#### [Spotlight on RSAC](/special_features/spotlight_on_rsac/)RSAC wrap: AI and China on everything, everywhere, all at once==============================================================With North Korean IT workers storming the gates, too—————————————————-[Jessica Lyons](/Author/Jessica-Lyons ‘Read more by this author’) Sun 4 May 2025 // 18:47 UTC [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once) [](https://twitter.com/intent/tweet?text=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once&url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once&summary=With%20North%20Korean%20IT%20workers%20storming%20the%20gates%2c%20too) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) RSAC Another RSAC has come and gone, with almost 44,000 attendees this year spread across San Francisco’s Moscone Center and the surrounding facilities, according to conference organizers. Hopefully, all of us made it home safely, didn’t get deported to a Venezuelan prison, and didn’t end up bringing home a virus – computer or corona.You can read all of *The Register* ‘s coverage [here](https://www.theregister.com/special_features/spotlight_on_rsac/), and as with [previous years’ conferences](https://www.theregister.com/2024/05/14/rsa_conference_kettle/), some key trends and themes emerged throughout the week. The most obvious? ‘AI is everywhere,’ as everyone from former National Security Agency cyber boss [Rob Joyce](https://www.theregister.com/2025/04/30/exnsa_cyber_boss_ai_expoit_dev/) to Rapid7 senior director of threat analytics Christiaan Beek told us, using those exact words, when asked to share their takeaways from this year’s event.’I don’t think it’s too much, because I am an AI optimist,’ Joyce told *The Register*. ‘I really think there’s going to be incredible stuff — we talked about Waymo — but in the near term, we are going to swamped with a lot of things that are bad security and it’s going to be exploitable.’ Particular buzz was reserved for the subset known as ‘agentic AI,’ as we [predicted](https://www.theregister.com/2025/04/23/agentic_ai_rsac/) in the lead up to RSAC.### We called itOver at one of Amazon’s San Francisco offices, securing AI agents garnered a whole panel discussion among the tech giant’s Chief Security Officer Steve Schmidt, AWS Chief Information Security Officer Chris Betz, and Amazon Chief Information Security Officer for ads and devices [Amy Herzog](https://www.theregister.com/2025/05/01/amazon_red_teamed_alexaplus_interview/).But it’s not just the vendors who are keeping a close eye on this emerging technology. ’As companies deploy agents, they give them the autonomy and authority to do something on their behalf, and criminals are going to flock to those because they have that autonomy,’ Joyce said. ‘I think we’re going to have a lot of AI mishaps over the coming year.’Naturally, conference goers want to know how cybercriminals and nation-state hackers are using AI in their attacks, and the top use case seems to be [fraud and social engineering](https://www.theregister.com/2025/05/02/gen_ai_spam/). Generative AI makes it much easier to craft phishing emails in any language without those pesky spelling and grammatical mistakes that used to be a dead giveaway. It can also produce phony invoices and documents with company logos that look just like the real thing, and create fictitious business profiles at scale.’The widest adoption of -[AI-] use cases we’ve seen is from China and cybercriminals,’ FBI Deputy Assistant Director Cynthia Kaiser [told](https://www.theregister.com/2025/04/29/fbi_china_ai/) *The Register*.### China’s the biggest threat, but Norks the buzziestThreat intel analysts across both public and private sector agreed that China has become [America’s top cyber threat](https://www.theregister.com/2025/04/29/china_us_cyber_threat/) — and the various Typhoon attacks over the past couple years were frequent topics of discussion — but the phony North Korean IT worker was certainly the buzziest threat topic.’The North Korean worker situation is mind blowing,’ cybersecurity author and investor Nicole Perlroth said during an offsite panel hosted by developer security provider Snyk.Before the panel, Perlroth met with a group of Fortune 50 CISOs, and one of them told her that last quarter, they submitted their new-hire list to the local FBI field office.’Six came back positive for North Korean agents,’ she said. ‘Two of them weren’t even North Korean — they were Indian citizens who were being paid by North Korea to take these jobs … that’s one company. I won’t tell you who they are, but you would never think North Koreans would be trying to get inside this company.’