Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Designing an Agentic AI Copilot: 8 Principles from Building Nyx

Everyone’s racing to build copilots right now. But making an agentic AI that feels like a trusted teammate—one that understands context, acts safely, and simplifies complex workflows—is harder than it looks. While building Nyx, our agentic AI copilot for security teams, our team spent a lot of time thinking about how to make her an effective team member - skilled and trustworthy.

You Can't Automate What You Don't Understand: Why Context Is the Missing Link in Exposure Management

In our recent webinar featuring Enterprise Strategy Group Principal Analyst, Tyler Shields, we discussed the widening gap between vulnerabilities organizations know about and what they can realistically fix. Most teams are swamped. Too much data, too many tools, and not enough people. Naturally, automation and AI come up as potential solutions. One comment from Tyler has stuck with me since watching and subsequently reviewing the webinar recording.

Mission Control for Modern Risk

Financial institutions face a harsh reality. As cyberattacks have become more sophisticated and move with greater velocity, a single incident can ripple across IT systems, payment networks, and customer accounts long before the organization can respond. The problem? Most security, fraud, IT operations, and risk teams still operate in silos. Each team monitors their own consoles, works from its own data, and follows its own playbooks.

Beyond PCI and HIPAA: How Feroot Powers General Data Protection Regulation (GDPR) Compliance

Yes. If your website is accessible in the EU and collects any user data—through forms, cookies, session recordings, pixels, or embedded scripts—then GDPR likely applies. But compliance isn’t as simple as publishing a privacy policy or showing a cookie banner. Modern web apps expose personal data through invisible front-end technologies like third-party JavaScript, ad tags, tag managers, and behavioral trackers.

From weeks to minutes: How Sumo Logic's historic baselining supercharges UEBA

Spotting threats fast and knowing whether they really matter is the name of the game in cybersecurity. That’s where user and entity behavior analytics (UEBA) comes in, and why Sumo Logic’s latest innovation, historic baselining, is a big deal. With this release, Sumo Logic has turned the old UEBA model on its head, delivering insights that used to take weeks of learning time in just minutes. Here’s how and why that’s a game changer.

Breaking Free from Security Debt: Lessons from Leading Organizations

Security debt is a pervasive challenge affecting organizations of all sizes, and it’s only growing. According to the 2025 State of Software Security Report (SoSS), 74% of organizations have accrued security debt, with nearly half of this security debt being critical in nature. This accumulation of unresolved flaws, especially severe ones, poses long-term risks to an organization’s resilience and effectiveness.

Netskope BEAM: Open Source Detector for Supply Chain Compromise

Netskope Threat Labs is pleased to announce the release of a new open-source tool that detects supply chain attacks. Our new tool, Behavioral Evaluation of Application Metrics (BEAM), requires no endpoint agent deployment and will analyze the network traffic you are already capturing in your organization to determine if your applications are communicating with unusual hosts that could be part of an attack. This tool is the subject of a 2025 Black Hat USA briefing.

Where Fidelis NDR Fills the Gaps Left by Your Secure Web Gateway

Secure Web Gateways (SWGs) have become a cornerstone of enterprise security. They filter web traffic, enforce policies, and block known threats. But as attackers get smarter, many organizations are realizing one hard truth: a Secure Web Gateway alone is not enough.

A SOC Toolbelt: Best Practices for Security Operations

To keep pace with rapidly evolving threats and the decreasing breakout times of attackers, the LevelBlue security operations team leverages multiple tools and key partnerships to shorten the time between detection and response. Below are some examples of the tools used by our SOC and some of the circumstances in which each tool would be used.

Why Prompt Scanning & Filtering Fails to Detect AI Risks [& What to do Instead]

Enterprises deploying AI agents and LLMs often look to prompt scanning as their first line of defense against privacy and security breaches. The idea is simple: analyze the text of the user’s prompt before it reaches the model, detect it for sensitive keywords or patterns, and block the sensitive words that may trigger a security or compliance issue. Enterprises thought this was a safe around, till they walked into unexpected issues.