Welcome to The Cybersecurity Pulse (TCP)! I'm Darwin Salazar, Growth Marketing at Monad and former detection engineer in big tech. Each week, I dig through all the major headlines to bring you the latest security product innovation and industry news. Subscribe below for weekly updates! 📧
Security Teams Need Outcomes, Not More Alerts
Varonis gives you outcomes, not alert fatigue. We detect real risks, automate prevention, and accelerate remediation across cloud, on-prem, SaaS, and third-party apps. Get a free data risk assessment with clear, actionable results in under 24 hours.
👋🏼 Hello! Feels like the entire security space is taking a collective breath and pause after the BSidesSF and RSAC marathon last week. A ton and I mean A TON, took place.
$1.7 billion in funding was announced in the weeks leading up to RSAC, PANW 0.00%↑ announced their intent to acquire Protect AI for up to $700 million, and I tracked 125+ announcements which I’ll highlight in this post.
For everything that we'll cover in this issue that is public info, there's about 2-3x more that occurred behind closed doors and on paper napkins in dimly lit cocktail bars. That said, I'll try to approach this week's newsletter in rapid fire style to ensure we cover a lot of ground.
Note: This is Part I of our RSAC recap. Part II will be out tomorrow covering top startups to watch, venture news, favorite booths, swag, choreography, and events/parties.
Tl;dr
😲 North Korean corporate infiltration of Fortune 500 takes center stage.
🥤Don’t drink the AI kool-aid. Ask hard questions. Prioritize transparency.
🤖 Enterprise adoption of AI has led to an explosion of data privacy/security and IAM concerns.
💰 Vendors who invested early in platformization and data acquisition are reaping major rewards
🕸️ More vendors launching use case specific MCP servers
🏜️125+ announcements across 19 product categories
Needless to say, this week’s issue will be a long one so if you’re reading from email, make sure to hop over to our Substack to ensure you don’t get cut off.
Now, let’s cyber 🕺🏽
Spying on North Korean hackers in real-time: an npm malware saga
At 1 p.m., our malware analysis engine alerted us to a potential malicious package that had been added to NPM. The first indications suggested this would be a clear-cut case; however, when we started peeling back the layers, things weren’t quite as they seemed…
Here is a story about how sophisticated nation-state actors can hide malware within packages.
📈 Key Themes and Trends
1. North Korean corporate infiltration
It's a real, ongoing thing. “Literally every Fortune 500 company has at least dozens, if not hundreds, of applications for North Korean IT workers,” Mandiant Consulting CTO Charles Carmakal said. “Nearly every CISO that I’ve spoken to about the North Korean IT worker problem has admitted they’ve hired at least one .., if not a dozen or a few dozen.” This reminds me of APT1, but on a much larger scale amplified by new deepfake tech.
This has led to startups racing to build deepfake detection tech. Last year's RSAC Innovation Sandbox winner was Reality Defender which focuses on this space and more recently, 4 startups announced funding or deepfake detection products at this year's RSAC (covered in Deepfake section way below). Safe to say that nobody is immune to this and security teams should include this in their threat model.
2. More advanced AI in security products
Vendors have been implementing AI/ML in some form or fashion since the early 2010s and ChatGPT super charged adoption in early 2023 by democratizing access to GenAI and Large Language Models (LLMs) via APIs.
The gap between ‘AI-powered/enabled’ and ‘Agentic AI’ is wide, yet this year we saw many vendors touting ‘agentic’ solutions. To be clear, both ‘AI-enabled’ and ‘agentic’ solutions are a net positive, but only if vendors are transparent about how their systems work and avoid cutting corners that create downstream risks/toil for security teams. Trust is the foundation of every vendor-buyer relationship in security.
AI-powered v. Agentic AI Scenario
An AI-powered solution typically uses LLMs to parse logs and alerts to pull in additional context related to that activity and can generate timelines, summaries, etc.
An Agentic AI solution, on the other hand, may actively investigates alerts by querying multiple data sources, correlating indicators of compromise (IOCs), and autonomously initiating or recommending next steps (e.g., quarantining endpoints, blocking malicious IPs).
Key distinctions
The agentic AI can reason, act, and self-tune toward predefined security goals. There’s a certain level of autonomy here. AI-powered solutions are more assistive than in nature. In this context, agentic AI pushes investigations forward as far as safely possible before handing over to a human, while AI-powered tools function more like sidekicks/copilots.