### And they’re even gunning for Google jobsOne Fortune 50 company that the Norks are trying to get an inside view of is Google.’We have seen this in our own pipelines,’ said Iain Mulholland, Google Cloud’s senior director of security engineering, during a press-attended threat-intel roundtable. Google ‘detected’ the North Korean IT workers applying for jobs, and in response continued to ‘evolve and adapt’ defenses.> Almost every CISO of a Fortune 500 company that I’ve spoken to have admitted that they had a North Korean IT worker problem’Almost every CISO of a Fortune 500 company that I’ve spoken to — I’ll just characterize as dozens that I’ve spoken to — have admitted that they had a North Korean IT worker problem,’ added Mandiant Consulting CTO Charles Carmakal.The Google Cloud owned-incident response firm has ‘notified countless organizations’ that, not only have North Koreans applied for jobs at their companies, but in several cases, ‘have actually been hired,’ Carmakal said. ‘It’s a very significant problem.’Plus, ‘the other issue is that they’re not all direct hires. Some of these are contractors,’ Google Threat Intelligence VP Sandra Joyce said, noting this adds another ‘layer of complexity’ where enterprises not only need to background check direct hires, but also employees working for contractors.Luckily, there is one question that companies should ask during job interviews that, we’re told, always roots out North Korean spies and forces them to drop out of the recruitment process. Read all about it [here](https://www.theregister.com/2025/04/29/north_korea_worker_interview_questions/).### Trump loomed largeAs we noted earlier in the week, the US government’s top cybersecurity leaders didn’t have as much of a [speaking role](https://www.theregister.com/2025/04/28/nsa_cisa_bosses_notably_absent/) or presence at RSAC as they have in previous years. Meanwhile, questions about what the White House’s security snafus and budget-slashing efforts will mean for the private sector loomed large, and ran like an undercurrent throughout this year’s conference.In addition to federal employees being silenced at the biggest cybersecurity event in America, many of the speakers and attendees seemed to be leery to talk about topics like CISA employee and program cuts, and what US government changes will mean for the industry.* [Homeland Security boss says CISA has gone off the rails, vows to set it right](https://www.theregister.com/2025/04/30/noem_put_cisa_on_mission/)* [How Amazon red-teamed Alexa+ to keep your kids from ordering 50 pizzas](https://www.theregister.com/2025/05/01/amazon_red_teamed_alexaplus_interview/)* [Ex-NSA cyber-boss: AI will soon be a great exploit coder](https://www.theregister.com/2025/04/30/exnsa_cyber_boss_ai_expoit_dev/)* [China is using AI to sharpen every link in its attack chain, FBI warns](https://www.theregister.com/2025/04/29/fbi_china_ai/)### DOGEing the question?Most seemed to take Homeland Security Secretary Kristi Noem’s lead and ‘[just wait till you see](https://www.theregister.com/2025/04/30/noem_put_cisa_on_mission/)’ approach.During an offsite Amazon threat-intel panel, reporters asked Amazon and CrowdStrike execs if the federal government’s headcount reductions and budget cuts had impacted their ability to do their jobs and [collaborate on threat intel](https://www.theregister.com/2025/04/08/cisa_cuts_threat_intel/) with government counterparts.’We haven’t seen any change in that regard,’ Amazon CISO CJ Moses said. ‘We’re monitoring the situation just like everybody else, to see if there’s any changes. But as of today, there hasn’t been an impact to our ability to share the information that’s needed.”Same,’ added CrowdStrike senior VP of counter adversary operations Adam Meyers.An FBI official was slated to participate in this press-only panel, but was dropped from the lineup as the event neared.Google execs had a similar response when asked about government changes and if budget cuts have affected its direct threat intel sharing.’So far, we have been able to continue our mission of supporting all of our customers and sharing intelligence with our partners,’ Google’s Sandra Joyce said.