Articles by SB Team
AI SOC Made Real: Autonomous Cloud Threat Ops at Machine Speed

Attackers log in and move fast. See how Mitiga’s AI-native Cloud Detection & Response feeds Torq’s Autonomous SOC engine to drive closed loop detection, investigation, and remediation across cloud, SaaS, identity, and AI.

Cloud intrusions rarely look like “breaking in.” Attackers are logging in with stolen credentials, abusing SaaS integrations, and moving across cloud and AI infrastructure at machine speed. Meanwhile, SOC teams are drowning in alerts, stitching together fragmented data, and reacting too late to prevent impact.

Now there’s an AI SOC that actually closes the loop.

In this joint session, Mitiga and Torq unveil a real-time, end-to-end AI SOC architecture that detects, investigates, and neutralizes active threats autonomously. Powered by a deep Cloud Security Data Lake.

What you’ll see live

High-fidelity detections with full context: Mitiga’s agentless platform detects attacker behaviors and builds a single attack timeline in seconds to minutes.

Hyperautomation driven by deep forensic data: a Cloud Security Data Lake that retains up to 1,000+ days of normalized log storage – for forensic depth that doesn’t blink.

Closed-loop automation: Mitiga detects and decodes the attack, with alerts that trigger Torq workflows. Torq pulls enrichment and attack context, then orchestrates autonomous response. Together, they eliminate the gap between "alert fired" and "threat contained."

Autonomous case handling at scale: Torq HyperSOC combines a Multi‑Agent System and Hyperautomation engine to triage, investigate, and monitor SOC responses at machine speed.

The manual investigation and response bottleneck just disappeared.

What you'll walk away with

• A practical blueprint for autonomous cloud threat operations built on a Cloud Security Data Lake

• Real-world examples of of how forensic context + automated remediation stop attacks in minutes, not hours.

• Understanding of where human analysts still matter. And where machines should take over

• A path to transforming your SOC into a machine-speed operation that scales with cloud complexity

When attacks move in minutes, your defense needs to move in seconds.

Read More ...
The Future of CNAPP: Operationalizing Cloud Security in 2026

The definition of cloud risk is rapidly evolving. Today’s attack surface extends far beyond traditional infrastructure to include AI workloads, model supply chains, APIs, and autonomous agents. This shift challenges legacy CNAPP approaches focused primarily on posture management and increases pressure on organizations to deliver continuous compliance in a new regulatory landscape.

Modern security demands more than visibility. Effective remediation and robust reporting are now essential to close compliance gaps quickly and demonstrate audit readiness. Security leaders must move from passive dashboards to active risk operations where compliance, remediation, and actionable insights work together to manage AI-native risk.

Join Qualys SVP Kunal Modasiya and guest speaker Andras Cser of Forrester for a strategic discussion on the evolution of CNAPP. They will explore the capabilities required to manage a converging attack surface and bring clarity to an increasingly consolidated market.

What you’ll learn:

  • From Cloud-Native to AI-Native: How the attack surface is expanding beyond hosts and containers to include AI models, APIs, and autonomous agents.
  • From Posture to Risk Operations: Why CNAPP must evolve to provide runtime-aware prioritization, attack path analysis, and measurable risk reduction.
  • True Platform Integration: What defines a unified platform, including a shared data model, policy framework, and access control serving teams from DevOps to incident response.
  • The Role of Agentic AI: How Agentic AI and copilots help match remediation speed with detection speed.
  • Pricing Transparency: How to demand clear, transparent pricing without hidden fees as solutions converge
Read More ...
The Future of CNAPP: Operationalizing Cloud Security in 2026

The definition of cloud risk is rapidly evolving. Today’s attack surface extends far beyond traditional infrastructure to include AI workloads, model supply chains, APIs, and autonomous agents. This shift challenges legacy CNAPP approaches focused primarily on posture management and increases pressure on organizations to deliver continuous compliance in a new regulatory landscape.

