Black Hat Europe returns to London with more than 45 keynotes and briefings tackling everything from bootloader bugs and flaws in artificial intelligence and large language model tools, to disrupting fake online brokerages and remotely hacking Volkswagen entertainment systems to track vehicles.
In the latest weekly update, ISMG editors discussed China outpacing the U.S. in critical technology research investments, why all 10 RSA Conference 2025 Sandbox Innovation finalists will receive a $5 million investment, and how artificial intelligence dominated the AWS re:Invent 2024 conference.
Finalists selected for RSA Conference’s Innovation Sandbox competition will now each receive a $5 million investment from Crosspoint Capital. Managing Partner Hugh Thompson said this initiative ensures top cybersecurity startups are equipped to handle increased demand and scale effectively.
The acquisition of D'Crypt strengthens ST Engineering's cryptographic and high-security engineering capabilities while addressing evolving OT cybersecurity challenges in critical infrastructure sectors, said Goh Eng Choon, president of cyber at ST Engineering.
As India accelerates its digital transformation journey, the lack of security-by-design principles in its expanding digital infrastructure has created unprecedented cybersecurity risks, particularly affecting financial services and healthcare sectors, according to Cybersecurity Expert Kanishk Gaur.
As gen AI evolves beyond cloud-based models, downloadable AI models present new opportunities for both cybersecurity defenders and threat actors. The ability of offline models to bypass traditional ethical guardrails creates unique security challenges, according to Pascal Geenens, director, Radware.
Organizations face mounting pressure to address workforce displacement and ethical implications as AI reshapes cybersecurity, particularly in software engineering roles. The challenge extends beyond job displacement to critical concerns about data privacy and transparency.
Organizations integrating AI systems should adopt process-driven frameworks that mirror established cybersecurity standards, said Gerry Chng, chairman of Singapore Computer Society. The ISO SC 42 committee's 42,000 series provides a foundation for developing AI policies and standards.
Healthcare ransomware attacks have doubled since 2021, with 37% of organizations taking up to a month to recover, according to Sophos' State of Ransomware in Healthcare 2024 report. Organizations must rethink their approach to cybersecurity as attack surfaces expand and skills shortages persist.
As enterprises adopt AI for security, privacy and safety concerns remain top barriers. Organizations need robust frameworks and guardrails to ensure responsible AI implementation while protecting sensitive data, said Anand Raghavan, VP of engineering - AI, Cisco.
As OT systems become more interconnected, traditional air gaps disappear, creating new risks, said Joseph Carson, chief security scientist and advisory CISO at Delinea. The convergence of IT and OT environments requires a stronger focus on protecting digital identities and access controls.
Organizations mistakenly believe their operational technology systems are air-gapped and immune to cyberthreats. Dawn Cappelli, director of OT-CERT at Dragos, discusses why these assumptions are dangerous security gaps and why organizations need to rethink their approach to OT security.
A "road map to resilience" approach helps organizations balance immediate, low-cost security improvements with complex, long-term risk reduction initiatives in industrial control systems, said Mex Martinot, vice president and global head of industrial cybersecurity at Siemens Energy.
Ken Soh, group CIO at BH Global, and John Lee, managing director at GRF, discuss how the rise of smaller renewable energy producers and smart grid initiatives is forcing a rethink of traditional cybersecurity frameworks.
As AI adoption accelerates across enterprises, security leaders face unprecedented challenges in data protection. To assess AI-related risks effectively, it's essential to understand the business goals and the context of AI applications, said Ashish Thapar, cybersecurity head for APAC at NTT DATA.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.in, you agree to our use of cookies.