Wiz’s Security GraphDB vs. DeepTempo’s LogLM

Wiz’s Security GraphDB vs. DeepTempo’s LogLM

How can a friendly Eye of Sauron help the Wizards?Cloud security is evolving beyond silos. Wiz’s meteoric rise has been powered by a fresh approach: an agentless, graph-based view of risk context across ...
Expert Practitioners

From Burnout to Breakthrough: How Cybersecurity Leaders See 2025 and Beyond

In the last few weeks, I’ve done some learning in public, interviewing three of our advisors and making those interviews public on YouTube for all to see.I chatted with Steve Zalewski, former CISO ...
Invisible C2 — thanks to AI-powered techniques

Invisible C2 — thanks to AI-powered techniques

Invisible C2 — thanks to AI-powered techniquesJust about every cyberattack needs a Command and Control (C2) channel — a way for attackers to send instructions to compromised systems and receive stolen data. This gives us all ...
The Promise of Cybersecurity Foundation Models

The Promise of Cybersecurity Foundation Models

| | Cybersecurity, deep learning
When we introduce our Tempo LogLMs — we often explain that Tempo is a Foundation Model. But what is a foundation model? And is there a difference between cybersecurity foundation models and foundation models ...
Watching the Watcher: How we evaluated DeepTempo with BNY’s help

Watching the Watcher: How we evaluated DeepTempo with BNY’s help

Recently we reached a milestone in our design partnership with BNY, one of the world’s preeminent financial institutions and our nation’s oldest bank. You can read more about this milestone in our ...
Anomalies are not Enough

Anomalies are not Enough

Mitre Att&ck as ContextIntroduction:A common theme of science fiction authors, and these days policymakers and think tanks, is how will the humans work with the machines, as the machines begin to surpass us ...
Deepfake Detection – Protecting Identity Systems from AI-Generated Fraud

Deepfake Detection – Protecting Identity Systems from AI-Generated Fraud

Advanced deepfake detection combines AI forensic analysis, liveness checks, and behavioral biometrics to combat synthetic fraud. Discover neural anomaly detection and blockchain verification systems to counter AI-generated threats ...
Anomaly Detection for Cybersecurity

Anomaly Detection for Cybersecurity

A long promising approach comes of ageI won’t revisit the arguments for anomaly detection as a crucial piece of cybersecurity. We’ve seen waves of anomaly detection over the years — and CISA, DARPA, Gartner, and ...
Fighting on the New Front Line of Security with Snowflake and LogLMs

Fighting on the New Front Line of Security with Snowflake and LogLMs

Tempo — a Snowflake Native App — harnesses AI and Log Language Models for Proactive CybersecurityCybersecurity attackers are innovating, challenging traditional security measures, and pushing organizations to seek more innovative solutions. Tempo, a Snowflake Native App ...
Platforms are the Problem

Platforms are the Problem

A better path forward for cybersecurityWhy is it that cybersecurity is struggling to keep pace with the rapidly evolving threat landscape? We spend more and more, tighten our perimeters, and still there ...