AI Security in ChatGPT-5 ChatGPT-5 modifications, while not overhauling the core architecture, alter the way the system communicates, guides decision-making, and handles potentially harmful requests.
SOC The Identity Game: What Does it mean for SIEMs? IdentitySIEM isn’t a new technology—it’s a long-overdue shift in perspective, recognizing that identity, not machines, is the foundation of meaningful security analysis in modern cloud environments.
News Is Docker Right to Warn About MCP? Docker issued a strongly worded security advisory urging developers to stop using the Model Context Protocol (MCP), citing widespread vulnerabilities that include remote code execution, credential leakage, and unauthorized file access.
News State of AI Vulnerability 2025 The Reality of AI Vulnerabilities: What the Data Actually Says There is
Cybersecurity Prompt Injection Prompt injection is a relatively new term in cybersecurity, and one that many people are still unaware even exists.
AI Understanding MCP for use in AI-SIEM/SOAR if we’re going to move beyond toy examples and build real, automated Gen-AI workflows — especially in high-stakes domains like SOAR or SIEM — we need more than just clever prompting. We need structure. We need security. And we need governance.
Cybersecurity How do AI Workflows differ from SOAR Playbooks? You have two logins. One from Spain. One from Switzerland. Eight minutes
SOC Rethinking the SOC Three-Tier Model In cybersecurity, operational models are more than academic—they define how teams
AI What is AI's Job with a SIEM? The rise of generative AI has reignited excitement across cybersecurity, with many
Cybersecurity Deploying and Maturing a SIEM for Effective Security By Chris Jordan: I often write on more advanced topics, but I
Cybersecurity The Evolution of Cybersecurity: From Hacking Culture to AI-Driven Defense By Chris Jordan The Early Days: A Culture of Curiosity For many