Overview
Explore
Labs
Services
Events
Partners
Select a tab
66 results found
A Practitioner's Guide: SOC of the Future
Is the future here? Can we build a scalable, agile foundation that leverages robust data management and pipelines to enable real-time alerting? Can it leverage AI-augmentation and automated responses to proactively detect and mitigate threats? I think we may be close...
Blog
•Mar 10, 2025
Cribl for Security: The Control Plane for AI's Data Tsunami
AI doesn't just generate insights — it generates data chaos. Cribl brings control back to the pipeline with selective capture, policy-first governance and search-in-place, turning AI exhaust into operational advantage.
Blog
•Nov 11, 2025
A CTO's Primer on Breach & Attack Simulation: Part 1 - Market Landscape
Breach and attack simulation (BAS) tools are revolutionizing cybersecurity by automating threat testing. While tools like AttackIQ and Mandiant Security Validation lead the market, organizations must prioritize their unique needs over flashy features. This article explores how to select the right BAS solution to align with strategic goals and optimize security.
Blog
•Apr 2, 2025
SentinelOne OneCon 2025: Redefining the Future of AI-Driven Security
SentinelOne isn't afraid to take on the hard problems. Too often, as practitioners, we are faced with having to make concessions in our security program for the sake of waiting on our OEM of choice to innovate, acquire or deliver on feature-rich promises over the years of our contract terms. If there is one thing that 2025 has taught me is that SentinelOne is facing those head-on.
Blog
•Nov 12, 2025
Beyond Alerts: The Next Generation of Managed Detection and Response
Next-generation managed detection and response (NGMDR) revolutionizes cybersecurity by integrating AI with human expertise, shifting from reactive to proactive defense. This hybrid model enhances threat detection, reduces response times and anticipates attacks, transforming security from a burden to a strategic enabler of resilience and innovation.
Blog
•Oct 22, 2025
How Generative AI Impacts Identity and Access Management
Explore the potential of generative AI to transform the four pillars of Identity and Access Management (IAM): authentication, authorization, administration and auditing.
Blog
•Aug 7, 2023
Understanding Salt Typhoon: Why Security Leaders Should Take Notice
Salt Typhoon, a Chinese state-sponsored cyber espionage campaign, has targeted critical U.S. telecommunications infrastructure, exposing vulnerabilities and compromising sensitive data. This sophisticated operation underscores the urgent need for robust cybersecurity measures and heightened awareness among security leaders to protect against evolving threats.
Blog
•Feb 7, 2025
Introduction to Cortex XDR
Learn how Cortex XDR secures the future by rewiring security operations.
Blog
•Jan 24, 2023
SIEM Overload to Smart Security: The Power of Data Pipeline and Modern Storage
Traditional SIEMs have long been treated as massive log repositories, leading to skyrocketing costs and visibility gaps. Data pipeline management changes the game — optimizing log ingestion, enriching security data, and reducing SIEM costs without sacrificing detection capabilities. Learn how modern data pipelines, security data lakes and AI-driven analytics are transforming SOC efficiency and redefining how organizations manage security telemetry.
Blog
•Feb 26, 2025
A New Era with Splunk's Agentic SOC
Splunk has listened to its customers, which has resulted in the creation of its Agentic SOC! As Cisco and Splunk have teamed up, it was just a matter of time before their security solutions began to leap leaps and bounds in their AI journey. From the time the data is created until the final incident is remediated, the platform has been fused together into one solid solution with AI baked into every step.
Blog
•Oct 19, 2025
Why WWT + Splunk: Turning Data into Digital Resilience the Right Way
Every enterprise runs on telemetry that streams from apps, networks, clouds and endpoints. Splunk turns that data into insight. WWT turns that insight into outcomes: architectures, integrations and services that scale across observability, security and automation.
Blog
•Sep 10, 2025
WWT Partner Innovation Highlights S4 2025
Read on for highlights from the S4 2025 conference focusing on Innovative OT Security Solutions.
Blog
•Feb 26, 2025