Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

OCSF for Security Hub: Sumo Logic and AWS speaking the same language

In technology, the proof of a lasting relationship is in the infrastructure — the pipelines, security services, and log plumbing have to work seamlessly together long before anyone sees the outcome. That’s precisely what Sumo Logic and AWS have built. Aligned around open standards like OCSF (Open Cybersecurity Schema Framework), integrated with services like Security Hub and GuardDuty, and connected through shared telemetry, it makes cloud security and observability possible at scale.

The Value of a Robust Vulnerability Management Program

Back before live security video feeds in homes, people would walk around at night checking to make sure they locked every window and door. They took these precautions because they knew that a single open lock gave burglars an opportunity to steal from them. For organizations, vulnerability management programs are a way to lock the doors against cybercriminals.

Graylog SIEM on AWS | Smarter Security Without Compromise

Choosing a SIEM doesn’t have to mean trade-offs. This video shows how Graylog SIEM on AWS delivers fast detection, predictable costs, and analyst-friendly workflows — without the compromises that hold legacy platforms back. Legacy ingest-based SIEMs force security teams to pick between visibility, cost, and analyst efficiency. Graylog changes that model with flat, transparent pricing, license-free data lake storage, and flexible deployment options.

Compliance vs Security: The Business Value of Alignment

Compliance is not, nor has it ever been, security. Compliance is the spellcheck of the security world. Security is the work that people do every day to implement, enforce, and monitor the controls that protect systems, networks, applications, devices, users, and data. Compliance is the process of reviewing security work to ensure that it functions as intended. Compliance is an important component of an organization’s security posture.

Enrich, Parse, and Control Logs with Observability Pipelines for Datadog Cloud SIEM

See how Datadog Observability Pipelines helps security and operations teams take control of their log data. In this demo, we’ll walk through: With Datadog, you can normalize, enrich, and prepare high-quality log data for Cloud SIEM, supporting faster investigations, more accurate detections, and reduced operational overhead—all without third-party software.

Welcome to Dojo AI: Where AI agents strengthen your SOC

For too long, security has been defined by reaction, responding to every alert, chasing every anomaly, burning time and energy without clarity. But the strongest fighters don’t swing at every feint. They train, prepare, and conserve their energy for the moments that matter. That’s not just strength; that’s resilience. Now, this philosophy has entered the SOC. And it has a name: Sumo Logic Dojo AI.

Ep 10: AI in the SOC

In this episode, we explore how AI is transforming security operations centers (SOCs) from basic log-watching teams into sophisticated threat-hunting command centers drowning in data. AI excels at processing security alerts faster than any human, but the challenge lies in balancing our growing dependence on algorithmic assistance with the irreplaceable value of human intuition in outsmarting creative attackers.

Introducing New-Scale Analytics - Analyst Workflow Demonstration

This video demonstration was produced for Exabeam Advanced Analytics customers who plan on upgrading to New-Scale Analytics. You'll learn what makes New-Scale Analytics such a powerful new solution for threat detection, investigation, and response (TDIR). LEARN MORE: Subscribe for more product demos and cybersecurity insights!

Powering Zero Trust Networking with Elastic and Gigamon AMI

The cybersecurity perimeter is gone. In its place, a far more resilient framework has emerged: Zero Trust Networking (ZTN). This security model assumes no transaction is automatically permitted. Every connection, request, and data flow must be verified continuously. Learn how Elastic and Gigamon Application Metadata Intelligence (AMI) enable a security posture built on constant verification, rapid response, and adaptive trust.