Tag: conference
-
5 key priorities for your RSAC 2026 agenda
Tags: ai, api, attack, automation, ciso, compliance, conference, cybersecurity, data, detection, framework, governance, identity, infrastructure, injection, LLM, risk, service, soc, threat, tool, trainingEnable AI adoption fast enough to stay competitive.Secure the enterprise against a threat landscape that AI itself is creating.These are not sequential problems, unfortunately; they are parallel ones. I’d argue that RSAC 2026 is your best opportunity this year as a security leader to close the knowledge gap. AI prioritised Learning Framework: RSAC can be…
-
prompted: Key Insights from the AI Security Practitioners Conference FireTail Blog
Tags: ai, api, application-security, attack, automation, conference, cybersecurity, data, defense, detection, exploit, google, infrastructure, injection, LLM, malicious, malware, monitoring, openai, risk, strategy, theft, threat, tool, training, update, vulnerability, zero-dayMar 17, 2026 – Jeremy Snyder – The State of AI Security: Moving Beyond TheoryThe biggest shift evident at the [un]prompted AI Security Practitioners Conference was the move from purely theoretical discussions about “what could go wrong” to concrete, battle-tested methodologies for “what is going wrong and how we fix it.” It’s clear that AI…
-
prompted: Key Insights from the AI Security Practitioners Conference FireTail Blog
Tags: ai, api, application-security, attack, automation, conference, cybersecurity, data, defense, detection, exploit, google, infrastructure, injection, LLM, malicious, malware, monitoring, openai, risk, strategy, theft, threat, tool, training, update, vulnerability, zero-dayMar 17, 2026 – Jeremy Snyder – The State of AI Security: Moving Beyond TheoryThe biggest shift evident at the [un]prompted AI Security Practitioners Conference was the move from purely theoretical discussions about “what could go wrong” to concrete, battle-tested methodologies for “what is going wrong and how we fix it.” It’s clear that AI…
-
Heading to RSA Conference 2026? Mark your Calendar and Meet Thales!
Tags: access, ai, application-security, attack, communications, compliance, conference, container, control, cybersecurity, data, defense, firewall, framework, GDPR, google, HIPAA, iam, ibm, injection, LLM, malicious, risk, tool, vulnerabilityHeading to RSA Conference 2026? Mark your Calendar and Meet Thales! madhav Tue, 03/17/2026 – 05:14 The countdown is on. From March 2326, the cybersecurity community will gather once again at the Moscone Center in San Francisco, and Thales will be at the heart of it. Cybersecurity Chad Couser – Director Marketing Communications Thales More…
-
BSidesCache 2025 How To Infosec Conference
Author, Creator & Presenter: Bryson Loughmiller — Founder, [Petracore](petracore.io) ________________________________________________________________ Our thanks to BSidesCache for publishing their Creators, Authors and Presenter’s outstanding BSidesCache 2025 content on the Organizations’ YouTube Channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/bsidescache-2025-how-to-infosec-conference/
-
Realm.Security Rolls Out AI-Ready Security Data for the Modern SOC Ahead of RSA Conference
Realm.Security launches Data Enrichments and Privacy Guard, injecting real-time threat context into security pipelines and automating PII redaction to keep SOC teams faster, leaner, and compliance-ready. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/realm-security-rolls-out-ai-ready-security-data-for-the-modern-soc-ahead-of-rsa-conference-2/
-
Realm.Security Rolls Out AI-Ready Security Data for the Modern SOC Ahead of RSA Conference
Realm.Security launches Data Enrichments and Privacy Guard, injecting real-time threat context into security pipelines and automating PII redaction to keep SOC teams faster, leaner, and compliance-ready. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/realm-security-rolls-out-ai-ready-security-data-for-the-modern-soc-ahead-of-rsa-conference/
-
RSAC 2026 Innovation Sandbox Glide Identity: Building a Next-Generation AI Passwordless Authentication Platform
