Why the traditional SOC model needs to evolve [Q&A]


The security operations center (SOC) has long relied on traditional SOAR platforms to manage incidents, but today’s threat landscape is moving too fast for rigid, static approaches. As attackers use AI to evolve their tactics, security teams need smarter, more adaptive systems to keep up.
We spoke to Tom Findling, co-founder and CEO of Conifers.ai, about how AI-powered SOC platforms are helping organizations scale their defenses, improve threat detection, and move from reactive alert management to proactive risk reduction.
Exaforce brings AI to the security operations center


Today's security operations center has to deal with a relentless flood of telemetry from IaaS, SaaS, identity providers, endpoints, and email providers. While AI can help many existing solution focus only on a small portion of SOC challenges.
Exaforce is launching its agentic security operations (SOC) platform, combining AI-native capabilities for the entire SOC lifecycle alongside a fully managed MDR service. It aims to employ agentic AI across the entire security operations lifecycle, spanning threat detection, alert triage, investigation, threat hunting, and response.
How the SOC is evolving to meet new threats [Q&A]


As cybersecurity threats grow more sophisticated and relentless, the role of the Security Operations Center (SOC) has never been more critical.
In response organizations are re-imagining their SOCs to address the dual challenges of an evolving threat landscape and a shifting workforce dynamic. We spoke to Scott Scheppers, chief experience officer at LevelBlue to find out more about this shift and how SOC teams are pivotal in safeguarding operations, fostering innovation, and mentoring the next generation of cybersecurity talent.
SIEM and its role in the enterprise SOC [Q&A]


SIEM (security information and event management) is currently one of the cybersecurity field’s most active markets. It holds the promise of making sense of the disparate data sources across enterprise environments to detect and respond to malicious activity.
Over the past year, we’ve witnessed a wave of innovation, mergers and acquisitions and consolidation in this area, largely driven by AI advancements and the push toward the AI-native security operations center (SOC). But there's also a 'data paradox' involved in balancing cost with importing and storing as much data as possible.
Security platform adopts Open API standards


Exabeam's cloud-native, New-Scale Security Operations Platform has become the first security operations platform compatible with the Open-API Standard (OAS).
This gives SOC teams the power to quickly create automations and playbooks with their best-of-breed portfolios and ditch disjointed, monolithic systems that provide merely 'good enough' security.
Qualys launches cloud-based risk operations center


Organizations are facing an ever-growing volume of risk alerts spread across multiple, disconnected top-10 dashboards. This fragmented view can result in conflicting analyses, duplicate work, missed threats, and strategies that fail to fully protect the organization.
Cloud-based security firm Qualys is addressing this with the launch of a new Risk Operations Center (ROC) with Enterprise TruRisk Management (ETM) that enables CISOs and business leaders to manage cybersecurity risks in real time, transforming fragmented, siloed data into actionable insights that align cyber risk operations with business priorities.
Businesses turn to generative AI but many don't have policies on it


According to a new report, 93 percent of security leaders say public gen AI is in use across their respective organizations, and 91 percent report using gen AI specifically for cybersecurity operations.
But the study of more than 1,600 security leaders, from Splunk and Enterprise Strategy Group, shows that despite this high adoption 34 percent of surveyed organizations say they don't have a gen AI policy in place, and 65 percent of respondents admit to not fully understanding the implications of the tech.
Cyber fusion -- what is it and why is it important for security? [Q&A]


Today's IT security teams face several key challenges. Tasked with combating the rising volume and frequency of sophisticated cyber threats, they are bombarded with a tsunami of alerts generated by countless security tools that deliver little context or value-add insight.
Effectively processing and analyzing all this data to identify actionable threat intelligence requires considerable time and effort.
How to build a security operations center from the ground up


Building a security operations center (SOC) is a tall feat. With the global technology talent shortage estimated at 85 million workers by 2030, it is clear that talent is, and will continue to be, hard to find.
Organizations must learn to create a SOC in an adaptable way that makes scaling to meet varying demands of clients simple while addressing the cybersecurity talent shortage. Special considerations should be made regarding tool selection, proper staffing, organizational needs and performing a gap/risk analysis utilizing outside consultation when applicable. Let’s explore a few best practices.
Recent Headlines
Most Commented Stories
BetaNews, your source for breaking tech news, reviews, and in-depth reporting since 1998.
Regional iGaming Content
© 1998-2025 BetaNews, Inc. All Rights Reserved. About Us - Privacy Policy - Cookie Policy - Sitemap.