Top Cybersecurity Trends Emerging From RSA Conference 2025
Cybersecuritygetty
Each May, the cybersecurity industry converges in San Francisco for the RSA Conference. This year’s gathering, attracting more than 45,000 attendees, highlighted several transformative trends reshaping digital asset protection, with AI unsurprisingly generating the most discussion.
Beyond AI, we're witnessing an acceleration of platformization, which is enabling the rise of comprehensive security providers, cybersecurity moving directly into the data path, and growing threats to operational technology and industrial infrastructure.
The Three Faces of AI: Protector, Protected, and Predator
Artificial intelligence is emerging as a game-changing force in cybersecurity, playing three distinct roles in an increasingly complex digital landscape.
Protecting Enterprise AI
Today's enterprises are on the verge of deploying "agentic AI" systems that work independently — scheduling meetings, analyzing data, writing code, and making decisions with minimal human oversight. These AI agents create new security risks as they access sensitive company data and systems. Organizations now need specialized protection to prevent their AI helpers from being compromised.
IBM leads this space with its watsonx platform, delivering comprehensive enterprise compliance and governance tools. Domino Data Labs takes compliance to an even higher level for highly regulated industries, while CrowdStrike brings its identity expertise to the agentic AI world through Falcon Identity Protection. As CrowdStrike's president, Michael Sentonas, told me at the event, "Every AI agent is an endpoint that must be protected."
Palo Alto Networks unveiled its comprehensive new Prisma AIRS platform to protect AI workloads. The company also announced its intent to acquire Protect AI, an established provider of security solutions for AI applications.
Several startups are making strides in this area, including CalypsoAI, with its platform ensuring AI model safety for inference, MIND, with its unique approach to data loss prevention and insider risk management for AI applications, and Cyberhaven, which provides visibility over AI tool usage.
AI as a Digital Defender
AI is indispensable for security teams protecting vast digital environments against rapidly evolving threats. Modern security systems can analyze billions of events to spot suspicious patterns, identify unusual behavior, automatically respond to threats, and predict potential attack vectors. These systems do this at a scale impossible for human analysts.
SentinelOne unveiled its Purple AI Athena, introducing agentic AI capabilities that emulate seasoned security analysts' decision-making processes. Palo Alto Networks enhanced its Charlotte AI platform with tools that automate incident triage and initiate policy-driven responses.
Defending Against AI-Powered Attacks
Most concerning is how threat actors are wielding AI as a weapon. Cybercriminals and nation-states now use AI to generate convincing phishing emails, create deepfakes for elaborate scams, discover vulnerabilities, and customize attacks based on individuals' online behavior.
The most alarming development is how AI democratizes cybercrime, making advanced hacking techniques accessible to almost anyone. This arms race means AI-powered attacks require equally sophisticated AI defenses.
While a trend, there isn't dedicated protection against AI attacks. Instead, nearly every company I spoke with at the event recognized the threat and is enhancing offerings to better address it.
Platformization: The Rise of Security Giants
Cybersecurity platforms function as digital superstores — integrated systems providing multiple security functions through a single interface. Benefits include simplified management through unified dashboards, improved threat detection through tool communication, reduced costs through consolidated licensing, consistent protection across systems, and faster incident response.
Palo Alto Networks pioneered this trend, evolving from a network security provider to a comprehensive platform. CrowdStrike expanded from endpoint protection to a full-scale security platform with its Falcon offering, while SentinelOne transformed its Singularity solution into a broader platform.
Tech giants like Microsoft, Cisco, and Google follow similar paths.
Protection Moves into the Data Path
Traditional cybersecurity has functioned as a wall around digital assets. A new approach is emerging: embedding protection directly into data management systems. This "in-line" security continuously monitors and safeguards data as it moves, is accessed, and is stored. Nearly every storage provider is doing something in this space.
NetApp has integrated real-time malware scanning directly into their storage systems, automatically checking files for threats whenever they're saved or accessed, all without requiring separate security software or adding delays. IBM offers similar technology across its storage portfolio.
Infinidat, the only storage vendor exhibiting at RSAC this year, takes an even bolder approach by offering actual guarantees around data recovery after a cyberattack. Its storage solutions include built-in capabilities ensuring organizations can recover data without paying ransom, backed by a financial guarantee with specific recovery time objectives.
Pure Storage supports immutable snapshots and offers comprehensive SLAs for ransomware recovery in its Evergreen//One storage-as-a-service offering. Hewlett-Packard Enterprise recently announced similar capabilities for its B10000 Alletra storage systems.
OT and the Edge: The New Security Frontier
Operational Technology refers to the hardware and software that monitor and control physical equipment and processes. These systems run power plants, water treatment facilities, manufacturing lines, oil refineries, and transportation networks.
For decades, these industrial systems were largely isolated from the internet, creating an "air gap" that made them difficult to hack remotely. That world has disappeared. Today's industrial facilities are rapidly connecting their operational systems to corporate networks and the internet, creating dangerous new attack surfaces.
