Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Native SOAR in Log360 Cloud: Closing the gap between detection and response

Security teams today don’t struggle because they lack visibility. They struggle because every meaningful investigation still depends on too much manual work. An alert fires. Analysts pivot between dashboards. They pull identity context from one tool, endpoint telemetry from another, and threat intelligence from somewhere else entirely. Then comes the response; disabling users, isolating endpoints, resetting passwords, notifying stakeholders, documenting incidents.

SMBs Hit a Cybersecurity Breaking Point as 91% Fear AI-Driven Attacks, Driving Shift to MSP-Led Security Models, WatchGuard Finds

LONDON, May 20 2026 -New research from WatchGuard Technologies, a global leader in unified cybersecurity for MSPs, reveals that while most businesses believe they are adequately staffed, the complexity, speed, and scale of modern threats - especially those powered by artificial intelligence - have outpaced what internal teams can realistically manage. The result is a fundamental shift away from do-it-yourself security toward externally delivered, always-on protection models.

Torq Acquires Jit: The Grounding Layer the AI SOC Has Been Missing

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo AI in security operations is moving fast. Agent capabilities are compounding, and the conversation has shifted from whether AI belongs in the SOC to how much it can take on alongside human analysts. But every serious conversation with a CISO eventually lands on the same question: can I trust it? Trust isn’t a model problem. It’s a grounding problem.

Introducing Bitsight Beacon: Supply Chain Exposure Management for the SOC

The ripple effects of a cyberattack rarely stay contained. Modern organizations rely on vast ecosystems of vendors, suppliers, SaaS providers, and partners. As those connections deepen, so does the potential blast radius of a third-party compromise. What begins as an exposed system or stolen credential inside a vendor environment can quickly cascade across the supply chain. Attackers understand this. Increasingly, they target trusted third parties as an indirect path into larger organizations.

Grid by LimaCharlie is now in beta: Agentic SecOps for the stack you have

Grid is LimaCharlie's agentic AI layer for security teams that want AI operations running across their existing stack right now. Security providers and SOCs need access to AI capabilities without waiting for a migration window, a contract renewal, or a vendor to ship the features they need. Every major security vendor is offering some version of AI. CrowdStrike has Charlotte AI. SentinelOne has Purple AI. Microsoft has Copilot for Security.

Keeper Endpoint Privilege Manager earns "Good" rating from connect professional

Keeper Security has once again been recognized by the German technology publication connect professional. In its latest independent test, Keeper Endpoint Privilege Manager (EPM) received a “good” (GUT) rating, highlighting the platform’s strong capabilities for securing and managing endpoint privileges.

Introducing Keeper's Discovery Rules Engine

Modern IT environments span on-premises, hybrid and multi-cloud infrastructure, and every new asset added needs to be discovered, evaluated and brought under access control. Discovery tools can surface those resources, but without automation, processing them is slow, inconsistent and prone to error. Critical assets get missed, and security gaps open.