Futures
Access hundreds of perpetual contracts
TradFi
Gold
One platform for global traditional assets
Options
Hot
Trade European-style vanilla options
Unified Account
Maximize your capital efficiency
Demo Trading
Introduction to Futures Trading
Learn the basics of futures trading
Futures Events
Join events to earn rewards
Demo Trading
Use virtual funds to practice risk-free trading
Launch
CandyDrop
Collect candies to earn airdrops
Launchpool
Quick staking, earn potential new tokens
HODLer Airdrop
Hold GT and get massive airdrops for free
Launchpad
Be early to the next big token project
Alpha Points
Trade on-chain assets and earn airdrops
Futures Points
Earn futures points and claim airdrop rewards
Broadcom, Strengthens AI-Based Cybersecurity Attack Defense Strategy
Broadcom experts emphasize a lateral threat protection strategy to counter AI attacks. At RSAC 2026, Umesh Mahajan and Prashant Gandhi discussed recent cybersecurity threats, noting that AI has the ability to detect open-source code vulnerabilities and execute automated attacks at ultra-high speeds. To address these AI-based threats, deep defense, especially lateral threat protection, is becoming increasingly important.
Mahajan stated, “AI excels at finding vulnerabilities,” and attackers no longer need to manually read code. AI is bypassing existing security layers, increasing pressure on systems. This is why Broadcom is enhancing its defense strategy through lateral threat protection. Gandhi also explained that the ultimate goal of AI-generated attacks is to breach perimeter defenses, enter internal systems, and spread laterally through weak assets.
Broadcom is advancing toward platform-centric lateral threat protection, aiming to implement security strategies more directly and improve complex deployment processes. Recognizing that customers face challenges with deployment complexity rather than a lack of tools, Broadcom is offering solutions that enable easier implementation of zero trust. Mahajan emphasized, “Starting simply and then automating to show how to meet needs is crucial.” This provides an effective approach to accelerate the transition to zero trust and counter complex cyber threats.