Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Threat Intel Options with Sumo Logic -- Customer Brown Bag -- May 21st, 2026

Join us as Senior Technical Account Specialist Trent Driesler walks through Sumo Logic’s threat intelligence capabilities, including built-in feeds from providers like Intel 471 and CrowdStrike, and how to ingest custom indicators using collectors and APIs.

How Automated Data Collection Is Quietly Reshaping Cybersecurity Intelligence

Web scraping has a reputation problem. For most people, it sits somewhere between grey-area data collection and an outright nuisance that clogs up server logs. But among security professionals, automated data collection has quietly become one of the more valuable arrows in the threat intelligence quiver.

What Is a Reverse Digital Footprint Audit? How to Track Scammers Using OSINT

A reverse digital footprint audit is the systematic extraction of an entity's online breadcrumbs-emails, IP addresses, aliases, and exposed credentials-to expose the true identity behind a malicious campaign. It turns the attacker's operational security failures against them. You think cybercriminals are ghosts. They aren't. They buy servers. They register domains. They recycle passwords. They get lazy.

Why Integrate Threat Intelligence Feeds into Email Security?

It's getting harder to distinguish legitimate emails from malicious ones as phishing messages mimic real conversations, use trusted domains and increasingly leverage AI to scale and refine attacks. This shift is forcing organizations to rethink how they approach email security. Static controls that rely on known indicators can't keep up with threats that are evolving daily. To close that gap, teams need email security systems with integrated threat intelligence feeds.

Rethinking Threat Intelligence with the Threat Research Agent

Modern security teams are not lacking data. They are drowning in it. Threat intelligence feeds, indicators, campaigns, internal detections, and investigation artifacts are constantly growing in volume and complexity. Yet when analysts need answers, they are often forced to manually search, pivot, correlate, and interpret across multiple data points. This creates a familiar problem: too much data, not enough clarity.

From Threat Awareness to Proof: Closing the Exposure Validation Gap in the Modern SOC

For most organizations, answering these questions is slow, manual, and difficult to defend. Analysts must interpret threat reports, build SIEM queries, run retroactive searches, and validate findings under pressure. The result is delayed answers, inconsistent processes, and limited confidence at the executive level. This is the gap between threat awareness and proof of exposure. It is where operational risk and board-level scrutiny converge.