> If anything, we’re just going to see a lot more activity right now, and I think we have to be more prepared than everOver at the Snyk panel, the speakers seemed more candid, with [Easterly calling](https://www.theregister.com/2025/04/30/excisa_boss_agency_cuts/) the CISA brain drain ‘a loss for the American people’ at a time when threats from China and ransomware criminals alike are skyrocketing.’If anything, we’re just going to see a lot more activity right now, and I think we have to be more prepared than ever,’ Perlroth said. ‘So I think the cuts are disturbing on a practical level.’Snyk CEO Peter McKay, meanwhile, noted that ‘you judge the culture of a company based off of how they treat people on the way out, because that’s the way you’re going to get treated when it’s your turn.’When it comes to the federal government slashing employees, ‘I worry how good of talent you’re going to get in, when they see how you treat people on the way out.’ ® [Sponsored: Harnessing AI for fast, reliable networks](https://go.theregister.com/tl/3163/shttps://www.theregister.com/2025/04/27/huawei_networking/) Share [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once) [](https://twitter.com/intent/tweet?text=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once&url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once&summary=With%20North%20Korean%20IT%20workers%20storming%20the%20gates%2c%20too) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) #### More about* [AI](/Tag/AI/)* [China](/Tag/China/)* [RSA Conference](/Tag/RSA%20Conference/) More like these × ### More about* [AI](/Tag/AI/)* [China](/Tag/China/)* [RSA Conference](/Tag/RSA%20Conference/)* [Security](/Tag/Security/) ### Narrower topics* [2FA](/Tag/2FA/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [CHERI](/Tag/CHERI/)* [China Mobile](/Tag/China%20Mobile/)* [China telecom](/Tag/China%20telecom/)* [China Unicom](/Tag/China%20Unicom/)* [CISO](/Tag/CISO/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Cybercrime](/Tag/Cybercrime/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Cyberspace Administration of China](/Tag/Cyberspace%20Administration%20of%20China/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DeepSeek](/Tag/DeepSeek/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [Encryption](/Tag/Encryption/)* [Exploit](/Tag/Exploit/)* [Firewall](/Tag/Firewall/)* [Gemini](/Tag/Gemini/)* [Google AI](/Tag/Google%20AI/)* [GPT-3](/Tag/GPT-3/)* [GPT-4](/Tag/GPT-4/)* [Great Firewall](/Tag/Great%20Firewall/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [Hong Kong](/Tag/Hong%20Kong/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Information Technology and the People’s Republic of China](/Tag/Information%20Technology%20and%20the%20People%27s%20Republic%20of%20China/)* [Infosec](/Tag/Infosec/)* [Infrastructure Security](/Tag/Infrastructure%20Security/)* [JD.com](/Tag/JD.com/)* [Kenna Security](/Tag/Kenna%20Security/)* [Large Language Model](/Tag/Large%20Language%20Model/)* [Machine Learning](/Tag/Machine%20Learning/)* [MCubed](/Tag/MCubed/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [Neural Networks](/Tag/Neural%20Networks/)* [NLP](/Tag/NLP/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Personally Identifiable Information](/Tag/Personally%20Identifiable%20Information/)* [Phishing](/Tag/Phishing/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [REvil](/Tag/REvil/)* [Semiconductor Manufacturing International Corporation](/Tag/Semiconductor%20Manufacturing%20International%20Corporation/)* [Shenzhen](/Tag/Shenzhen/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Star