News alert: $198K in Grants Awarded to Boost Cybersecurity Workforce in Massachusetts

News alert: $198K in Grants Awarded to Boost Cybersecurity Workforce in Massachusetts

| | News Alerts, Top Stories
Boston, MA, Jun. 4, 2025, – The Healey-Driscoll administration and Massachusetts Technology Collaborative’s (MassTech) MassCyberCenter awarded $198,542 to four Massachusetts-based programs focused on preparing professionals for the cybersecurity workforce. MassTech provided the funds ...
Chris Sacca's Grand Theory of AI: We Are Super Fucked #chatgpt

MY TAKE: Are we ‘Super f**ked’ by agentic AI — or finally able to take charge of what comes next?

| | My Take, Top Stories
When VC mogul Chris Sacca declared AI is the death knell for professional services, I flinched. Not because he’s wrong — but because it’s only half the story. Related:  GenAI grows up ...
News alert: Aembit brings ‘Workload IAM’ to Microsoft stack, secures hybrid AI and app access

News alert: Aembit brings ‘Workload IAM’ to Microsoft stack, secures hybrid AI and app access

Silver Spring, MD, June 3, 2025, CyberNewswire — Aembit, the workload identity and access management (IAM) company, today announced a major expansion of its platform to support Microsoft environments. With this launch, ...
SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?

SHARED INTEL Q&A: When every IoT Device and AI assistant has an identity — who’s in control?

| | Q & A, Top Stories
As enterprise adoption of generative AI accelerates, security teams face a new identity dilemma — not just more users and devices, but a growing swarm of non-human agents and autonomous systems requesting ...
Surfacing, securing machine + human identities by Byron Acohido

RSAC Fireside Chat: Human and machine identity risks are converging — and they’re finally visible

Non-human service accounts have quietly become one of the biggest liabilities in enterprise security. Related: Why identity is the cornerstone of cyber defense These machine credentials — used to automate connections between ...
Executive privacy is now a security imperative by Byron Acohido

RSAC Fireside Chat: Cyber risk mitigation turns personal–defending the CEO as an attack vector

Executives are under digital siege—and most don’t even know it. Related: Shareholders sue over murder At RSAC 2025, I sat down with Chuck Randolph, SVP of Strategic Intelligence and Security at 360 ...
Regaining the advantage with purple team ops by Byron Acohido

RSAC Fireside Chat: ‘Purple’ teams dismantle the reactive trap — and can help restore cyber readiness

Reactive security isn’t just outdated — it’s become a liability. Attackers have figured out how to weaponize speed, and defenders are struggling to keep pace. Related: Mastering adversary emulation At RSAC 2025, ...
SHARED INTEL Q&A: Visibility, not volume — reframing detection for the AI-enabled SOC

SHARED INTEL Q&A: Visibility, not volume — reframing detection for the AI-enabled SOC

| | Q & A, Top Stories
For years, network security has revolved around the perimeter: firewalls, antivirus, endpoint controls. But as attackers grow more sophisticated — and as operations scatter to the cloud, mobile, and IoT — it’s ...
News alert: DataHub secures $35M Series B to enable AI to safely manage and use data

News alert: DataHub secures $35M Series B to enable AI to safely manage and use data

| | News Alerts, Top Stories
Palo Alto, Calif., May 21, 2025 – DataHub, by Acryl Data, the leading open source metadata platform, today announced it has raised $35 million in Series B funding led by Bessemer Venture ...
Securing browser users at the control plane by Byron Acohido

RSAC Fireside Chat: Enterprise browsers arise to align security with the modern flow of work

| | Podcasts, rsac, Top Stories
A quiet but consequential shift is underway in enterprise workspace security. The browser has effectively become the new operating system of business. Related: Gartner’s enterprise browser review It didn’t happen all at ...