Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Before you replace your SIEM: AI-driven security requires operational context, not just centralized data

Artificial intelligence is rapidly reshaping how security operations centers (SOCs) function. Many organizations are now evaluating AI-native architectures to reduce workload and accelerate investigations. A new architectural narrative is emerging. A growing set of AI-native security vendors are proposing centralizing telemetry in a warehouse and deploying AI agents to replace the operational role of the SIEM. They want to centralize telemetry, apply AI, and automate the SOC.

Threat Intel Options with Sumo Logic -- Customer Brown Bag -- May 21st, 2026

Join us as Senior Technical Account Specialist Trent Driesler walks through Sumo Logic’s threat intelligence capabilities, including built-in feeds from providers like Intel 471 and CrowdStrike, and how to ingest custom indicators using collectors and APIs.

Ep 43: Who's got your data? Spoiler: Not you

In this episode of Masters of Data, we untangle the often-confused cousins of data sovereignty and data residency, because where your data lives and who actually controls it are two very different conversations. We dig into the real-world headaches facing multinational companies, from incident response teams locked out of sovereign data zones to the bureaucratic gymnastics that ensue when compliance meets practicality.

The cybersecurity nightmare of modern healthcare IT

Healthcare organizations are a primary target for cyberattacks. Outdated legacy tech runs rampant, and ransomware attacks are shutting down hospitals, forcing them to revert to paper records and cancel non-emergency procedures. The ripple effects extend beyond the targeted facility, overwhelming neighboring hospitals, putting lives at risk.

AI SOC vs. white box AI: Why black boxes fail in the real world

There’s a growing wave of “AI SOC” startups promising autonomous everything. They’ll triage your alerts, investigate threats, and even run your playbooks. Push a button, let the machine handle the mess, and enjoy the magic. It sounds great until the moment something breaks. Then everyone, not just security, asks the same question: “What exactly did it do?” And that’s when these systems turn into a liability.