Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Five Essential Strategies to Combat Phishing Threats

Phishing threats remain one of the most common and effective attack methods. Research shows it contributes to over 34% of confirmed breaches. The financial impact is significant as well, with credential-related breaches averaging $4.76 million per incident. And despite years of security awareness training, nearly a third of employees still click on simulated phishing emails. Why does phishing work so well? Attackers exploit gaps in visibility, speed, and user behavior.

Rogue AI Agents In Your SOCs and SIEMs - Indirect Prompt Injection via Log Files

AI agents (utilizing LLMs and RAG) are being used within SOCs and SIEMS to both help identify attacks and assist analysts with working more efficiently; however, I’ve done a little bit of research one sunny British afternoon and found that these agents can be abused by attackers and made to go rogue. They can be made to modify the details of an attack, hide attacks altogether, or create fictitious events to cause a distraction while the real target is attacked instead.

End-to-End AI in Security Operations | Exabeam Nova's 6 AI Agents Explained

Is your AI just a chatbot? Exabeam Nova delivers true end-to-end AI—from behavioral detections and automated investigations to natural language reports and intelligent case creation. Six purpose-built AI agents Full-cycle threat detection, investigation, response Subscribe for more product demos and cybersecurity insights!

How using Cloud SIEM dashboards and KPIs for daily standups improves SOC efficiency

When we talk about emerging technologies and digitization, we often forget that while innovators work to bring the best security tools to market, malicious actors are concurrently working to identify loopholes and vulnerabilities in these new systems. Gone are the days when cyber attacks were a rare occasion; now, they happen almost daily.

When AI skips the app layer: Welcome to the OS Hunger Games

Remember when we thought the application layer was where all the fun happened? Firewalls, WAFs, EDR, dashboards galore — the entire security industrial complex built around watching what apps do. Well, with “agentic AI” running the show, that middle ground is turning into a bypass lane. Instead of clicking through UIs or APIs, your AI buddy is making direct system calls, automating workflows at the OS and hardware level.

SIEM vs. XDR: 5 Things to Consider

As IT environments become more complex, organizations face rising threat volumes, persistent cybersecurity talent shortages, and adversaries capable of dwelling undetected for days and moving laterally within hours. In this context, choosing between SIEM and XDR is no longer a technical preference; it’s a strategic decision that shapes how your organization defends itself.

Where Online Analytical Processing (OLAP) Overlaps With Security Operations

Imagine security data and analytics like a carnival’s hall of mirrors. From convex mirrors that show you a shorter, squatter version of something to the concave mirrors that show a highly magnified image, you see the same object in multiple ways. Every view gives you a different insight and provides a unique vantage point. Online Analytical Processing (OLAP) systems are different mirrors that allow security teams to create focused analytics models for different insights about your security posture.

Breach Ready. Board Ready. Built for Efficiency.

In today’s modern SOC, more data doesn’t always mean better outcomes. Security teams are overwhelmed by irrelevant telemetry, storage bills are out of control, and compliance regulations demand long-term retention—even for data with little threat value. Legacy SIEMs treat all logs the same, flooding analysts with noise and slowing down response times. The result? Bloated infrastructure, delayed investigations, and boardroom frustration over unproven ROI.

Ep 7: SOAR Loser: Does the O in SOAR stand for obsolete?

SOAR might sound like a superhero for security teams, but is it actually flying too close to the sun? In this episode, Adam and David unpack why security orchestration, automation, and response have been helpful… but might be headed for retirement, thanks to AI shaking up the game. They also dig into the headaches of managing clunky SOAR systems and why it’s time to rethink workflows and case management before you get left in the dust.

The New CISO Podcast Ep.133 - Steve Lodin | Teachable Moments: How to Learn from Career Challenges

In this episode of The New CISO, host Steve Moore speaks with Steve Lodin, VP of Information Security at Sallie Mae, about the career challenges that shaped his leadership style and the lessons he’s learned across decades in cybersecurity.