SOC SIEM vs Data Lake It’s easy to mistake a Security Information Event Management (SIEM) for a data lake. Both ingest large volumes of telemetry, offer search capabilities, and support investigations.
AI Why Generative AI Hasn’t Reshaped Business 95% of AI pilots fail to deliver measurable business impact. Only 5% of enterprise AI projects reach operational deployment, and even fewer show sustainable ROI. Why?
AI Do we use AI to defend from AI? AI-assisted attacks are not yet being uniquely defended by AI-aware systems. Most defensive tools using AI are blind to whether the adversary used AI at all. So what’s really happening beneath the surface?
SOC The SIEM Beneath the AI Icing What are the characteristics of a SIEM that make it a good match for AI workflows and AI in general?
AI Security in ChatGPT-5 ChatGPT-5 modifications, while not overhauling the core architecture, alter the way the system communicates, guides decision-making, and handles potentially harmful requests.
SOC The Identity Game: What Does it mean for SIEMs? IdentitySIEM isn’t a new technology—it’s a long-overdue shift in perspective, recognizing that identity, not machines, is the foundation of meaningful security analysis in modern cloud environments.
News Is Docker Right to Warn About MCP? Docker issued a strongly worded security advisory urging developers to stop using the Model Context Protocol (MCP), citing widespread vulnerabilities that include remote code execution, credential leakage, and unauthorized file access.
News State of AI Vulnerability 2025 The Reality of AI Vulnerabilities: What the Data Actually Says There is
Cybersecurity Prompt Injection Prompt injection is a relatively new term in cybersecurity, and one that many people are still unaware even exists.
AI Understanding MCP for use in AI-SIEM/SOAR if we’re going to move beyond toy examples and build real, automated Gen-AI workflows — especially in high-stakes domains like SOAR or SIEM — we need more than just clever prompting. We need structure. We need security. And we need governance.
Cybersecurity How do AI Workflows differ from SOAR Playbooks? You have two logins. One from Spain. One from Switzerland. Eight minutes