If you're a security leader assessing these types solutions, it’s key to be informed and understand what you’re signing up for. Here are some questions you can ask to better understand what the product is actually doing under the hood and whether you can trust it/the vendor:
What kind of domain-specific fine-tuning have you done for your AI models, and what security datasets were used in this process?
What specific steps have you taken to make your AI’s decisions transparent and explainable, especially in cases of autonomous action or incident response?
Can you describe a scenario where your AI made an incorrect decision, how it was addressed, and what measures were put in place to prevent recurrence?
What safeguards do you have in place to prevent your AI from inadvertently learning, memorizing, or mishandling sensitive or proprietary customer data? Do you provide on-prem/self-hosted deployment options?
Can you provide details on the total cost of ownership (TCO) beyond upfront pricing? Think ongoing fine-tuning, retraining, data ingestion, and infrastructure requirements
If the vendor can answer these questions to your satisfaction, without having their feathers ruffled, then it’s probably worth a demo/PoC.
3. Accelerated enterprise adoption of AI
This is leading to serious data privacy and security concerns for CISOs. Think Copilot's having access to sensitive SharePoint, Excel, HR systems etc. Can and has gotten messy. Also, the use of AI outside of the security team's purview (Shadow AI) can lead to data leaks, vendors training on sensitive or proprietary data, and more risks. These are real concerns which data and SaaS security startups and incumbents are increasingly focusing on.
Identity and access management (IAM) for AI is also an emerging concern hence all the new Non-human Identity (NHI) startups and funding flowing into the space. While most of traditional IAM security principles still apply, AI agents, MCP servers etc. do scale and behave differently. One example is the Copilot example mentioned above. In this scenario, a user (or attacker) using a Copilot with SuperAdmin privileges may be able to access sensitive company data at unprecedented speeds and scale. Getting IAM right for AI requires a bit of different approach, varying learning curves for each solution, and a lot of attention to detail.
4. Model Context Protocol (MCP) adoption
MCP servers make it super easy for LLMs and agents to call on external data sources. At RSAC and leading up to it, we saw an influx of vendors (Wiz, CloudFlare, AppOmni, Salt, RunReveal, CrowdStrike, Google Cloud) releasing MCP servers. I'm still figuring out what it would mean if all vendors have MCP servers that could securely 'talk' to each other or the real-world impact it is having today, but it is something I saw and wanted to call out.
5. Platformization and AI
Vendors who have access to massive amounts of data from diverse sources are in the lead in the AI and platformization race. CrowdStrike, Palo Alto Networks, Varonis, Zscaler, Google Security, Microsoft, Cisco, and SentinelOne are all doing pretty cool things by deeply engraining AI into their strategy. While hyperscalers and incumbents have an advantage, so do startups and point solutions as they can innovate faster and often have very deep expertise + product coverage in niche areas. One example is SilentPush which we cover in the next section.
Anyhow, we're already seeing huge return on investment for vendors who prioritized data acquisition early in the AI race and consolidated multiple point solutions into platforms.
Examples below:
🔮 The Future of Security 🔮
Build Your Security Champions Program
Join Snyk on Thursday, May 15th at 11AM ET for a free virtual session on building and scaling an effective Security Champions program. Learn how to bridge security and dev teams and foster a strong security culture.