Tags: access, ai, authentication, conference, control, cyber, identity, intelligence, network, startup, technologyCompany Profile With the rapid development of artificial intelligence technology today, identity and access control have leapt from a simple security component to the core control plane of the digital world. Against this backdrop, Glide Identity, a startup shortlisted for the 2026 RSA Conference Innovation Sandbox, stands out. The company is committed to breaking down…The…
-
RSAC Innovation Sandbox 2026 Realm Labs
Company Overview Founded in 2023, Realm Labs is headquartered in Sunnyvale, near San Jose, California[1]. The company’s founder and CEO, Saurabh Shintre, previously led AI security research at Symantec and Splunk[2]. At this year’s RSAC conference, Realm Labs secured $5 million in funding from Crosspoint Capital Partners[3]. The company’s mission is to make AI applications “more…The…
-
Turning expertise into opportunity for women in cybersecurity
Speaker diversity in cybersecurity has been a talking point for over a decade, with panels, pledges, and dedicated conference tracks failing to produce change. Stages still … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2026/03/09/erlend-andreas-shespeakscyber-women-cybersecurity-speakers/
-
Iran War Unlikely to Disrupt Israeli Vendor Presence at RSAC
Vendors Cite Global Teams as Iran War Raises Travel Questions From Israel. Several Israeli cybersecurity firms say they still plan to attend RSAC 2026 despite the Iran war. Companies including Orca Security, Check Point, Cyera and Radware say their global workforce structure allows them to maintain conference participation even if travel from Israel remains difficult.…
-
ISMG Editors: Cyber Spillover Looms in Iran-US Conflict
Also: Anthropic Claude Code Security Impact on AppSec, RSAC Conference Preview. In this week’s panel, four ISMG editors discuss the potential cyber spillover from escalating tensions in the Iran-Israel-U.S. conflict, the market disruption sparked by Anthropic’s Claude Code Security launch and a preview of RSAC Conference 2026. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/ismg-editors-cyber-spillover-looms-in-iran-us-conflict-a-30931
-
3 Reasons to Visit IRONSCALES at RSA Conference 2026
<div cla 🚀 3 Reasons to Visit IRONSCALES at RSA Conference 2026 The countdown to RSA Conference 2026 in San Francisco is officially on, and we cannot wait to connect with you at the industry’s premier cybersecurity event. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/3-reasons-to-visit-ironscales-at-rsa-conference-2026/
-
NDSS 2025 L-HAWK: A Controllable Physical Adversarial Patch Against A Long-Distance Target
Session 14D: Autonomous Vehicles Authors, Creators & Presenters: Taifeng Liu (Xidian University), Yang Liu (Xidian University), Zhuo Ma (Xidian University), Tong Yang (Peking University), Xinjing Liu (Xidian University), Teng Li (Xidian University), Jianfeng Ma (Xidian University) PAPER L-HAWK: A Controllable Physical Adversarial Patch Against a Long-Distance Target The vision-based perception modules in autonomous vehicles (AVs)…
-
NDSS 2025 Revisiting Physical-World Adversarial Attack On Traffic Sign Recognition
Session 14D: Autonomous Vehicles Authors, Creators & Presenters: Ningfei Wang (University of California, Irvine), Shaoyuan Xie (University of California, Irvine), Takami Sato (University of California, Irvine), Yunpeng Luo (University of California, Irvine), Kaidi Xu (Drexel University), Qi Alfred Chen (University of California, Irvine) PAPER Revisiting Physical-World Adversarial Attack On Traffic Sign Recognition: A Commercial Systems…
-
State-affiliated hackers set up for critical OT attacks that operators may not detect
