Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

AI Attacks Are Coming in a Big Way Now!

AI is going to allow better, faster, and more pervasive attacks. For a few years, if you attended one of my presentations involving AI, I would tell you all about AI and AI threats…perhaps even scare you a bit…and then tell you this, “AI attacks are coming, but how you are likely to be attacked this year doesn’t involve AI. It will be the same old attacks that have worked for decades.” I always got lots of comforted smiles from those ending lines. But this year is different.

Ten new and updated apps for securing and monitoring your environments

Whether you rely on Sumo Logic for securing your systems, monitoring your infrastructure, or maximizing application performance, connecting to your tech stack is essential. That’s why we continuously release new apps and upgrade existing ones, ensuring you can easily connect to your stack and visualize key data with out-of-the-box dashboards. Let’s dive into some of the latest additions to our app catalog, designed to help you monitor, secure, and optimize your environment.

A 7-step Essential Eight compliance checklist

Implementing Essential Eight (E8) is mandatory for in-scope organisations, such as government agencies, critical infrastructure providers, and other non-corporate Commonwealth entities (NCEs). ‍ Even if your organisation isn’t scoped by the framework, aligning with E8 is recommended because it outlines the baseline requirements for defending against cyber threats.

LevelBlue Momentum Continues with Two Acquisitions

In late May, I wrote a blog post titled “One Year of LevelBlue: Milestones, Momentum, and a Vision for the Future.” Year one for LevelBlue was definitely a time of growth, change, and excitement! Today, I am writing to highlight LevelBlue’s continued momentum in the market through two recently announced acquisitions. On June 11, LevelBlue announced its acquisition of Aon’s Cybersecurity and IP Litigation Consulting groups, Stroz Friedberg and Elysium Digital.

Data is the key to building modern AI workflows

In this guest post, Eric Newcomer, Principal Analyst at Intellyx, explains why data is essential for building and running effective AI workflows. In the current phase of AI transformation, everyone is discovering many applications for gen AI, especially chats with LLM trained data, public as well as private. One interesting application of AI is building modern workflows to automate operational processes.

Unified Threat Management (UTM): The Complete Guide to Modern Cybersecurity Solutions

Key takeaways Cyber threats today are anything but simple. With attackers using every trick in the book — and inventing new ones all the time — businesses need more than a one-size-fits-all approach to cybersecurity. You require diverse cybersecurity solutions to face a variety of threat vectors. These threats are diverse, evolving, and target multiple layers of your IT environment.

Microsoft Copilot and Data Security: Tracing AI's Role in the Enterprise

Artificial intelligence is no longer a distant vision—it’s a present-day force reshaping how enterprises manage, process, and secure their data. Among the most influential innovations driving this transformation is Microsoft Copilot. Marketed as an AI-powered productivity enhancer, Copilot integrates seamlessly with Microsoft 365 applications, unlocking new levels of efficiency across industries.

An Enterprise Security Strategy That Turns SecOps Into Heroes

The tension between security teams and developers is palpable. Developers are considered impatient risk-takers, while SecOps folks are barely tolerated as a hindrance to adopting new tools and workflows. Weekly sprints, tight deadlines, and looming security threats (especially in the GenAI and vibe coding era) exacerbate this tension.

Microsoft Retires PowerShell 2.0 in Windows 11

The move to remove PowerShell 2.0 from Windows 11 is strategic and long overdue. Microsoft is making this move to embrace modern, secure, and efficient system tools. PowerShell 2.0 has many inherent security issues tied to the deprecated framework and its reliance on deprecated encryption & validation protocols.