AI security
Meta Launches LlamaFirewall Framework to Stop AI Jailbreaks, Injections, and Insecure Code
Prompt Security launches Vulnerable Code Scanner for AI-generated code
CrowdStrike Partners with Google Cloud to Advance AI-Native Integration with MCP
Cribl and Palo Alto Networks partner to secure agentic AI across multicloud environments
Palo Alto Networks announces new AI security, network security, and security operations capabilities
DataDome unveils intent-based AI models for AI agent protection
Application Security
Legit leverages AI in ASPM platform to find, fix, and prevent vulnerabilities
Lineaje Leverages AI Agents to Secure Open Source Packages and Images
Apiiro debuts dynamic software mapping to streamline vulnerability management
Wallarm Agentic AI Protection blocks attacks against AI agents
Backslash Security LLM vibe coding research and new capabilities
Checkmarx releases application security posture management solution
Browser Security
Cloud Security
Upwind Launches Runtime-Powered CNAPP 2.0 for Cloud Security Posture
Aqua Security unveils Secure AI for protecting workloads from code to cloud
Orca Security agentless static reachability analysis for production workloads
ZEST Security unveils Multi-Agent AI System for cloud risk remediation
Data security
Varonis AI Shield helps employees use AI without putting data at risk
Metomic AI Data Protection prevents data leakage in AI tools
Sentra Data Security for AI Agents protects AI-powered assistants
BigID AI Data Lineage delivers transparency and control for AI
Trellix DLP Endpoint Complete prevents data leaks in Windows and macOS
CrowdStrike Expands Cloud and Data Protection with Unified Security Innovations
Cy4Data Labs Launches Cy4Secure to Protect Data In-Use, In-Flight, and At-Rest
Cyberhaven launches AI visibility and protection capabilities
Deepfake detection
Endpoint security
Email security
Identity Security
Push Security raises $30M to expand browser-based identity threat detection
Entro launches gen-AI engine for NHI security and secrets scanning
GuidePoint Security Adds Veza Identity Security to Expand Access Protection Offerings
Rubrik Identity Resilience protects vulnerable authentication infrastructure
Delinea Expands Identity Security Platform to Govern AI at Enterprise Scale
The Future of Cloud Access Management: How Tenable Cloud Security Redefines Just-in-Time Access
Saviynt ISPM provides insights into an organization’s identity and access posture
How SailPoint is taming the ‘wild west’ of agentic AI in identity security
Silverfort Extends NHI Security to the Cloud, Unifying Identity Protection
World partners with Tinder, Visa to bring its ID-verifying tech to more places
Oasis NHI Provisioning automates the provisioning of NHIs and their credentials
CryptoLab unveils Encrypted Facial Recognition (EFR) solution
Miscellaneous
Cynomi cinches $37M for its AI-based ‘virtual CISO’ for SMB cybersecurity
SecLytics Rebrands as Augur Security, Raises $7M in Seed Funding
Vectra AI and CrowdStrike Expand Partnership to Support SMB and Midmarket Security Needs
Netskope One enhancements cover a broad range of AI security use cases
Mobile Security
Offensive security
Network Security
NetFoundry Raises $12 Million for Network Security Solutions
Palo Alto Networks announces new AI security, network security, and security operations capabilities
Fortinet outlines new cyber threats and AI-powered defenses to match
Threat Intelligence
Security Training
Governance, Risk, and Compliance
AuditBoard AI governance solution mitigates risks associated with AI systems
Cloud Security Alliance launches Compliance Automation Revolution (CAR)
LogicGate adds automated control gap analysis feature to GRC platform
SAFE launches autonomous Third-Party Risk Management Platform
SaaS Security
SecOps
M-Trends 2025: State-Sponsored IT Workers Emerge as Global Threat
Arctic Wolf, Anthropic Partner to Advance Autonomous SOCs, Launch Cipher
Veeam Threat Hunter ushers in a new era of proactive cybersecurity and resilience
Zscaler champions AI-powered threat detection in the context of fighting fire with fire
Securonix brings autonomous decision-making to security operations
Huntress Launches Managed SIEM to Simplify and Expand Cybersecurity Access
Arctic Wolf launches Cipher to enhance security investigations with AI insights
Sumo Logic unveils innovations across AI, automation, and threat intelligence
SOCRadar Introduces Copilot to Streamline Cybersecurity Operations with AI
CrowdStrike Advances Next-Gen SIEM with Threat Hunting Across Data Sources, AI-Driven UEBA
Palo Alto Networks announces new AI security, network security, and security operations capabilities
Vulnerability Management
Armis expands vulnerability exposure and assessment capabilities
Ridge Security Launches RidgeSphere for Scalable RidgeBot® Security Management
Cymulate and SentinelOne Integrate to Advance Continuous Exposure Validation
Silent Push unveils threat intelligence management module enhancements
Axonius releases risk-based vulnerability management product
Interested in sponsoring TCP?
Sponsoring TCP not only helps me continue to bring you the latest in security innovation, but it also connects you to a dedicated audience of ~6,000 CISOs, practitioners, founders, and investors across 100+ countries 🌎
Bye for now 👋🏽
That’s all for this week… ¡Nos vemos la próxima semana!
🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀🍀
Disclaimer
The insights, opinions, and analyses shared in The Cybersecurity Pulse are my own and do not represent the views or positions of my employer or any affiliated organizations. This newsletter is for informational purposes only and should not be construed as financial, legal, security, or investment advice.