Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From Dugouts to Data Lakes: Applying Moneyball to the AI SOC

In this exclusive interview, Ari Kaplan, Chief Evangelist at Databricks and one of the real-life inspirations behind Moneyball, teams up with cybersecurity luminary Dan Schiappa, President, Technology and Services at Arctic Wolf, and AI Technical Fellow Mike Mylrea to explore how AI strategies that revolutionized professional sports are now being applied to transform modern cybersecurity.

How to Build HIPAA-Compliant Infrastructure on AWS

Many healthcare organizations want to move workloads to AWS but stall because they’re uncertain how to maintain HIPAA compliance in the cloud. The good news: AWS provides the tools and certifications needed for HIPAA-eligible services. The challenge is implementing them correctly. AWS has been HIPAA-eligible since 2013 and currently offers over 150 services that can be used in HIPAA-compliant architectures. But eligibility doesn’t equal compliance.

Using LLMs, CVSS, and SIEM Data for Runtime Risk Prioritization

A recent University of North Carolina Wilmington study tested whether general-purpose large language models could infer CVSS v3.1 base metrics using only CVE description text, across more than 31,000 vulnerabilities. The results show measurable progress, but they also expose a hard limit that matters far more than model selection: Model quality helps, but missing context sets a ceiling on reliability.