity #Privacy #ExecutiveProtection #DigitalSecurity #AI #BlackHatUSA #BHUSA25 #CyberThreats #PersonalSecurity hashtag#CISO #infosec#security #infosecurity #tech#genai -
🎯 NOW PUBLISHING: On-Location Coverage from Black Hat USA 2025!
We're back in the office and excited to start sharing all the conversations we captured on location in Las Vegas with our amazing sponsors and editorial coverage!
🔔 Follow ITSPmagazine, Sean Martin, CISSP, and Marco Ciappelli to get this content fresh as it drops!
We're proud to share this insightful Brand Story conversation thanks to our friends at ThreatLocker 😬
Simplifying #CyberSecurity Without Sacrificing Control
At #BlackHat2025, Danny Jenkins, CEO of #ThreatLocker, proves that effective cybersecurity doesn't have to be overly complex. The key? Security should be simple enough to implement quickly while still addressing evolving organizational needs.
Jenkins shares how ThreatLocker has moved beyond "magic" solutions to deliver tangible results—tools that block threats by default, simplify approvals, and make exceptions easy to manage. With over 54,000 organizations worldwide trusting their platform, they're showing that security doesn't have to slow business down.
A standout feature: ThreatLocker's Defense Against Configurations (#DAC) module performs 170 daily checks on every endpoint, aligning with #NIST and #FedRAMP frameworks. It doesn't just detect misconfigurations—it explains why they matter and how to fix them. Jenkins even admits it revealed gaps in ThreatLocker's own environment, fixed in minutes!
Plus, learn how their recent #FedRAMP authorization validates both product and company security maturity, benefiting federal agencies and commercial clients alike.
📺 Watch the video: https://youtu.be/uYIAEc_ErXo
🎧 Listen to the podcast: https://brand-stories-podcast.simplecast.com/episodes/simplifying-security-without-sacrificing-control-a-threatlocker-event-coverage-of-black-hat-usa-2025-las-vegas-brand-story-with-danny-jenkins
➤ Learn more about ThreatLocker: https://itspm.ag/threatlocker-r974
✦ Catch more stories from ThreatLocker: https://www.itspmagazine.com/directory/threatlocker
🎪 Follow all of our #BHUSA2025 coverage: https://www.itspmagazine.com/bhusa25
#Cybersecurity #ZeroTrust #SecuritySimplicity #FedRAMP #Compliance #BlackHatUSA #BHUSA25 #EndpointSecurity #NIST #ThreatPrevention
-
Today is the day! Catch Nils Amiet and I at #BlackHatUSA for Hack To The Future at 10:20 AM. Find out how we exploited AI developer tools and gained write access to over a million GitHub repos, possibly yours. See everyone soon.
-
🎯 FINAL Pre-Event Interview Alert! Next Stop: Las Vegas!
This is it—our last #BlackHat USA 2025 conversation before we hit the road to Vegas (and who knows, maybe we'll broadcast from a desert pit stop along the way! 🚗)
But what a way to close out our pre-event coverage...
When Constitutional Law Meets #Cybersecurity: A Critical Conversation We All Need to Hear
What happens when we stop seeing government surveillance as a necessary evil and start recognizing it as a primary threat to privacy?
Jennifer Granick, ACLU's Surveillance and Cybersecurity Counsel, challenges us to rethink everything we assume about digital #privacy in her upcoming #BlackHatUSA 2025 keynote.
In this preview conversation with Marco Ciappelli, Jennifer makes a compelling case:
✅ The Fourth Amendment hasn't kept pace with technology
✅ Legal reform is too slow—so technologists must lead
✅ Privacy isn't just a legal problem—it's a design challenge
✅ We need a new #threatmodel that puts unchecked surveillance at the centerFrom defending hackers since #DEFCON 3 to fighting surveillance overreach at the ACLU, Jennifer brings decades of frontline experience to this critical discussion.
The key takeaway? While lawmakers debate, engineers and designers hold the power to protect civil liberties through encryption, data minimization, and privacy-first architecture.
This isn't just another privacy talk—it's a call to action for every technologist, policymaker, and privacy advocate.
