Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Surface Tension in AI: Early Adopters Pivoting for Compliance

A good way to measure the success and challenges of new technologies is to spend an evening networking with your peers. Sure, a lot of what you take in is anecdotal, but what you are looking for is consistency in the stories being shared and the industries where the stories are occurring. Recently, I had the opportunity to network with a number of my peers. I had one question that I asked consistently: “How are your AI deployments going?”

Endpoint AI Agents: The New Security Blind Spot

Security teams that have invested in AI governance programs over the past two years face a problem that those programs were not designed to solve. The controls built to manage generative AI, network proxies, browser monitoring, and SSO enforcement work when data moves through defined channels. Endpoint AI agents do not move through those channels. They run locally, operate at the OS level, and access data through pathways that exist entirely outside your current visibility.

Ransomware: AI changes the writer. It doesn't change the math.

Ransomware: AI changes the writer. It doesn't change the math. Why most endpoint protection still treats ransomware as just another piece of malware, and what changes when you watch the data instead of the attacker. In 2013, CryptoLocker introduced the modern ransomware playbook. It also introduced something most of the industry has still not come to terms with: remote encryption.

GPT-5.5-Cyber is here. What it means for defenders operating at the frontier.

GPT-5.5-Cyber is here. What it means for defenders operating at the frontier. OpenAI’s May 7 release of GPT-5.5 and the limited preview of GPT-5.5-Cyber put frontier AI in verified defenders’ hands. As a member of the Trusted Access for Cyber program, Sophos is using these models to sharpen what we already operate: an agentic SOC that resolves more than half of cases without a human, and an endpoint architecture purpose-built to stop AI-generated zero-days.

Why You Shouldn't Use LLMs to Generate SQL (Security Risks)

“Just let the LLM write the SQL.” It sounds powerful. A user types a question in plain English, the model generates a query, the system runs it against the database, and the answer comes back. No SQL knowledge required. No BI tools. No waiting for the data team. It works beautifully in demos. And it is a serious engineering mistake in production. Direct SQL generation from LLMs combines two things that should never be combined: untrusted code generation and privileged execution.

How Aurora Vulnerability Management Unifies Visibility, Prioritization & Remediation

With Arctic Wolf Aurora Vulnerability Management, organizations can monitor their risk score, gain comprehensive visibility, prioritize vulnerabilities and remediate risks with options including patch management and ITSM integrations.

How to Gain Visibility and Reduce Exposure with Aurora Attack Surface Management

This demo will illustrate how Aurora Attack Surface Management builds a continuously updated attack surface inventory, correlates asset and exposure data from multiple sources, and identifies gaps in security controls. It enables prioritization and remediation verification so that organizations can focus on what matters most and effectively drive risk reduction.

Acronis Cyber Frame - Setting up VPN connection to your local site

Learn how to connect to Acronis Cyber Frame virtual machines and set up a secure site-to-site VPN using strongSwan. This video walks you through network setup, router configuration, VPN policies, endpoint creation, and testing connectivity between Cyber Frame and your local site.

How Corelight identified a years-old network issue in 30 minutes

A global cruise line operating across maritime and resort environments was struggling with inconsistent detections, alert overload, and limited visibility from its existing NDR platform. In this customer story, Jay Miller from Corelight walks through how the organization evaluated its network visibility strategy, identified long-standing gaps in detection coverage, and improved investigation workflows across a complex environment with intermittent connectivity at sea.