Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Fast Answers, New Problems with AI in the SOC

AI is moving into security operations fast, but the gap between a strong demo and something you can trust in production is still bigger than most teams want to admit. That gap is where risk starts. Eddie frames that early by pushing back on the idea that AI is about reducing headcount and arguing that the teams getting the most value are using it to amplify their best people instead.

Why builders win with Andrew Cook

Join us for this week's Defender Fridays as we explore the builder mindset in cybersecurity with Andrew Cook, CTO at Recon InfoSec. At Defender Fridays, we delve into the dynamic world of information security, exploring its defensive side with seasoned professionals from across the industry. Our aim is simple yet ambitious: to foster a collaborative space where ideas flow freely, experiences are shared, and knowledge expands.

Episode 11 - The AI Maturity Journey: Data, Agents, and the Shift from Craft to Art

Richard Bejtlich talks with Vijit Nair, VP of Product at Corelight, about the evolving "AI Maturity Journey" for modern security teams. Vijit outlines a three-level spectrum of AI adoption, moving from basic human-driven assistance to automated swarms of agents, and eventually toward fully autonomous systems. They discuss why high-quality, unopinionated data remains the essential foundation for building trust in AI and how technologies like the Model Context Protocol (MCP) are turning human language into the primary interface for tool integration.

Special Episode: A conversation with Sam, the AI SOC Analyst | Breach Ready Radio | Securonix

In this special episode, Ben sits down with Sam, the AI SOC Analyst inside Securonix, to walk through what happens when a detection fires and a real investigation begins. From a suspicious login at 2 a.m. to building context across users, endpoints, identities, and cloud activity, the conversation focuses on how investigations are changing in practice. We dig into what Sam actually does. How telemetry is pulled together. How behavior is compared to baselines. How risk is calculated. And how findings are turned into clear, structured recommendations that analysts can act on.

How a Unified Management Approach Simplifies Complex Networks

How a Unified Management Approach Simplifies Complex Networks A10's Priyanka Mullan (Senior Product Marketing Manager) and Field CISO, Jamison Utter, discuss how organizations can overcome the growing complexities of modern network demands. As delivery, security, and monitoring requirements grow, learn how A10's ecosystem helps you move forward more efficiently.