🎥 Watch: https://youtu.be/dPCvsBqu6Uc
📍 Follow our complete Black Hat USA 2025 coverage: https://www.itspmagazine.com/bhusa25
See you in Vegas! 🎰 Feeling lucky, Sean Martin, CISSP?
#BlackHatUSA #Privacy #Cybersecurity #CivilLiberties #Surveillance #InfoSec #BHUSA25 #ThreatModeling #ACLU #PrivacyByDesign
-
Getting ready to do our first dry run of our #BlackHatUSA talk, Hack To The Future! https://www.youtube.com/watch?v=wBl2QGAIx1s
-
It's going to be busy at both the #AISummit and #BlackHatUSA. It would be great to catch up with everyone. In addition to the briefings, I'm also hosting the AI Track Meetup and participating in the Review Board meet and greet. Come by and say hi. See you next week!
-
🎙️ Catching Up With Ken Munro After Infosecurity Europe 2025 — Hack the Planet, One System at a Time
This is our final On Location episode from Infosecurity Europe 2025, and I couldn’t think of a better way to wrap it than with Ken Munro of Pen Test Partners — a conversation that dives into real-world #hacking: from vehicles to planes to critical infrastructure, and why tangible, hands-on security education matters more than ever.
▶️ Watch the Video: https://youtu.be/5hgs01-RzjM?si=K0b9HQnAidbRgQpa
🎧 Listen to the Podcast: https://on-location-with-sean-martin-and-marco-ciappelli.simplecast.com/episodes/catching-up-with-ken-munro-after-infosecurity-europe-2025-hacking-the-planet-one-car-one-plane-and-one-system-at-a-time
As we close the London chapter, we now go full throttle into Black Hat USA — our next stop for on-location coverage.
If your company wants to join the ITSPmagazine coverage with a sponsored podcast or executive briefing, now’s the time.
Only a few spots left.
Or DM me or Sean Martin, CISSP Martin if you want in.
#HackThePlanet #InfosecurityEurope #BlackHatUSA #Cybersecurity #PenTestPartners #OnLocation #Podcast #ITSPmagazine #SecurityLeadership #CyberAwareness #HackerMindset #DefconVibes #infosec2025
-
Is there really no way to know what the ticket prices for #blackhatusa are without giving them a registration email first? https://blackhat.informafestivals.com/usa/2025/? :thonking:
-
🎙️ Is static rule-based detection holding security teams back? In this On Location Briefing from #RSAC2025, we dive into why detection needs to evolve — and what the future could look like when it does.
🚀 New Briefing from #RSAC 2025: Fixing the Detection Disconnect — Rethinking Detection from Static Rules to Living Signals
At RSA Conference 2025, Sean Martin, CISSP caught up with Fred Wilmot (Co-Founder & CEO) and Sebastien Tricaud (Co-Founder & CTO) of Detecteam to talk about why detection can’t stay stuck in the past — and how “living signals” can offer a more dynamic, context-aware approach to threat identification.
🔐 How can teams move beyond brittle, static rules to real-time, adaptable detection strategies?
Find out how Detecteam is helping organizations move away from outdated IOCs toward purpose-built, testable detections that actually evolve as threats do.
🎙️ Watch, listen, or read the full conversation here:
👉 https://www.itspmagazine.com/their-stories/fixing-the-detection-disconnect-and-rethinking-detection-from-static-rules-to-living-signals-a-brand-story-with-fred-wilmot-from-detecteam-an-on-location-rsac-conference-2025-brand-story📌 Learn more about Detecteam’s work:
👉 https://www.itspmagazine.com/directory/detecteam🛰️ See all our RSAC 2025 coverage:
👉 https://www.itspmagazine.com/rsac25🌟 Discover more On Location Conversations, Brand Stories, and Briefings:
👉 https://www.itspmagazine.com/brand-story🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.
Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!
🎤 Looking ahead:
If your company would like to share your story with our audiences On Location, we’re gearing up for #InfosecurityEurope in June and #BlackHatUSA in August!⚡ RSAC 2025 sold out fast — we expect the same for these next events.
