Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

The Metric AI Security is Missing

As autonomous and semi-autonomous AI systems take on more responsibility within the enterprise, they shift from being “features” of software to becoming true internal actors. They make decisions, take actions, call tools, orchestrate workflows, and influence other AI agents. With this evolution, we must confront an uncomfortable truth: the metrics and response patterns we built for deterministic software no longer work.

Whole-of-state cyber defense: How AI-driven security helps US states protect what matters most

Short answer: Because attackers exploit fragmentation faster than governments can respond This shift toward collective cyber defense is a cornerstone of the new federal vision. The March 2026 National Cyber Strategy for America explicitly calls for a "new level of relationship between the public and private sectors" and demands "unprecedented coordination across government" to protect the American people.

Behavior Intelligence: The New Model for Securing the Agentic Enterprise

Behavior Intelligence is a security operations model that detects risk by analyzing behavior, automates investigation and response using AI, and measures whether security outcomes are improving over time. It focuses on how users, systems, and AI agents operate rather than relying only on predefined rules or knowns indicators of compromise. This shift matters because modern attacks rarely look malicious at first. They look normal.

Observability is security (We just pretended it wasn't)

For years, we’ve drawn this artificial line that equates observability with uptime, performance, and SRE dashboards, while security is about threats, alerts, SIEMs, and “bad things.” While that separation was always convenient, it was never real. The same logs that tell you your service is slow are the same ones that tell you it’s compromised. We just routed them to different teams, different tools, and different budgets, then acted surprised when neither side had the full picture.

Ep 40: What to expect when you are expecting an audit

On this episode of Masters of Data, we brought back GRC expert Cassandra Mooseburger to pull back the curtain on audits, and spoiler: it is far less scary than the IRS knocking on your door. We break down what actually separates a certification from an attestation from a report, how to run a prep process that does not send your engineering team running for the hills, and why the social capital you build across the business is just as important as the evidence you collect. If you have ever wondered how compliance work translates into closed deals and customer trust, this one connects those dots.

Five Reasons Security Operations Teams Augment Microsoft Sentinel With New-Scale Analytics

Security operations teams face rising alert volumes, tighter staffing, and growing pressure to reduce risk without adding tools or people. If Microsoft Sentinel sits at the center of your environment, you may already see where it helps and where it starts to strain. For many teams, that moment shows up when detections lag, investigations drag, or too much work funnels to a small group of specialists.

An Introduction to the NIST Risk Management Framework (RMF)

While inherently critical to today’s businesses that run on data, implementing and enforcing data security and privacy has never been straightforward. Between collecting different types of sensitive data and deploying unique architectures, organizations cannot adopt a one-size-fits-all solution, meaning that every security architecture is unique.

The New CISO Ep. 144 - Rob Knoblauch | Your Most Valuable Skills Aren't Technical

Cybersecurity debates tend to center on tools, frameworks, and threats. But Rob Knoblauch has built a 25-year career in global security leadership by focusing on the soft skills that determine whether a CISO survives, thrives, or burns out. In this episode of The New CISO, Rob joins Steve Moore to trace the through-line from running a multi-node BBS as a kid to serving as Deputy CISO of one of the world’s largest banks — and the career lessons he’s carried through every chapter.