Building Trust in AI SOC Analyst Solutions: A UK and EU CISO Perspective
By Brett Candon, VP International at Dropzone AITrust has always been critical in security operations, but in the UK and...
By Brett Candon, VP International at Dropzone AITrust has always been critical in security operations, but in the UK and...
Image: przemekklos/Envato A cyberattack has disrupted global operations at medical technology manufacturer Stryker, forcing employees in multiple countries offline and...
PARIS, March 10, 2026 — Qevlar AI, a leader in AI for transforming security operations centres (SOCs), has raised...
The operations of phishing-as-a-service (PhaaS) platform Tycoon 2FA was taken offline this week by the combined effort of law enforcement that includes Europol and other partner agencies, as well...
U.S. CISA adds Qualcomm and Broadcom VMware Aria Operations flaws to its Known Exploited Vulnerabilities catalog Pierluigi Paganini March 04, 2026...
Every CISO knows the uncomfortable truth about their Security Operations Center: the people most responsible for catching threats in real...
A new risk for enterprise customers For CIOs running operations on CargoWise, the cuts raise immediate questions about continuity. WiseTech’s...
VMware Aria Operations flaws could enable remote attacks Pierluigi Paganini February 24, 2026 Broadcom patched multiple VMware Aria Operations flaws,...
Can SOC Teams Really Rely on Non-Human Identities for Cybersecurity? SOC (Security Operations Center) teams are continually challenged to...
TL;DR AI security has moved into core operations, expanding exposure and forcing leaders to rethink how AI-related...
The “alert fatigue” crisis plaguing Security Operations Centers (SOCs) isn’t really about volume. It’s about fighting adversarial systems with tools...
If you work in security operations, the concept of the AI SOC agent is likely familiar. Early narratives promised total...
There is a moment that happens in every SOC (Security Operations Center) every day. An alert fires. An analyst looks...
We discovered two threat campaigns that used PeckBirdy in their operations. Based on victimology and the tools, tactics, and procedures...