Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

RegScale's Travis Howerton on taking the pain out of compliance in highly-regulated industries

In this week’s episode of The Future of Security Operations podcast, I'm joined by Travis Howerton, Co-founder and CEO of RegScale. Travis began his security career with roles at government and regulated organizations, including the National Nuclear Security Administration and Oak Ridge National Laboratory, before being inspired by inefficiencies in compliance processes to co-found RegScale.

Introducing Modern SecOps, a more realistic alternative to the "autonomous SOC"

I’ve always had a love-hate relationship with traditional SOC. Many SOC teams do great work within this structure. But there are also serious issues with the three-tier model - it’s rigid, costly, and unsustainable for any company that isn’t a large enterprise. In the push to address these limitations, the concept of an “autonomous SOC” has emerged, with some vendors already claiming to offer fully autonomous solutions.

Four common misconceptions about using AI in security operations

At this stage in AI's evolution, we’ve all heard the big promises - and overpromises - from vendors. But what about the people on the front lines of security operations? How are real practitioners feeling about using AI in their day-to-day work? In a recent webinar with guest speaker Allie Mellen, Principal Analyst at Forrester Research, we dug into how AI is actually being adopted in the SOC - what’s working, what’s not, and what's getting lost in the noise.

The top seven skills security analysts need to succeed, according to security leaders

According to the U.S. Bureau of Labor Statistics, demand for security analysts is expected to grow by more than 30% over the next decade, far outpacing the average for other roles. That’s good news for those entering or advancing in the field. But with heavy workloads and constant pressure to keep up with evolving threats, professional development can easily fall by the wayside. So how can security analysts stand out to hiring managers — and make sure their career path stays on track?

Stop Chasing Payments: Why Freelancers Need Automated Invoicing

Freelancing offers freedom, flexibility, and full control over your time - but when it comes to getting paid, that independence can come at a cost. If you've ever found yourself chasing down late payments or wondering which invoices are still outstanding, you're not alone. For growing creative businesses and solo professionals alike, payment delays aren't just inconvenient - they affect cash flow, strain client relationships, and take time away from doing real, billable work.

From backlog to breakthrough: enhancing IT service delivery and support with automation

Scaling IT operations was never going to be easy. By 2025, it was fair to expect that technology would ease classic challenges like high workloads, rising operational costs, and end-user friction. Yet IT leaders still face mounting pressure across identity and access management (IAM), endpoint management, request fulfillment, and incident response. Today’s end users are more demanding. IT operations are more complex. And time is in short supply.

Identity Is the New Root Access: Rethinking Zero Trust in DevOps Environments

Amal Mammadov is a cloud security and detection engineering specialist working at the frontlines of identity-driven threats in modern cloud environments. His work focuses on how attackers exploit permissions, tokens, and machine identities, often without triggering traditional security controls. In this conversation, he breaks down why Zero Trust is no longer about networks but about controlling identity in fast-moving DevOps systems.

The Future of Retail Cybersecurity: SOC Automation

Retail companies are high-value targets for cybercriminals. With sprawling infrastructures, complex supply chains, and large amounts of customer data, retailers are a goldmine for bad actors. In 2024, the retail sector accounted for 24% of all cyberattacks — more than any other industry. The average cost of a data breach in retail rose to $3.28 million.