
Get an inside look at what Barracuda was up to at Black Hat USA 2023
Last week I got the chance to head to Las Vegas for the Black Hat USA Conference, and I got to experience all the exciting things the Barracuda team was doing at the show. Let me walk you through some of the highlights. Of course, we had to kick things off with the obligatory photo in front of the Black Hat sign after registration. (Pictured above, me and Barracuda CTO, Fleming Shi.)
Cybersecurity in the Age of AI


What I took away from the discussion is that there is more optimism than concern when it comes to generative AI, given the number of positive applications for our defenders. However, there are still a lot of unknowns, and in the words of Fleming Shi, “It’s really the speed and volume you're going to get from using generative AI — because it's capable of generating content very quickly given some direction, some prompts, and will be able to actually handle and deliver digital weapons much quicker.”
A big thank you to all our reporter friends who joined us for this insightful discussion. You can read more on the panel in this article from Forbes.
On the show floor
Barracuda also had fun on the show floor, talking to customers, catching up with friends, winning awards — even Elvis showed up.




Elvis stopped by.
Off the show floor



Fleming and I were also able to catch up more with OpenPolicy Founder Dr. Amit Elazari, J.S.D.
Back at the show
We had some great meetings with Forrester analyst Jess Burn, GigamOm analyst Howard Holton, and Fernando Montenegro from Omdia.



Informe de Barracuda sobre Ransomware 2025
Principales conclusiones sobre la experiencia y el impacto del ransomware en las organizaciones de todo el mundo
Suscríbase al blog de Barracuda.
Regístrese para recibir Threat Spotlight, comentarios de la industria y más.

Seguridad de vulnerabilidades gestionada: corrección más rápida, menos riesgos, cumplimiento normativo más fácil
Descubra lo fácil que es encontrar las vulnerabilidades que los ciberdelincuentes quieren explotar.