security operations

5 AI threats keeping SOC teams up at night
The explosion in the use of OpenAI's ChatGPT and other large language models (LLMs) — along with a range of other artificial intelligence (AI) and machine learning (ML) systems — is ramping ...

The Week in Security: Barracuda email flaw left open for months, calls for AI governance turn existential
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security This week: Barracuda’s ...

The Week in Security: Lazarus targets Microsoft servers in espionage campaign, the future of PyPI
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: Application security, cybersecurity, ...

The Week in Security: Coalition takes down Russia’s Snake espionage tool, GitHub plugs API leaks
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...

SIEM Content, False Positives and Engineering (Or Not) Security
As we learned, SIEM still matters in 2023.Debating SIEM in 2023, Part 1Debating SIEM in 2023, Part 2But since one winter day in 2002, when I wrote my first correlation rule for a ...

How to operationalize SBOMs for incident response
As the cybersecurity industry has endeavored to reduce the risk of software supply chain security flaws, software bills of materials (SBOMs) have received a ton of attention of late, as security pundits ...

RSAC in review: Supply chain security, cyber war and AI
More than three years after the COVID pandemic threw the global economy — not to mention the technology conference business — on its ear, the RSA Security Conference was back in full ...

The Week in Security: A possible Colonial Pipeline 2.0, ransomware takes bite out of American eateries
Welcome to the latest edition of The Week in Security, which brings you the newest headlines from both the world and our team across the full stack of security: application security, cybersecurity, ...

Secrets Exposed: The why, the how – and what to do about – secrets security in software
For software development teams to maintain and properly set up development environments and pipelines, they need to use software secrets such as environment variables, tokens and keys in these processes ...