Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Using AI in Security Operations: A Practical Checklist for the Modern SOC

AI is transforming how security operations centers (SOCs) work, but the hype can outpace the reality. You don’t need to build custom models or deploy cutting-edge platforms to benefit. Chances are, you already have AI-powered capabilities in your SIEM, SOAR, or security data platforms. The question is: Are they doing anything useful? This practical playbook lays out six key priorities to increase productivity and effectiveness while maintaining control.

Intel Chat: Salt Typhoon, Scattered LapSus Hunters, WhatsApp compromise & AI-assisted attack [245]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Preventing AI Agents from Going Rogue: Zenity Collaborates with Microsoft Copilot Studio to Deliver Inline Protection Against Malicious Behavior

AI agents are autonomous, powerful, and deeply embedded in how modern businesses operate. From rerouting customer support emails to accessing critical business tools like email and CRM systems, agents are transforming workflows across departments. As of Microsoft’s Q1 2025 earnings report, over 230,000 organizations, including 90% of the Fortune 500, are using Microsoft Copilot Studio to build custom agents for a huge variety of tasks.

Securing Identity in the Age of AI: A Buyer's Guide to Teleport

As enterprises embrace AI, identity has become the defining security challenge. Every new database, Kubernetes cluster, SaaS app, and now every AI agent introduces yet another identity that must be governed and protected. At the same time, attackers are weaponizing AI to accelerate identity-based threats, exploiting fragmentation and credential sprawl to devastating effect.

From Firewalls to AI: Understanding the Evolution of Cybersecurity

From Firewalls to AI: Understanding the Evolution of Cybersecurity The history of IT security has always been a journey of adapting to new threats. It started with simple firewalls to protect the "front door" and evolved to include endpoint, database, and Docker security. But what happens when the very intelligence you're building becomes a new kind of front door—and a new attack surface?

AI Regulations and Frameworks: Preparing for Compliance and Resilience

‍Artificial intelligence (AI) has departed from the realm of science fiction and emerged as a very real, regular part of life, increasing efficiency across a number of everyday activities. Particularly in the marketplace, where process optimization directly equates to time and money, general-purpose AI (GenAI) and other AI systems have rapidly taken on a central role.

Rising Importance of Secure Healthcare Data Destruction

Healthcare organizations are generating more data than ever before. From electronic health records (EHRs) and medical billing information to diagnostic images and insurance credentialing documents, the amount of sensitive information stored and shared across systems continues to grow. With this growth comes a heightened risk of breaches, identity theft, and regulatory penalties if the data is not managed and disposed of properly.

How Trust Centers and AI are replacing security questionnaires and accelerating B2B sales

As Anna say in the podcast, “Security reviews show up just when you think the deal is about to close. It’s like a final boss that no one wants to fight.” The last-mile friction caused by security diligence isn’t new, but it’s becoming more painful as deal cycles tighten and expectations around transparency rise. Buyers want answers faster. Vendors want to close faster. And security teams, stuck in the middle, are often left juggling risk, reputation, and revenue timelines.