Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding AI and Data Privacy: Key Principles

AI is now part of customer service, product design, operations, and decision making. That reach brings real benefits, and it also surfaces personal and sensitive data in new places. It raises the question: How do we ship useful AI while protecting people and meeting laws? This guide helps you understand AI and data privacy as one practice through core principles, common pitfalls, practical controls, and a step by step plan to build privacy into your AI stack from the start.

From Shadow IT to Shadow AI: The Evolution of Unseen Risk

Security leaders are well acquainted with Shadow IT; the unsanctioned apps, services, and even devices employees adopt to bypass bureaucracy and accelerate productivity. Think rogue cloud storage, messaging platforms, or unapproved SaaS tools. These all often slip past governance until they trigger a breach, compliance issue, or operational failure. Now, a more complex threat is emerging - Shadow AI.

CrowdStrike Launches Agentic Security Workforce to Transform the SOC

AI has redrawn the cyber battlefield. Adversaries are already automating every phase of the kill chain to strike faster, scale wider, and overwhelm defenders. Manual workflows and conversational assistants help teams move faster, but still bind them to human speed. Agentic AI changes the equation. It enables security teams to deputize trusted, mission-ready agents that reason, decide, and act on their behalf — at the speed of AI. The promise of agentic AI is clear.

AI in IoT Security: How Machine Learning Prevents Botnet Attacks Like Eleven11Bot

The Internet of Things (IoT) ecosystem is expanding rapidly, connecting billions of devices across industries. While this connectivity drives efficiency and innovation, it also introduces massive cyber risks. The IoT ecosystem is an interconnected environment of devices, systems, and technologies, making security especially complex. Attackers are increasingly using automation and artificial intelligence (AI) to launch sophisticated attacks at scale.

How AI is (or should be) changing SOC workflows with Matt Bromiley

We dove into AI in the SOC with Matt Bromiley from Prophet Security! Matt broke down how AI is transforming (and should be transforming) SOC workflows. Whether you're already using AI tools or wondering where to start, this is the conversation you don't want to miss.

LCQL Made Simple with AI #cybersecurity #ai

LimaCharlie Query Language (LCQL) enables security teams to search across their entire multi-platform fleet, from Windows Event Logs to Linux package installations to macOS volume mounts. Our MCP server allows users to generate LCQL queries from plain-text language commands. Eric Capuano, founder of Digital Defense Institute, demoed this during our webinar: "I want an LCQL query that'll go and find processes in the last twenty four hours that exhibit signs of x. I can just give it that instruction... that MCP tool will work it out and give Claude the ideal LCQL query to run.".