AppSec, AI, API app Google application security AppSec

Navigating Application Security in the AI Era

Artificial intelligence (AI) and application security (AppSec) will only continue to intertwine further in the coming years ...
Security Boulevard
WhatDR or What Detection Domain Needs Its Own Tools?

WhatDR or What Detection Domain Needs Its Own Tools?

| | threat detection
Pondering ?DRThis is the blog where I really (briefly) miss my analyst life and my “awesome+” peers like Augusto and Anna. It relies on ideas and comments from my past collaborators … and my ...
Threat Detection and Response from Pathlock

Streamlining SAP Threat Detection and Response with Pathlock

SAP customers are encountering increasingly sophisticated internal and external security threats, particularly amid digital transformation initiatives. The complexity of system landscapes within SAP applications magnifies these challenges, exposing organizations to new vulnerabilities ...
KuppingerCole Leadership Compass Intelligent SIEM

Why Gurucul Is an Overall Leader in the 2024 KuppingerCole Leadership Compass for Intelligent SIEM

Learn why Gurucul was named an overall leader for intelligent SIEM in the 2024 KuppingerCole I-SIEM Leadership Compass. The post Why Gurucul Is an Overall Leader in the 2024 KuppingerCole Leadership Compass ...
Blueprint for Threat Intel to Detection Flow (Part 7)

Blueprint for Threat Intel to Detection Flow (Part 7)

This blog series was written jointly with Amine Besson, Principal Cyber Engineer, Behemoth CyberDefence and one more anonymous collaborator.In this blog (#7 in the series), we will cover more details on the ...
Learn how a Next-Gen SIEM helps combat identity-based threats

Ultimate Guide to Identity Threat Detection and Response (ITDR)

Learn the fundamentals of what Identity Threat Detection and Response (ITDR) is, why it’s necessary and how to select the right ITDR solution. The post Ultimate Guide to Identity Threat Detection and ...
Harnessing the Power of Advanced AI to Optimize Security

Harnessing the Power of Advanced AI to Optimize Security

Organizations continue to face increasingly sophisticated cyber threats that require a proactive and adaptive approach to cybersecurity. As the volume and complexity of security data grows, security professionals are turning to advanced ...
Migrate Off That Old SIEM Already!

Migrate Off That Old SIEM Already!

This is cross-posted from Google Cloud Community site, and written jointly with Dave Herrald.If you are like us, you may be surprised that, in 2024, traditional security information and event management (SIEM) systems ...
generative AI voice cloning

Why Human-Centric is the Hottest Trend in Cybersecurity

Human-centric security focuses on better management of the insiders that either inadvertently or maliciously cause threats that companies must deal with ...
Security Boulevard
Augmenting Legacy Controls with AI-driven Threat Detection and Response

Augmenting Legacy Controls with AI-driven Threat Detection and Response

As organizations grapple with the limitations of legacy security controls in the face of increasingly sophisticated cyber threats, integrating AI-driven threat detection and response capabilities presents a compelling opportunity to bolster their ...