Tags: access, antivirus, attack, conference, control, credentials, cyberattack, cybersecurity, data, data-breach, defense, detection, exploit, firmware, fortinet, group, hacker, incident response, infrastructure, Internet, Intruder, lessons-learned, malware, mfa, monitoring, network, password, penetration-testing, phishing, regulation, russia, service, spear-phishing, supply-chain, threat, tool, ukraine, update, vulnerabilityRussia’s OT attack teams expand beyond Ukraine: The Russia-linked pair Kamacite and Electrum, which Dragos has tracked since the mid-2010s and is responsible for the 2015 and 2016 cyberattacks that took down parts of Ukraine’s power grid, expanded operations into NATO territory in 2025 after years focused almost exclusively on Ukrainian targets.Kamacite, which serves as…
-
State-affiliated hackers set up for critical OT attacks that operators may not detect
Tags: access, antivirus, attack, conference, control, credentials, cyberattack, cybersecurity, data, data-breach, defense, detection, exploit, firmware, fortinet, group, hacker, incident response, infrastructure, Internet, Intruder, lessons-learned, malware, mfa, monitoring, network, password, penetration-testing, phishing, regulation, russia, service, spear-phishing, supply-chain, threat, tool, ukraine, update, vulnerabilityRussia’s OT attack teams expand beyond Ukraine: The Russia-linked pair Kamacite and Electrum, which Dragos has tracked since the mid-2010s and is responsible for the 2015 and 2016 cyberattacks that took down parts of Ukraine’s power grid, expanded operations into NATO territory in 2025 after years focused almost exclusively on Ukrainian targets.Kamacite, which serves as…
-
NDSS 2025 On The Realism Of LiDAR Spoofing Attacks Against Autonomous Driving Vehicle
Session 14D: Autonomous Vehicles Authors, Creators & Presenters: Ningfei Wang (University of California, Irvine), Shaoyuan Xie (University of California, Irvine), Takami Sato (University of California, Irvine), Yunpeng Luo (University of California, Irvine), Kaidi Xu (Drexel University), Qi Alfred Chen (University of California, Irvine) PAPER Revisiting Physical-World Adversarial Attack On Traffic Sign Recognition: A Commercial Systems…
-
NDSS 2025 Detecting Server-Induced Client Vulnerabilities In Windows Remote IPC
Tags: china, computing, conference, cve, data, detection, Internet, network, technology, tool, vulnerability, windowsSession 14C: Vulnerability Detection Authors, Creators & Presenters: (Except Where Noted – The Following Authors Are From The Institute of Information Engineering, Chinese Academy Of Sciences) Fangming Gu, Qingli Guo, Jie Lu (Institute of Computing Technology, Chinese Academy of Sciences), Qinghe Xie , Beibei Zhao, Kangjie Lu (University of Minnesota), Hong Li, Xiaorui Gong PAPER…
-
NDSS 2025 A Comparative Evaluation Of Large Language Models In Vulnerability Detection
Session 14C: Vulnerability Detection Authors, Creators & Presenters: Jie Lin (University of Central Florida), David Mohaisen (University of Central Florida) PAPER From Large to Mammoth: A Comparative Evaluation of Large Language Models in Vulnerability Detection Large Language Models (LLMs) have demonstrated strong potential in tasks such as code understanding and generation. This study evaluates several…
-
NDSS 2025 Be Careful Of What You Embed: Demystifying OLE Vulnerabilities
Tags: conference, cve, data, detection, exploit, Internet, malicious, microsoft, network, office, remote-code-execution, risk, tool, vulnerability, windowsSession 14C: Vulnerability Detection Authors, Creators & Presenters: Yunpeng Tian (Huazhong University of Science and Technology), Feng Dong (Huazhong University of Science and Technology), Haoyi Liu (Huazhong University of Science and Technology), Meng Xu (University of Waterloo), Zhiniang Peng (Huazhong University of Science and Technology; Sangfor Technologies Inc.), Zesen Ye (Sangfor Technologies Inc.), Shenghui Li…
-
NDSS 2025 Siniel: Distributed Privacy-Preserving zkSNARK
Tags: blockchain, china, computer, computing, conference, cryptography, data, framework, Internet, network, oracle, privacySession 14B: Privacy & Cryptography 2 Authors, Creators & Presenters: Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia Cheng (Shanghai DeCareer Consulting Co., Ltd), Kailun Wang (Beijing Jiaotong University), Xiaoguo Li (College of Computer Science, Chongqing University), Jianfei Sun (School of Computing and Information Systems, Singapore Management University), Jiachen…
