Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Howler Episode 30 - Will May, Chief Revenue Officer

This month, we sit down with Will May, our new Chief Revenue Officer. Take a listen to get to know Will, his leadership philosophy, how he's using AI in his every day, and so much more! Will brings more than 15 years of go-to-market leadership experience across high-growth software, cybersecurity, and cloud technology companies. He has built a strong reputation for helping organizations adopt innovative technologies—including AI-driven platforms—to improve operational efficiency, reduce complexity, and deliver measurable business value.

How to Gain Visibility and Reduce Exposure with Aurora Attack Surface Management

This demo will illustrate how Aurora Attack Surface Management builds a continuously updated attack surface inventory, correlates asset and exposure data from multiple sources, and identifies gaps in security controls. It enables prioritization and remediation verification so that organizations can focus on what matters most and effectively drive risk reduction.

How Aurora Vulnerability Management Unifies Visibility, Prioritization & Remediation

With Arctic Wolf Aurora Vulnerability Management, organizations can monitor their risk score, gain comprehensive visibility, prioritize vulnerabilities and remediate risks with options including patch management and ITSM integrations.

AI Security and Trust: Why SOC Teams Don't Trust AI

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo 92% of security leaders say something is actively reducing their trust in AI within the SOC. These aren’t skeptics, they’re people who have already adopted AI and believe in its ability to enhance security operations. We know from the 2026 AI SOC Leadership Report that AI is already widely adopted in the SOC, with 94% of organizations using it in some capacity.

From Threat Awareness to Proof: Closing the Exposure Validation Gap in the Modern SOC

For most organizations, answering these questions is slow, manual, and difficult to defend. Analysts must interpret threat reports, build SIEM queries, run retroactive searches, and validate findings under pressure. The result is delayed answers, inconsistent processes, and limited confidence at the executive level. This is the gap between threat awareness and proof of exposure. It is where operational risk and board-level scrutiny converge.

Logs & Lattes: Episode 6 - How Small SOC Teams Stop Drowning in Alerts

Lean security teams don't need a smaller version of an enterprise SOC. They need a different approach entirely. Graylog Director of Product Management, Rich Murphy, joins Logs and Lattes to explain why 2-to-4-person security teams are the most underserved segment in cybersecurity and what needs to change.

Maximizing Cybersecurity with SOC Support Consulting: What You Need to Know

As cyber threats continue to grow and become more threatening, it’s important for businesses to implement robust cybersecurity measures. SOC Support Consulting is becoming increasingly important for improving cybersecurity because it equips companies with the knowledge and tools to quickly identify and stop threats. According to Vectra AI, businesses leveraging SOCaaS are likely to detect threats 96% faster compared to those with an in-house SOC.

Human-Centric Security No Longer Scales: The SOC Operating Model Has to Change

Many security functions today still rely heavily on humans for detection, triage, and response, often by design. But as environments grow more complex and alert volumes explode, it raises a hard question: Can this approach scale on its own? Adopting AI in security operations isn’t just about adding tools. It means rethinking the SOC operating model itself — roles, workflows, and team structures. Here’s why, and how.