Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Welcome to Dojo AI: Where AI agents strengthen your SOC

For too long, security has been defined by reaction, responding to every alert, chasing every anomaly, burning time and energy without clarity. But the strongest fighters don’t swing at every feint. They train, prepare, and conserve their energy for the moments that matter. That’s not just strength; that’s resilience. Now, this philosophy has entered the SOC. And it has a name: Sumo Logic Dojo AI.

Ep 10: AI in the SOC

In this episode, we explore how AI is transforming security operations centers (SOCs) from basic log-watching teams into sophisticated threat-hunting command centers drowning in data. AI excels at processing security alerts faster than any human, but the challenge lies in balancing our growing dependence on algorithmic assistance with the irreplaceable value of human intuition in outsmarting creative attackers.

How using Cloud SIEM dashboards and KPIs for daily standups improves SOC efficiency

When we talk about emerging technologies and digitization, we often forget that while innovators work to bring the best security tools to market, malicious actors are concurrently working to identify loopholes and vulnerabilities in these new systems. Gone are the days when cyber attacks were a rare occasion; now, they happen almost daily.

When AI skips the app layer: Welcome to the OS Hunger Games

Remember when we thought the application layer was where all the fun happened? Firewalls, WAFs, EDR, dashboards galore — the entire security industrial complex built around watching what apps do. Well, with “agentic AI” running the show, that middle ground is turning into a bypass lane. Instead of clicking through UIs or APIs, your AI buddy is making direct system calls, automating workflows at the OS and hardware level.

Ep 7: SOAR Loser: Does the O in SOAR stand for obsolete?

SOAR might sound like a superhero for security teams, but is it actually flying too close to the sun? In this episode, Adam and David unpack why security orchestration, automation, and response have been helpful… but might be headed for retirement, thanks to AI shaking up the game. They also dig into the headaches of managing clunky SOAR systems and why it’s time to rethink workflows and case management before you get left in the dust.

Ep 6: Security haven or horror story: from SIEMs to lakes to lakehouses

Between SIEMs, data lakes, and data lakehouses, the buzzwords alone could fill a glossary. In this episode, Adam and David break down the real differences between data lakes and SIEM systems and why effectively managing all that data is crucial for staying visible and secure. They also dive into how AI is shaking up the game and why picking the right tools can mean the difference between being overwhelmed and being in control.

SIEM isn't dead. It's reborn and finally worth using.

The question isn’t whether security information and event management (SIEM) is dead. The real question is whether the traditional model of SIEM still serves today’s defenders. Spoiler alert: it doesn’t. Born from compliance needs and static rules, first-generation SIEMs provided log collection and correlation but not context. They buried analysts in noise and left threat detection slow, brittle, and expensive. But that’s changing.

From weeks to minutes: How Sumo Logic's historic baselining supercharges UEBA

Spotting threats fast and knowing whether they really matter is the name of the game in cybersecurity. That’s where user and entity behavior analytics (UEBA) comes in, and why Sumo Logic’s latest innovation, historic baselining, is a big deal. With this release, Sumo Logic has turned the old UEBA model on its head, delivering insights that used to take weeks of learning time in just minutes. Here’s how and why that’s a game changer.

Ep 4: Stop writing dumb AI security policies: use threat models, not fear

AI policy is not a yes/no question. Security isn’t here to be the morality police. Our job is to enable the business safely. Join security experts Adam White and David Girvin as they chat about the importance of using threat models, a simple framework, and five policy areas you are probably ignoring.