Unlike typical cyberattacks that might result in stolen data or financial losses, attacks on industrial systems can have physical, real-world consequences. Securing these environments requires specialized approaches:
Asset Visibility: Organizations are investing in specialized tools to discover and monitor all industrial devices and systems
OT-Specific Security: Implementing security technologies specifically designed for industrial systems
Network Segmentation: Dividing networks into isolated zones to prevent attackers from moving from business systems to critical operational systems
Supply Chain Security: Securing complex equipment and software supply chains against tampering and compromises
A small but growing segment of the cybersecurity industry is dedicated to protecting these environments.
Cisco's Industrial Threat Platform directly addresses these concerns, announcing new capabilities at RSAC. It integrates new threat intelligence from Cisco Vulnerability Management and provides new industrial zone protection in its Cyber Vision and Secure Firewall.
TXOne Networks, a startup specializing in OT protection, showcased its Stellar endpoint protection solution. Stellar enables AI-powered threat detection, zero-trust segmentation, and real-time behavioral monitoring for OT environments.
The Road Ahead: Cybersecurity's Evolution
The trends highlighted at this year's RSA Conference paint a clear picture of cybersecurity's future. The industry is moving from isolated security tools to comprehensive platforms, from perimeter defenses to protection embedded in the data path, and from primarily digital concerns to securing the physical-digital intersection.
Meanwhile, AI has introduced a complex three-dimensional challenge: it must be protected as a valuable enterprise asset, leveraged as a powerful defensive tool, and countered as a formidable weapon in attackers' arsenals.
Enterprises that adapt to this new reality will be positioned to thrive in an increasingly connected world. Those that cling to outdated security paradigms may find themselves dangerously exposed. The message from RSAC 2025 is clear: cybersecurity is no longer just an IT concert but a fundamental business imperative requiring strategic investment and continuous evolution.
As attack surfaces expand and threats grow more sophisticated, the most successful organizations will embrace these emerging trends and build security into every aspect of their operations. Robust cybersecurity is about more than just avoiding disaster; Cybersecurity is about enabling innovation and growth with confidence.
Disclosure: Steve McDowell is an industry analyst, and NAND Research is an industry analyst firm, that engages in, or has engaged in, research, analysis and advisory services with many technology companies, including HPE, IBM, Infinidat, NetApp, Pure Storage, and SentinelOne. Mr. McDowell does not hold any equity positions with any company mentioned.
#top #cybersecurity #trends #emerging #rsa
Top Cybersecurity Trends Emerging From RSA Conference 2025
Cybersecuritygetty
Each May, the cybersecurity industry converges in San Francisco for the RSA Conference. This year’s gathering, attracting more than 45,000 attendees, highlighted several transformative trends reshaping digital asset protection, with AI unsurprisingly generating the most discussion.
Beyond AI, we're witnessing an acceleration of platformization, which is enabling the rise of comprehensive security providers, cybersecurity moving directly into the data path, and growing threats to operational technology and industrial infrastructure.
The Three Faces of AI: Protector, Protected, and Predator
Artificial intelligence is emerging as a game-changing force in cybersecurity, playing three distinct roles in an increasingly complex digital landscape.
Protecting Enterprise AI
Today's enterprises are on the verge of deploying "agentic AI" systems that work independently — scheduling meetings, analyzing data, writing code, and making decisions with minimal human oversight. These AI agents create new security risks as they access sensitive company data and systems. Organizations now need specialized protection to prevent their AI helpers from being compromised.
IBM leads this space with its watsonx platform, delivering comprehensive enterprise compliance and governance tools. Domino Data Labs takes compliance to an even higher level for highly regulated industries, while CrowdStrike brings its identity expertise to the agentic AI world through Falcon Identity Protection. As CrowdStrike's president, Michael Sentonas, told me at the event, "Every AI agent is an endpoint that must be protected."
Palo Alto Networks unveiled its comprehensive new Prisma AIRS platform to protect AI workloads. The company also announced its intent to acquire Protect AI, an established provider of security solutions for AI applications.
Several startups are making strides in this area, including CalypsoAI, with its platform ensuring AI model safety for inference, MIND, with its unique approach to data loss prevention and insider risk management for AI applications, and Cyberhaven, which provides visibility over AI tool usage.
AI as a Digital Defender
AI is indispensable for security teams protecting vast digital environments against rapidly evolving threats. Modern security systems can analyze billions of events to spot suspicious patterns, identify unusual behavior, automatically respond to threats, and predict potential attack vectors. These systems do this at a scale impossible for human analysts.
SentinelOne unveiled its Purple AI Athena, introducing agentic AI capabilities that emulate seasoned security analysts' decision-making processes. Palo Alto Networks enhanced its Charlotte AI platform with tools that automate incident triage and initiate policy-driven responses.
Defending Against AI-Powered Attacks
Most concerning is how threat actors are wielding AI as a weapon. Cybercriminals and nation-states now use AI to generate convincing phishing emails, create deepfakes for elaborate scams, discover vulnerabilities, and customize attacks based on individuals' online behavior.