-
NDSS 2025 Siniel: Distributed Privacy-Preserving zkSNARK
Tags: blockchain, china, computer, computing, conference, cryptography, data, framework, Internet, network, oracle, privacySession 14B: Privacy & Cryptography 2 Authors, Creators & Presenters: Yunbo Yang (The State Key Laboratory of Blockchain and Data Security, Zhejiang University), Yuejia Cheng (Shanghai DeCareer Consulting Co., Ltd), Kailun Wang (Beijing Jiaotong University), Xiaoguo Li (College of Computer Science, Chongqing University), Jianfei Sun (School of Computing and Information Systems, Singapore Management University), Jiachen…
-
NDSS 2025 SHAFT: Secure, Handy, Accurate And Fast Transformer Inference
Authors, Creators & Presenters: (All Via The Chinese University of Hong Kong) Andes Y. L. Kei, Sherman S. M. Chow PAPER SHAFT: Secure, Handy, Accurate and Fast Transformer Inference Adoption of transformer-based machine learning models is growing, raising concerns about sensitive data exposure. Nonetheless, current secure inference solutions incur substantial overhead due to their extensive…
-
NDSS 2025 JBomAudit: Assessing The Landscape, Compliance, And Security Implications Of Java SBOMS
Tags: compliance, conference, Internet, network, risk, sbom, software, technology, tool, vulnerability, vulnerability-managementSession 14A: Software Security: Applications & Policies Authors, Creators & Presenters: Yue Xiao (IBM Research), Dhilung Kirat (IBM Research), Douglas Lee Schales (IBM Research), Jiyong Jang (IBM Research), Luyi Xing (Indiana University Bloomington), Xiaojing Liao (Indiana University) PAPER JBomAudit: Assessing the Landscape, Compliance, and Security Implications of Java SBOMs A Software Bill of Materials (SBOM)…
-
NDSS 2025 CASPR: Context-Aware Security Policy Recommendation
Session 14A: Software Security: Applications & Policies Authors, Creators & Presenters: All From The Institute of Information Engineering, Chinese Academy of Sciences: Lifang Xiao, Hanyu Wang, Aimin Yu, Lixin Zhao, Dan Meng PAPER CASPR: Context-Aware Security Policy Recommendation Nowadays, SELinux has been widely used to provide flexible mandatory access control and security policies are critical…
-
RSAC Conference Expands Community Focus in 2026
Connection Hub, AI Content and Global Keynotes on This Year’s Agenda. RSAC Conference 2026 will celebrate its 35th anniversary next month with new community spaces, expanded AI programming and a global keynote lineup. From agentic AI and incident response to international leaders and hands-on learning labs, this year’s event spotlights the power of community. First…
-
NDSS 2025 Enhancing Security In Third-Party Library Reuse
Tags: conference, detection, Internet, network, open-source, programming, software, tool, update, vulnerabilitySession 14A: Software Security: Applications & Policies Authors, Creators & Presenters: Shangzhi Xu (The University of New South Wales), Jialiang Dong (The University of New South Wales), Weiting Cai (Delft University of Technology), Juanru Li (Feiyu Tech), Arash Shaghaghi (The University of New South Wales), Nan Sun (The University of New South Wales), Siqi Ma…
-
Catch FireTail at RSAC 2026 FireTail Blog
Feb 27, 2026 – Alan Fagan – RSA Conference is fast approaching, and the FireTail team is packing our bags for San Francisco! We are thrilled to announce that we’ll be exhibiting at the Early Stage Expo (Booth ESE-52) this year.Whether you’re looking to secure your enterprise AI initiatives, grab some great swag, or talk…
-
National Cyber Security Bill and NIS2: Senior Management’s Compliance Guide
Cybersecurity governance is moving to the highest levels of organizational leadership, a shift highlighted by the European Union’s NIS2 Directive and Ireland’s forthcoming National Cyber Security Bill. At a recent conference hosted by Ireland’s National Cyber Security Centre, attendees were asked: “Where are cybersecurity risks managed in your organization?” Results showed roughly half of organizations assign cyber risk oversight…