Wars](/Tag/Star%20Wars/)* [Surveillance](/Tag/Surveillance/)* [Tensor Processing Unit](/Tag/Tensor%20Processing%20Unit/)* [TLS](/Tag/TLS/)* [TOPS](/Tag/TOPS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [Uyghur Muslims](/Tag/Uyghur%20Muslims/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [APAC](/Tag/APAC/)* [Cybersecurity](/Tag/Cybersecurity/)* [RSA Security](/Tag/RSA%20Security/)* [Self-driving Car](/Tag/Self-driving%20Car/) #### More aboutShare [](https://www.reddit.com/submit?url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dreddit&title=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once) [](https://twitter.com/intent/tweet?text=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once&url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dtwitter&via=theregister) [](https://www.facebook.com/dialog/feed?app_id=1404095453459035&display=popup&link=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dfacebook) [](https://www.linkedin.com/shareArticle?mini=true&url=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dlinkedin&title=RSAC%20wrap%3a%20AI%20and%20China%20on%20everything%2c%20everywhere%2c%20all%20at%20once&summary=With%20North%20Korean%20IT%20workers%20storming%20the%20gates%2c%20too) [](https://api.whatsapp.com/send?text=https://www.theregister.com/2025/05/04/rsac_wrap_ai_china/%3futm_medium%3dshare%26utm_content%3darticle%26utm_source%3dwhatsapp) POST A COMMENT #### More about* [AI](/Tag/AI/)* [China](/Tag/China/)* [RSA Conference](/Tag/RSA%20Conference/) More like these × ### More about* [AI](/Tag/AI/)* [China](/Tag/China/)* [RSA Conference](/Tag/RSA%20Conference/)* [Security](/Tag/Security/) ### Narrower topics* [2FA](/Tag/2FA/)* [Advanced persistent threat](/Tag/Advanced%20persistent%20threat/)* [Application Delivery Controller](/Tag/Application%20Delivery%20Controller/)* [Authentication](/Tag/Authentication/)* [BEC](/Tag/BEC/)* [Black Hat](/Tag/Black%20Hat/)* [BSides](/Tag/BSides/)* [Bug Bounty](/Tag/Bug%20Bounty/)* [CHERI](/Tag/CHERI/)* [China Mobile](/Tag/China%20Mobile/)* [China telecom](/Tag/China%20telecom/)* [China Unicom](/Tag/China%20Unicom/)* [CISO](/Tag/CISO/)* [Common Vulnerability Scoring System](/Tag/Common%20Vulnerability%20Scoring%20System/)* [Cybercrime](/Tag/Cybercrime/)* [Cybersecurity and Infrastructure Security Agency](/Tag/Cybersecurity%20and%20Infrastructure%20Security%20Agency/)* [Cybersecurity Information Sharing Act](/Tag/Cybersecurity%20Information%20Sharing%20Act/)* [Cyberspace Administration of China](/Tag/Cyberspace%20Administration%20of%20China/)* [Data Breach](/Tag/Data%20Breach/)* [Data Protection](/Tag/Data%20Protection/)* [Data Theft](/Tag/Data%20Theft/)* [DDoS](/Tag/DDoS/)* [DeepSeek](/Tag/DeepSeek/)* [DEF CON](/Tag/DEF%20CON/)* [Digital certificate](/Tag/Digital%20certificate/)* [Encryption](/Tag/Encryption/)* [Exploit](/Tag/Exploit/)* [Firewall](/Tag/Firewall/)* [Gemini](/Tag/Gemini/)* [Google AI](/Tag/Google%20AI/)* [GPT-3](/Tag/GPT-3/)* [GPT-4](/Tag/GPT-4/)* [Great Firewall](/Tag/Great%20Firewall/)* [Hacker](/Tag/Hacker/)* [Hacking](/Tag/Hacking/)* [Hacktivism](/Tag/Hacktivism/)* [Hong Kong](/Tag/Hong%20Kong/)* [Identity Theft](/Tag/Identity%20Theft/)* [Incident response](/Tag/Incident%20response/)* [Information Technology and the People’s Republic of China](/Tag/Information%20Technology%20and%20the%20People%27s%20Republic%20of%20China/)* [Infosec](/Tag/Infosec/)* [Infrastructure Security](/Tag/Infrastructure%20Security/)* [JD.com](/Tag/JD.com/)* [Kenna Security](/Tag/Kenna%20Security/)* [Large Language Model](/Tag/Large%20Language%20Model/)* [Machine Learning](/Tag/Machine%20Learning/)* [MCubed](/Tag/MCubed/)* [NCSAM](/Tag/NCSAM/)* [NCSC](/Tag/NCSC/)* [Neural Networks](/Tag/Neural%20Networks/)* [NLP](/Tag/NLP/)* [Palo Alto Networks](/Tag/Palo%20Alto%20Networks/)* [Password](/Tag/Password/)* [Personally Identifiable Information](/Tag/Personally%20Identifiable%20Information/)* [Phishing](/Tag/Phishing/)* [Quantum key distribution](/Tag/Quantum%20key%20distribution/)* [Ransomware](/Tag/Ransomware/)* [Remote Access Trojan](/Tag/Remote%20Access%20Trojan/)* [REvil](/Tag/REvil/)* [Semiconductor