The RSA Conference is the world’s largest cybersecurity event, and it just wrapped up this week in San Francisco. The conference has grown to include more than 30,000 attendees from over 100 countries. In case you didn’t have a chance to attend, we’re going to highlight some of the coolest technologies announced during the show.

First, this year’s show was all about AI (and the integration of ChatGTP functionality). If you want more info on just how much AI dominated the conversation, SC Magazine did a great write up here. But in general, there were a lot of AI integrations around risk scoring, high-priority risk identification, and data correlation acceleration.

Now let’s jump into some of the cool announcements, in no particular order.

  1. NetAlly’s CyberScope handheld cybersecurity analyzer – When you think cybersecurity you don’t always think handheld testers. That’s why this announcement from NetAlly is so cool. The CyberScope analyzer offers comprehensive site security assessments, analysis, and reporting from a powerful, portable tool. Designed for deep site network visibility, CyberScope can be used ‘in-hand’ by local personnel or operated remotely by centralized cyber experts. Get more info on the tool here –
  1. Veracode Fix – Simply put, this product automates fixes to code…and does it fast. It’s also powered by AI, using the same machine learning model as ChatGPT to recommend remediations for code and open-source dependency vulnerabilities. Get more information here –
  1. Google Chrome Risk Assessment for Chrome Extensions – SaaS apps and extensions are used by every organization. But understanding the risks associated with those apps can be difficult. While many third-party solutions exist to tackle this problem, Google just made it that much easier for Google Workspace admins by integrating Spin.AI’s app risk assessment tool into their admin console. Organizations can now better understand the risks associated with these apps for free. Check out all the details in this recent Spin.AI blog – 
  1. Akamai Brand Protector – We all know phishing attacks are a problem, and many impersonate a brand. To help solve this growing problem Akamai launched this interesting new product that detects and offers mitigation of targeted attacks including phishing, impersonations, and trademark piracy. Want to learn all about these attacks and the product, check out this great blog –
  1. Project ETHOS – Okay so not really a product, but several companies have teamed up to create an open-source information sharing platform that is designed to serve as an early warning system for critical infrastructure. The shared information includes indicators of compromise (IoCs) such as IP addresses, hashes, and domains, which can be useful to defenders for detecting new threats. You can find out more here or check out this great article from SecurityWeek. 
  1. Torq’s Hyperautomation Platform – According to Torq, their Hyperautomation Platform streamlines all workflows and processes throughout the enterprise security infrastructure. With GPT AI-based analytics, the platform can automatically analyze cybersecurity incidents, empowering security professionals to develop strategic responses and inform immediate and long-term defensive measures. Additionally, the platform enables quick creation and deployment of complex, sophisticated workflows. Get more info here –
  1. Google Cloud AI Security Workbench – The company announced this new workbench and said it’s “an industry-first extensible platform powered by a specialized, security LLM, Sec-PaLM. This new security model is fine-tuned for security use cases, incorporating our unsurpassed security intelligence such as Google’s visibility into the threat landscape and Mandiant’s frontline intelligence on vulnerabilities, malware, threat indicators, and behavioral threat actor profiles.” You can read more about it here –
  1. Extended Capabilities in Gurucul Next-Gen SIEM – Gurucul already offers one of the leading SIEM solutions (just look at the Gartner MQ). This update helps organizations cost-effectively secure their increasingly complex cloud architectures, reach deeper insights faster, and enrich enterprise-wide visibility. It does that with more than 500 days of searchable data, robust purpose-built security use cases, coverage for identity-based threat detection and response (ITDR), and unified observability for any cloud environment. Find out more here –