🎯 Reserve your full sponsorship or briefing now: https://www.itspmagazine.com/purchase-programs#cybersecurity #infosec #infosecurity #technology #tech #society #business #threatdetection #livingsignals #moderncybersecurity #detecteam
-
🎙️ In cybersecurity today, it’s not just about flashy innovation — it’s about smart integration that actually builds trust. In this On Location Briefing from #RSAC2025, we explore why connecting the dots matters more than chasing the next big thing.
🚀 New Briefing from #RSAC 2025: From Tools to Trust — Why Integration Beats Innovation Hype in Cybersecurity
At RSA Conference 2025, Sean Martin, CISSP caught up with Vivin Sathyan, Senior Technology Evangelist at ManageEngine, to discuss why integration, simplicity, and a trust-first approach are redefining effective cybersecurity programs.
🔐 Why is layering more and more tools no longer the answer?
Find out how ManageEngine is helping organizations focus on seamless security integration to drive real resilience and smarter risk management.
🎙️ Watch, listen, or read the full conversation here:
👉 https://www.itspmagazine.com/their-stories/from-tools-to-trust-why-integration-beats-innovation-hype-in-cybersecurity-a-brand-story-with-vivin-sathyan-from-manageengine-an-on-location-rsac-conference-2025-brand-story📌 Learn more about ManageEngine’s work:
👉 https://www.itspmagazine.com/directory/manageengine🛰️ See all our RSAC 2025 coverage:
👉 https://www.itspmagazine.com/rsac25🌟 Discover more On Location Conversations, Brand Stories, and Briefings:
👉 https://www.itspmagazine.com/brand-story🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.
Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!
🎤 Looking ahead:
If your company would like to share your story with our audiences On Location, we’re gearing up for #InfosecurityEurope in June and #BlackHatUSA in August!⚡ RSAC 2025 sold out fast — we expect the same for these next events.
🎯 Reserve your full sponsorship or briefing now: https://www.itspmagazine.com/purchase-programs#cybersecurity #infosec #infosecurity #technology #tech #society #business #securityintegration #trustbasedsecurity #cyberresilience #manageengine
-
🎙️ What happens when you combine the mindset of a red team with the precision of elite cybersecurity strategy? In this On Location Briefing from #RSAC2025, we find out how real-world impact is changing the game.
🚀 New Briefing from #RSAC 2025: From Red Teams to Real Impact — Bringing Artistry and Precision to Cybersecurity Programs
At RSA Conference 2025, Sean Martin, CISSP caught up with Charles Henderson, Executive Vice President of Cyber Security Services at Coalfire, to talk about the evolving role of offensive security — and why artistry, precision, and strategic thinking are becoming essential elements of the most effective cybersecurity programs.
🔐 How can organizations move beyond check-the-box testing to build truly resilient systems?
Find out how Coalfire is helping companies rethink offensive security as a critical driver of real-world cyber resilience and innovation.
🎙️ Watch, listen, or read the full conversation here:
👉 https://www.itspmagazine.com/their-stories/from-red-teams-to-real-impact-bringing-artistry-and-precision-to-cybersecurity-programs-a-brand-story-with-charles-henderson-from-coalfire-an-on-location-rsac-conference-2025-brand-story📌 Learn more about Coalfire’s work:
👉 https://www.itspmagazine.com/directory/coalfire🛰️ See all our RSAC 2025 coverage:
👉 https://www.itspmagazine.com/rsac25🌟 Discover more On Location Conversations, Brand Stories, and Briefings:
👉 https://www.itspmagazine.com/brand-story🎥🎙️ This is just one of the many incredible conversations we recorded On Location in San Francisco, as Sean Martin and Marco Ciappelli covered the event as official media partners for the 11th year in a row.
Stay tuned for more Briefings, Brand Stories, and candid conversations from RSAC 2025!
🎤 Looking ahead:
If your company would like to share your story with our audiences On Location, we’re gearing up for #InfosecurityEurope in June and #BlackHatUSA in August!⚡ RSAC 2025 sold out fast — we expect the same for these next events.
🎯 Reserve your full sponsorship or briefing now: https://www.itspmagazine.com/purchase-programs#cybersecurity #infosec #infosecurity #technology #tech #society #business #offensivesecurity #redteam #cyberresilience #coalfire