The most alarming development is how AI democratizes cybercrime, making advanced hacking techniques accessible to almost anyone. This arms race means AI-powered attacks require equally sophisticated AI defenses.
While a trend, there isn't dedicated protection against AI attacks. Instead, nearly every company I spoke with at the event recognized the threat and is enhancing offerings to better address it.
Platformization: The Rise of Security Giants
Cybersecurity platforms function as digital superstores — integrated systems providing multiple security functions through a single interface. Benefits include simplified management through unified dashboards, improved threat detection through tool communication, reduced costs through consolidated licensing, consistent protection across systems, and faster incident response.
Palo Alto Networks pioneered this trend, evolving from a network security provider to a comprehensive platform. CrowdStrike expanded from endpoint protection to a full-scale security platform with its Falcon offering, while SentinelOne transformed its Singularity solution into a broader platform.
Tech giants like Microsoft, Cisco, and Google follow similar paths.
Protection Moves into the Data Path
Traditional cybersecurity has functioned as a wall around digital assets. A new approach is emerging: embedding protection directly into data management systems. This "in-line" security continuously monitors and safeguards data as it moves, is accessed, and is stored. Nearly every storage provider is doing something in this space.
NetApp has integrated real-time malware scanning directly into their storage systems, automatically checking files for threats whenever they're saved or accessed, all without requiring separate security software or adding delays. IBM offers similar technology across its storage portfolio.
Infinidat, the only storage vendor exhibiting at RSAC this year, takes an even bolder approach by offering actual guarantees around data recovery after a cyberattack. Its storage solutions include built-in capabilities ensuring organizations can recover data without paying ransom, backed by a financial guarantee with specific recovery time objectives.
Pure Storage supports immutable snapshots and offers comprehensive SLAs for ransomware recovery in its Evergreen//One storage-as-a-service offering. Hewlett-Packard Enterprise recently announced similar capabilities for its B10000 Alletra storage systems.
OT and the Edge: The New Security Frontier
Operational Technology refers to the hardware and software that monitor and control physical equipment and processes. These systems run power plants, water treatment facilities, manufacturing lines, oil refineries, and transportation networks.
For decades, these industrial systems were largely isolated from the internet, creating an "air gap" that made them difficult to hack remotely. That world has disappeared. Today's industrial facilities are rapidly connecting their operational systems to corporate networks and the internet, creating dangerous new attack surfaces.
Unlike typical cyberattacks that might result in stolen data or financial losses, attacks on industrial systems can have physical, real-world consequences. Securing these environments requires specialized approaches:
Asset Visibility: Organizations are investing in specialized tools to discover and monitor all industrial devices and systems
OT-Specific Security: Implementing security technologies specifically designed for industrial systems
Network Segmentation: Dividing networks into isolated zones to prevent attackers from moving from business systems to critical operational systems
Supply Chain Security: Securing complex equipment and software supply chains against tampering and compromises
A small but growing segment of the cybersecurity industry is dedicated to protecting these environments.
Cisco's Industrial Threat Platform directly addresses these concerns, announcing new capabilities at RSAC. It integrates new threat intelligence from Cisco Vulnerability Management and provides new industrial zone protection in its Cyber Vision and Secure Firewall.
TXOne Networks, a startup specializing in OT protection, showcased its Stellar endpoint protection solution. Stellar enables AI-powered threat detection, zero-trust segmentation, and real-time behavioral monitoring for OT environments.
The Road Ahead: Cybersecurity's Evolution
The trends highlighted at this year's RSA Conference paint a clear picture of cybersecurity's future. The industry is moving from isolated security tools to comprehensive platforms, from perimeter defenses to protection embedded in the data path, and from primarily digital concerns to securing the physical-digital intersection.
Meanwhile, AI has introduced a complex three-dimensional challenge: it must be protected as a valuable enterprise asset, leveraged as a powerful defensive tool, and countered as a formidable weapon in attackers' arsenals.
Enterprises that adapt to this new reality will be positioned to thrive in an increasingly connected world. Those that cling to outdated security paradigms may find themselves dangerously exposed. The message from RSAC 2025 is clear: cybersecurity is no longer just an IT concert but a fundamental business imperative requiring strategic investment and continuous evolution.
As attack surfaces expand and threats grow more sophisticated, the most successful organizations will embrace these emerging trends and build security into every aspect of their operations. Robust cybersecurity is about more than just avoiding disaster; Cybersecurity is about enabling innovation and growth with confidence.
Disclosure: Steve McDowell is an industry analyst, and NAND Research is an industry analyst firm, that engages in, or has engaged in, research, analysis and advisory services with many technology companies, including HPE, IBM, Infinidat, NetApp, Pure Storage, and SentinelOne. Mr. McDowell does not hold any equity positions with any company mentioned.
#top #cybersecurity #trends #emerging #rsa
·203 Views