Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intel Options with Sumo Logic -- Customer Brown Bag -- May 21st, 2026

Join us as Senior Technical Account Specialist Trent Driesler walks through Sumo Logic’s threat intelligence capabilities, including built-in feeds from providers like Intel 471 and CrowdStrike, and how to ingest custom indicators using collectors and APIs.

Announcing Claude Compliance API support with Cloudflare CASB

Today, we are extending Cloudflare’s cloud access security broker (CASB) to support the Claude Compliance API. Security and compliance teams can now monitor Claude usage directly in the Cloudflare dashboard. No endpoint agents required. Enterprise security teams have long struggled to see how users interact with sanctioned and unsanctioned applications. The rapid adoption of AI applications has made this harder.

Prompt instructions won't save your production environment

In July 2025, Replit's autonomous AI coding agent deleted a live production database despite being explicitly instructed to freeze all changes. The agent then attempted to reassure the user with incorrect information after the fact. The team had safeguards in place. The instructions were explicit. Neither stopped it. The conclusion that follows is one the security community should take seriously: you cannot enforce AI agent behavior through the agent itself.

Agentic AI Security Guardrails: A Deployment Guide for SOC Leaders

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Noam Cohen is a serial entrepreneur building seriously cool data and AI companies since 2018. Noam’s insights are informed by a unique combination of data, product, and AI expertise — with a background that includes winning the Israel Defense Prize for his work in leveraging data to predict terror attacks.

Before you replace your SIEM: AI-driven security requires operational context, not just centralized data

Artificial intelligence is rapidly reshaping how security operations centers (SOCs) function. Many organizations are now evaluating AI-native architectures to reduce workload and accelerate investigations. A new architectural narrative is emerging. A growing set of AI-native security vendors are proposing centralizing telemetry in a warehouse and deploying AI agents to replace the operational role of the SIEM. They want to centralize telemetry, apply AI, and automate the SOC.

Beyond the AI Hype with Netskope: Why Governance is the Bedrock of AI & Cloud Integration at Embecta

Modern enterprise solutions—ranging from cloud data and power platforms to agentic AI and API connections—require rigorous oversight. Every platform integration must be evaluated through the lenses of risk, data compliance, and privacy to ensure secure operations. Netskope provides the necessary visibility and control for all data paths, including APIs and cloud-based AI platforms, helping Embecta enforce the data compliance and privacy standards required when integrating disparate applications.

Episode 15 - The Right Eyes: Mythos, and the Future of Vulnerability Discovery

The emergence of advanced large language models like Anthropic's Mythos represents an epochal shift in cybersecurity, fundamentally altering how zero-day vulnerabilities are surfaced and remediated. In this episode, host Richard Bejtlich sits down with Corelight Co-founder Greg Bell to analyze the security implications of this AI-driven bug explosion, highlighting recent AI-assisted vulnerability discoveries across infrastructure mainstays like FreeBSD and Firefox.

Fireside Chat With TPRA: Three Hard TruthsAbout TPRM in the Post-Mythos Era

Frontier AI models like Mythos have intensified the urgency to rethink cybersecurity. But for third-party risk teams, the harder question remains: how do we prioritize the actions that actually drive business outcomes? As TPRM becomes more tightly tied to business impact, resilience, continuity, and revenue protection, leaders need a clearer view of the hard truths shaping their programs.