GenAI is not the end of the world
GenAI helps with automation For example, in the phishing part of my talk, I examined the complete chain of phishing emails—from target selection,...
Last week, San Francisco hosted the annual RSA Conference, drawing over 44,000 attendees—surpassing last year’s numbers and once again proving that cybersecurity remains a top priority for organizations worldwide.
This year’s theme, “Many Voices. One Community.”, emphasized the importance of collaboration across the industry. But it also reflected the reality of today’s security landscape—one filled with competing narratives and a cacophony of vendor messages. After walking through the buzzing expo halls and attending back-to-back sessions, my head was certainly ringing with buzzwords.
AI still dominates but the conversation has matured
Unsurprisingly, AI remained a hot topic. But unlike last year—when it felt like every booth simply slapped a "Powered by AI" sticker onto their product—this year’s focus shifted to deploying AI safely and protecting AI systems themselves.
One of the most visible trends was the rise of agentic AI, especially with the growing integration of Model Context Protocol (MCP). Two categories stood out with their advances in that area, but I’m sure many will follow this year.
We're seeing a clear evolution: security platforms are becoming smarter, more integrated, and increasingly autonomous. But these advancements depend heavily on data visibility and trust—because a blind AI is no better than no AI at all.
Here are the five most talked-about topics this year—from my point of view.
The focus is shifting from simply using AI to ensuring that models are protected, responsibly managed, and auditable. Topics like A2A security, MCP hardening, and “Shadow AI” governance are gaining momentum.
API keys, service accounts, and machine-to-machine (M2M) interactions are under scrutiny. Identity isn't just about people anymore—securing these non-human entities is now mission-critical.
While detection and reporting have improved, prevention still lags. There’s growing awareness that proactive cloud security needs more attention, not just reactive measures.
Still a buzzword—but implementation remains tricky. Usability and simplicity are the biggest hurdles holding Zero Trust back from broad adoption, but momentum is increasing.
Long-term data privacy is driving urgency around quantum-resistant encryption. This is no longer a “future problem”—especially for industries with long data retention needs.
Beyond the top trends, broader themes emerged: platform unification, tool consolidation, and resource efficiency. The market is clearly shifting from “buy more tools” to “make the ones we have work better together.” Automation and AI are central to this effort.
Take xorlab, for example. Our automated abuse mailbox solution streamlines the triage and response to reported phishing emails—reducing manual effort while improving detection and response times.
While email security didn’t dominate the expo floor, it came up repeatedly in conversations with CISOs. Email remains the backbone of business communication—yet many organizations have given up and accept the fact that some phishing emails will get through. Their current approach often leans on damage control—strong authentication and UEBA—rather than proactive threat detection.
Unfortunately, this won’t be a feasible approach with the increase in AI-generated phishing volume, as these companies will get buried under the coming wave.
Others aren’t yet aware of how quickly and efficiently modern analysis and triage tools can stop new campaigns before they spread. We had some fantastic discussions with potential customers who are looking to close this gap.
RSAC 2025 reaffirmed its place as a cornerstone for networking and discussing trends in the cybersecurity world. This year’s message was clear: we’re not short on tools—we’re overwhelmed by them. The real challenge is how we integrate, prioritize, and scale our security operations efficiently to align with actual business risk.
GenAI helps with automation For example, in the phishing part of my talk, I examined the complete chain of phishing emails—from target selection,...
The evolution of security testing As cybersecurity and the threat landscape have evolved over the past 25 years, so have testing methodologies....