Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The latest News and Information on Security Incident and Event Management.

Anomaly Detection with Machine Learning to Improve Security

Being a security analyst can feel like being trapped in a Where’s Waldo book. You can find yourself staring at a data stream looking for something that “isn’t like the others.” However, as your organization collects and correlates more data from the environment, finding the Waldo can feel overwhelming. In a modern IT environment, organizations have hundreds or thousands of devices, users, and data points that they need to correlate so they can identify normal network activity.

Ep 28: Stop being the 'no' department: How modern GRC enables growth

On this episode of Masters of Data, we sit down with Cassandra Mooseberger, Manager of Security Compliance at Sumo Logic, to unpack governance, risk, and compliance (GRC). Cass breaks down her three-pillar framework: governance and compliance, risk management, and trust. She reveals how GRC teams can flip from cost center to sales enabler through trust pages, automated questionnaires, and proactive support. We explore practical strategies for working with engineering: listen first, understand before changing, and skip the "rip and replace" impulse.

Cyberthreat Detection: Key Steps Every Company Should Take 

Today, an organization's survival is intrinsically linked to its cybersecurity posture. Proactive cyberthreat detection has transitioned from a technical best practice to a core business imperative. With adversaries employing increasingly sophisticated methods, from AI-driven phishing campaigns to fileless malware and stealthy lateral movement, relying solely on preventive controls can be a recipe for failure. A robust detection strategy is what separates companies that suffer prolonged breaches from those that contain incidents swiftly.

Fool Me Once: How Cybercriminals Perfected Deception | LevelBlue Threat Trends Report (Ed. 2)

Originally recorded in 2025, we look back at how cybercriminals perfected deception during the first half of the year. Now available as an archive recording, the session highlights the second edition of the LevelBlue Threat Trends Report and explores real-world incident data, fast-moving attack chains, and the social engineering techniques that shaped the threat landscape at the time. While the data reflects early 2025, many of the lessons remain relevant for understanding how today’s threat environment evolved.

The New CISO Podcast Ep. 140 - Manuel Ressel | The Four Cs: Why a Schoolteacher Makes a Great CISO

In this episode of The New CISO, host Steve Moore speaks with Manuel "Manu" Ressel, CISO at SAUTER Group, about his unconventional journey from classroom teacher to cybersecurity leader—and why the "Four Cs" of modern education provide a powerful framework for building effective security programs. Drawing from years as both a teacher and school principal in Germany, Manu introduces Critical Thinking, Communication, Collaboration, and Creativity as essential leadership skills that fundamentally challenge how the industry approaches awareness training and incident response.

Compliance Readiness with Audit Logging

Whether pulling items together for a holiday dinner or prepping weekly meals, you need to have all the ingredients necessary to cook the meals you want to eat. Often, this means making a grocery list, checking off items as you take them from the shelves, and, possibly, grumbling when one of the items isn’t available. In the IT and business worlds, audit logging is the shopping list that helps organizations with compliance readiness.

Ep 27: 2026 Security operations insights

On this episode of Masters of Data, we dive into our 2026 Intelligent Security Operations report. While 90% of 500+ security leaders see AI/ML cutting alert fatigue, actual implementation remains stuck at basic anomaly detection—not the full automation everyone wants. The gap is real: only 51% say their SIEM effectively reduces detection and response times, exposing serious maturity issues. Add rampant tool sprawl (most orgs run 3-10+ security tools that don't communicate), and you've got an integration nightmare. We explore how Model Control Protocol and AI agents could solve this, but here's the truth.

Sumo Logic's 2026 Security Operations Insights report: AI, siloed tools, and team alignment

Security threats have always been expanding and evolving, but recent data shows that modern applications are more complex for security and operations than ever before. And AI is only a piece of that puzzle. To stay on top of the changing market and hear directly from security leaders on what’s really top of mind, Sumo Logic surveyed over 500 security leaders with the help of UserEvidence. We asked about data pipelines, tool sprawl, confidence in SIEM, and, of course, AI.

How to Ignore Cybersecurity AI Bubble FOMO

Cybersecurity teams are no longer circling an AI bubble. Rather, they are staffing inside it, buying within it, and getting measured by it. This matters because bubbles create a predictable trap: expectations are set higher than teams truly can deliver. Cato Networks CEO Shlomo Kramer recently told Business Insider the market is experiencing an AI bubble driven by heavy investment and AI-driven profit improvements, which he expects to unwind. A correction will not pause attacker activity.