Manufacturing International Corporation](/Tag/Semiconductor%20Manufacturing%20International%20Corporation/)* [Shenzhen](/Tag/Shenzhen/)* [Spamming](/Tag/Spamming/)* [Spyware](/Tag/Spyware/)* [Star Wars](/Tag/Star%20Wars/)* [Surveillance](/Tag/Surveillance/)* [Tensor Processing Unit](/Tag/Tensor%20Processing%20Unit/)* [TLS](/Tag/TLS/)* [TOPS](/Tag/TOPS/)* [Trojan](/Tag/Trojan/)* [Trusted Platform Module](/Tag/Trusted%20Platform%20Module/)* [Uyghur Muslims](/Tag/Uyghur%20Muslims/)* [Vulnerability](/Tag/Vulnerability/)* [Wannacry](/Tag/Wannacry/)* [Zero trust](/Tag/Zero%20trust/) ### Broader topics* [APAC](/Tag/APAC/)* [Cybersecurity](/Tag/Cybersecurity/)* [RSA Security](/Tag/RSA%20Security/)* [Self-driving Car](/Tag/Self-driving%20Car/) #### TIP US OFF[Send us news](https://www.theregister.com/Profile/contact/)[#### China is using AI to sharpen every link in its attack chain, FBI warnsRSAC Artificial intelligence is helping Beijing’s goons break in faster and stay longerSpotlight on RSAC5 days -| 10](/2025/04/29/fbi_china_ai/?td=keepreading) [#### We’re calling it now: Agentic AI will win RSAC buzzword BingoRSAC All aboard the hype trainSpotlight on RSAC11 days -| 8](/2025/04/23/agentic_ai_rsac/?td=keepreading) [#### Anthropic calls for tougher GPU export controls as Nvidia’s CEO implores Trump to spread the AI love+Comment This couldn’t possibly be about Chinese model builders taking some of the shine off US rivals, could it?AI Infrastructure Month4 days -| 10](/2025/05/01/anthropic_limit_gpus/?td=keepreading) [#### Building a better digital future for SMEsHow smaller businesses can grab the opportunities that AI and advanced collaboration and connectivity tools give themSponsored Feature](/2025/03/26/building_a_better_digital_future/?td=keepreading) [#### Generative AI makes fraud fluent — from phishing lures to fake loversRSAC Real-time video deepfakes? Not convincing yetSpotlight on RSAC2 days -| 5](/2025/05/02/gen_ai_spam/?td=keepreading) [#### Ex-NSA cyber-boss: AI will soon be a great exploit coderRSAC For now it’s a potential bug-finder and friend to defendersSpotlight on RSAC4 days -| 12](/2025/04/30/exnsa_cyber_boss_ai_expoit_dev/?td=keepreading) [#### How Amazon red-teamed Alexa+ to keep your kids from ordering 50 pizzasRSAC Will the personal assistant shop for groceries? Or get hijacked by a teen?Spotlight on RSAC3 days -| 33](/2025/05/01/amazon_red_teamed_alexaplus_interview/?td=keepreading) [#### Ex-NSA chief warns AI devs: Don’t repeat infosec’s early-day screwupsBake in security now or pay later, says Mike RogersAI Software Development Week11 days -| 6](/2025/04/23/exnsa_boss_ai/?td=keepreading) [#### China now America’s number one cyber threat — US must get up to speedRSAC Former Rear Admiral calls for National Guard online deployment and corporates to be held accountableSpotlight on RSAC5 days -| 22](/2025/04/29/china_us_cyber_threat/?td=keepreading) [#### Nvidia rolls out NeMo microservices to help AI help you help AISmarter agents, continuous updates, and the eternal struggle to prove ROIAI Software Development Week11 days -| 7](/2025/04/23/nvidia_nemo_microservices/?td=keepreading) [#### AI models routinely lie when honesty conflicts with their goalsKeep plugging those LLMs into your apps, folks. This neural network told me it’ll be fineAI + ML3 days -| 37](/2025/05/01/ai_models_lie_research/?td=keepreading) [#### Microsoft 365 Copilot gets a new crew, including Researcher and Analyst botsYou. Will. Love. The. LLM.AI Software Development Week11 days -| 5](/2025/04/23/microsoft_365_copilot_agent_refresh/?td=keepreading)
Related Tags:
NAICS: 55 – Management Of Companies And Enterprises
NAICS: 921 – Executive
Legislative
Other General Government Support
NAICS: 54 – Professional
Scientific
Technical Services
NAICS: 541 – Professional
Scientific
Technical Services
NAICS: 518 – Computing Infrastructure Providers
Data Processing
Web Hosting
Related Services
NAICS: 92 – Public Administration
NAICS: 922 – Justice
Public Order
Safety Activities
NAICS: 51 – Information
NAICS: 928 – National Security And International Affairs
Associated Indicators:


