Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

SOAR & DSDL: Crossover for Agentic AI Workflow

Recently we released the Splunk App for Data Science and Deep Learning (DSDL) v5.2.0. This update introduced new features for integrating large language models (LLMs) and retrieval-augmented generation (RAG). With DSDL v5.2.0, users can easily perform LLM prompts, vector searches, RAG, and function calling directly from the app's dashboards.

Enabling Safe AI Adoption: Insights from Nightfall AI and Vanta

How should data security teams walk the fine line between enabling AI innovation, safeguarding sensitive data, and ensuring compliance? That question drives everything we build at Nightfall. It’s also an excellent jumping off point for an in-depth discussion among security experts.

Introducing AI-Driven Policy Management for Better Security

Firewall policy management has reached a critical point, characterized by misconfigurations, overly complex rules, and ongoing audits. The burden continues to fall on already-stretched security teams. For CISOs, the question isn’t whether policies are being enforced; it’s whether they’re aligned, effective, and resilient across every location and environment.

80s to AI - Career Talk - Tanium Tech Talks #127

A fire side chat from the heart with Ashley, reviewing 40 years in technology and career advice for uncertain times. What is the meta-narrative of a technology career? How can I differentiate myself in the tech career field? How can I differentiate myself among other job applicants? What is the next fun tech I could tackle? How do you keep a lifelong career fresh and fun? What are my options in a tech career?

Why AI governance is now a CISO imperative

Let’s be real: 2024 is the year AI went from pilot to policy. And in 2025, it’s not slowing down. Every enterprise I talk to, from high-growth SaaS companies to large-scale global platforms, implements AI internally or embeds it into its products. With that momentum comes a wave of questions: Is this secure? Are we exposing customer data? What will our auditors say? CISOs are now expected to balance innovation with protection, fostering progress while staying ahead of risk.

Achieve AI-Driven Policy Hygiene & Eliminate Policy Sprawl

Firewall policies are essential, but over time, they become cluttered, misaligned, and hard to manage. That complexity puts Zero Trust and audit readiness at risk. Cato’s Autonomous Policies for Firewall as a Service (FWaaS) change that. This video shows how Cato applies AI to continuously assess and optimize your firewall policy set, removing outdated rules, identifying gaps, and simplifying ongoing management.

Identity Is the New Root Access: Rethinking Zero Trust in DevOps Environments

Amal Mammadov is a cloud security and detection engineering specialist working at the frontlines of identity-driven threats in modern cloud environments. His work focuses on how attackers exploit permissions, tokens, and machine identities, often without triggering traditional security controls. In this conversation, he breaks down why Zero Trust is no longer about networks but about controlling identity in fast-moving DevOps systems.

Embeddings vs. Generative Models #AI #RAG #AIExplained #MachineLearning #OpenAI #LLMs #AIsecurity

Not all AI models are made to generate. Some are built to understand. Here’s the key difference: Generative models take in text and produce new text (think ChatGPT). Embedding models take in text and translate it into numbers, vectors that capture meaning. Why does that matter? Because embedding models let you turn documents into searchable vectors. That means when someone asks a question, you don’t need to search the whole doc, you just find the most relevant chunks based on meaning. And that’s what makes things like RAG (Retrieval-Augmented Generation) powerful and efficient.