Fluency Security
  • Home
  • Papers
  • Replay
  • About
Sign in Subscribe
SIEM vs Data Lake
SOC

SIEM vs Data Lake

It’s easy to mistake a Security Information Event Management (SIEM) for a data lake. Both ingest large volumes of telemetry, offer search capabilities, and support investigations.
Read More
Chris Jordan
Why Generative AI Hasn’t Reshaped Business
AI

Why Generative AI Hasn’t Reshaped Business

95% of AI pilots fail to deliver measurable business impact. Only 5% of enterprise AI projects reach operational deployment, and even fewer show sustainable ROI. Why?
Read More
Chris Jordan
Do we use AI to defend from AI?
AI

Do we use AI to defend from AI?

AI-assisted attacks are not yet being uniquely defended by AI-aware systems. Most defensive tools using AI are blind to whether the adversary used AI at all. So what’s really happening beneath the surface?
Read More
Chris Jordan
The SIEM Beneath the AI Icing
SOC

The SIEM Beneath the AI Icing

What are the characteristics of a SIEM that make it a good match for AI workflows and AI in general?
Read More
Chris Jordan
Security in ChatGPT-5
AI

Security in ChatGPT-5

ChatGPT-5 modifications, while not overhauling the core architecture, alter the way the system communicates, guides decision-making, and handles potentially harmful requests.
Read More
Chris Jordan
The Identity Game: What Does it mean for SIEMs?
SOC

The Identity Game: What Does it mean for SIEMs?

IdentitySIEM isn’t a new technology—it’s a long-overdue shift in perspective, recognizing that identity, not machines, is the foundation of meaningful security analysis in modern cloud environments.
Read More
Chris Jordan
Is Docker Right to Warn About MCP?
News

Is Docker Right to Warn About MCP?

Docker issued a strongly worded security advisory urging developers to stop using the Model Context Protocol (MCP), citing widespread vulnerabilities that include remote code execution, credential leakage, and unauthorized file access.
Read More
Chris Jordan
State of AI Vulnerability 2025
News

State of AI Vulnerability 2025

The Reality of AI Vulnerabilities: What the Data Actually Says There is
Read More
Chris Jordan
Prompt Injection
Cybersecurity

Prompt Injection

Prompt injection is a relatively new term in cybersecurity, and one that many people are still unaware even exists.
Read More
Chris Jordan
Understanding MCP for use in AI-SIEM/SOAR
AI

Understanding MCP for use in AI-SIEM/SOAR

if we’re going to move beyond toy examples and build real, automated Gen-AI workflows — especially in high-stakes domains like SOAR or SIEM — we need more than just clever prompting. We need structure. We need security. And we need governance.
Read More
Chris Jordan
Jobs in an AI-SOC
SOC

Jobs in an AI-SOC

You feel the ground shifting—and you should. AI isn’t nibbling
Read More
Chris Jordan
How do AI Workflows differ from SOAR Playbooks?
Cybersecurity

How do AI Workflows differ from SOAR Playbooks?

You have two logins. One from Spain. One from Switzerland. Eight minutes
Read More
Chris Jordan
Fluency Security © 2025
  • Sign up
Powered by Ghost