Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Enter the SOC of the Future in Splunk's State of Security 2025

SOC leaders that aren’t thinking about the future are already behind — and what’s beyond 2025 is rapid evolution. The breakneck pace of AI innovation, a widening skills gap, and increasingly sophisticated threat tactics will encourage (one could even say force) SOC teams to embrace forward-leaning strategies to stay resilient.

Connected Car Security: Automotive IoT Threats and Protection

The automotive industry stands at a critical juncture where traditional mechanical systems converge with sophisticated digital technologies. Modern vehicles contain hundreds of electronic control units (ECUs), multiple communication networks, and constant connectivity to external systems. This transformation has created unprecedented opportunities for innovation while simultaneously introducing complex cybersecurity challenges that threaten both vehicle safety and driver privacy.

What Is Scattered Spider? Inside the Rise of Identity-Based Attacks

If you’ve been following major cybersecurity incidents over the past couple of years, chances are you’ve come across the name Scattered Spider. From massive casino breaches to healthcare system outages, this threat actor has become a name that CISOs don’t take lightly. But what is Scattered Spider, really? And why is this group of cybercriminals getting so much attention? Scattered Spider is a financially motivated group that came into focus around 2022.

A Guide to Perimeter Defense in Modern Networks

Organizations can’t run without digital systems and connected technologies in today’s fast-moving world. This digital adoption opens new doors for cyber threats as well. Hackers are becoming more advanced and finding new ways to attack organizations’ IT systems to steal sensitive data, disrupt their operations, and harm brand credibility.

Understanding SBOM Standards: A Look at CycloneDX, SPDX, and SWID

Modern applications are no longer giant monoliths, they are a collection of micro services, open-source components, and third-party tools. But this makes it very difficult to actually understand the insides of our applications, particularly when you consider that our open-source dependencies also have open-source dependencies! The Software Bill of Materials (SBOM) plays a key role here. SBOMs provide a detailed inventory of all software components.

Secure your Slack environment with Sumo Logic Cloud SIEM

Slack has become integral for many organizations, powering everything from internal to external communication and project workflows. But as adoption grows, so does risk. Hackers are increasingly targeting Slack as it often contains intellectual property, credentials, and valuable reconnaissance information. Sumo Logic Cloud SIEM now secures your Slack usage against insider and third-party threats by monitoring audit logs for suspicious activity to keep your company and its data protected.

Outpost24 introduces AI-powered Digital Risk Protection (DRP)

Digital Risk Protection (DRP) helps organizations identify, monitor, and protect against threats across their digital footprint. The goal is to catch risks on the open, deep, and dark web before they can be exploited, by aggregating threat intelligence from diverse external sources (social media, underground forums, code repositories, and paste sites). Organizations scan continuously for exposed credentials, brand impersonations, data leaks, and emerging malware campaigns.

RegScale's Travis Howerton on taking the pain out of compliance in highly-regulated industries

In this week’s episode of The Future of Security Operations podcast, I'm joined by Travis Howerton, Co-founder and CEO of RegScale. Travis began his security career with roles at government and regulated organizations, including the National Nuclear Security Administration and Oak Ridge National Laboratory, before being inspired by inefficiencies in compliance processes to co-found RegScale.

Why Prioritization Is Still the Weak Link in Vulnerability Management

For all the advancements in vulnerability remediation, one of the most fundamental challenges remains unsolved: knowing what to fix first. And according to the 2025 Remediation Operations Report, it’s still not where it needs to be. In fact, difficulty prioritizing vulnerabilities ranks as the third biggest challenge security teams face when managing vulnerabilities. That’s not just an operational inconvenience, it’s a signal that something core to the remediation process is broken.