Episode 7 - Practical AI for Zeek, MITRE, and Security Docs

In Episode 7 of Corelight DefeNDRs, join me, Richard Bejtlich, as I sit down with Dr. Keith Jones, Corelight's principal security researcher, to discuss the practical applications of AI in enhancing network security. We delve into how large language models (LLMs) can assist in cleaning up documentation and generating Zeek scripts, sharing insights from our extensive experience in incident response and coding. Keith reveals the challenges and successes he has encountered using LLMs to streamline processes, including their role in analyzing MITRE techniques.

The Private Equity Problem in Cybersecurity

This one's going to ruffle some feathers. Over the past eight years, something has fundamentally changed in the cybersecurity industry. Prices are climbing faster than most UK and European budgets can absorb. Vendor renewals that used to be predictable are now eye-watering. Consultancy rates have shot up. And it's not just about inflation or rising costs.

Why the UK Thinks Differently About Cybersecurity Compliance

A multinational financial institution walks into its annual PCI DSS review confident it has “checked the boxes.” Firewalls are segmented, logs are retained, access controls are documented, and the audit report is clean. Months later, the same organization is reprimanded by the UK Information Commissioner’s Office (ICO). The controls were properly implemented.

Introducing Forward AI

As enterprises move toward agentic operations, speed without data accuracy becomes a liability. At Forward Networks, we recognized this challenge and set out to deliver a solution: speed backed by mathematical accuracy. In networking, acting on incomplete or approximate data is not an inconvenience, it is a cause of outages, security exposure, and operational risk.

Building a Zero-Compromise Backup and Disaster Recovery Strategy for 2026 | Webinar

As cyber threats evolve and hybrid IT environments become the norm, traditional backup strategies are no longer enough. In this practical and forward-looking webinar, learn how IT teams and MSPs can build a zero-compromise Backup & Disaster Recovery (DR) strategy for 2026—designed to withstand failures, ransomware attacks, and operational complexity. What you’ll learn: How to design a failure-proof Backup & DR architecture.

Vibe Coding Speeds Up Mobile Apps But Creates New Security Risks

AI-assisted development has crossed a tipping point. Mobile teams are no longer debating whether to use AI to write code. They are deciding how fast they can ship with it. This shift, often called vibe coding, prioritizes intent and speed over manual implementation. Developers describe what they want, and AI fills in the rest. Velocity improves. Releases accelerate. But security assumptions quietly break. For mobile applications, that risk compounds.

OpenClaw (Moltbot) Personal Assistant Goes Viral - And So Do Your Secrets

Early 2026, Moltbot a new AI personal assistant went viral. GitGuardian detected 200+ leaked secrets related to it, including from healthcare and fintech companies. Our contribution to Moltbot: a skill that turns secret scanning into a conversational prompt, letting users ask "is this safe?".

Future of MFA: Trends That Will Win in 2026

2026 is here, and cybersecurity is defined by a critical paradox: despite widespread MFA adoption, credential-based breaches continue to surge. Traditional multi-factor authentication, static, friction-heavy, and often disconnected, no longer stands up to sophisticated threats, such as AI-powered phishing, MFA fatigue attacks, and prompt bombing campaigns, which exploit user behavior rather than technical vulnerabilities.