Modern security demands more than visibility. Effective remediation and robust reporting are now essential to close compliance gaps quickly and demonstrate audit readiness. Security leaders must move from passive dashboards to active risk operations where compliance, remediation, and actionable insights work together to manage AI-native risk.

Join Qualys SVP Kunal Modasiya and guest speaker Andras Cser of Forrester for a strategic discussion on the evolution of CNAPP. They will explore the capabilities required to manage a converging attack surface and bring clarity to an increasingly consolidated market.

What you’ll learn:

  • From Cloud-Native to AI-Native: How the attack surface is expanding beyond hosts and containers to include AI models, APIs, and autonomous agents.
  • From Posture to Risk Operations: Why CNAPP must evolve to provide runtime-aware prioritization, attack path analysis, and measurable risk reduction.
  • True Platform Integration: What defines a unified platform, including a shared data model, policy framework, and access control serving teams from DevOps to incident response.
  • The Role of Agentic AI: How Agentic AI and copilots help match remediation speed with detection speed.
  • Pricing Transparency: How to demand clear, transparent pricing without hidden fees as solutions converge
Read More ...
Why Pentests, TTPs, and Good Security Hygiene Still Won’t Save Your Organization From Ransomware

Many organizations have done many “right” things. They run penetration tests. They map adversary Tactics, Techniques, and Procedures (TTPS) to MITRE ATT&CK. They tune detections and feel reasonably confident in their security posture. And then ransomware happens anyway.

This session explains why that outcome is not a failure of pentesting or TTP-based defense, but a misunderstanding of what those practices are designed to deliver. Pentests show how an attacker could, maybe, break in. TTPS describe how attackers operate but doesn’t determine whether your organization can survive one.

No zero days. No novel techniques. Alerts fired. Tickets created. By the time humans were confident the attack was “real,” the attackers had already achieved irreversible impact. This session will walk through real-world ransomware campaigns, minute by minute: initial access, credential abuse, lateral movement, backup destruction, encryption, and extortion.

The session will focus on the decisive moments that actually change outcomes — and the ones that didn’t. Attendees will see why attackers go after recovery infrastructure first, how traditional and even offline backups fail under real pressure, and why organizations with properly orchestrated immutable data recovery processes are able to shut down negotiations and restore operations without paying.

Thus, the talk shifts from “How do we stop every attack” to “What actually limits blast radius and guarantees recovery?”

Key takeaways include:

• What pentests and TTPS did not predict in real ransomware incidents.

• The speed at which modern ransomware operations actually move.

• Why immutability and isolation alone are not enough.

• How guaranteed restore capability removes attacker leverage.

• How security controls should align with reality, not compliance checklists or maturity models.

• How organizations can recalibrate toward what actually matters when prevention inevitably fails.

Read More ...
Planning for the Inevitable: Staying Ahead of Modern Phishing Attacks

With AI at their disposal, threat actors are getting craftier than ever with their phishing attacks. And while your users may feel confident in spotting poorly spelled, obvious phishing emails, the reality is that most are unaware of just how sophisticated today’s phishing lures have become. If you’re not training your users to spot these modern phishing tactics on a regular basis, you’re opening the doors for adversaries to wreak havoc on your business.

In this webinar, Huntress will explore why yesterday's security awareness training is one of today's biggest risks. We will show you how modern phishing attacks really work and how you can keep up with evolving tradecraft to avoid compromise.

  • The Self-Fail: We’ll explore why training once a year with generic templates hurts your business and fails to prepare users for the real threats they face.
  • The Latest Tradecraft: See live demos of the newest phishing techniques attackers are using, including ClickFix, FileFix, and browser-in-the-browser attacks that bypass traditional security measures.
  • The Better Way: Learn how the Huntress Security Platform helps you build a resilient defense by combining continuous, tradecraft-informed training with 24/7 expert monitoring and response.

If you feel overwhelmed by the risk of end users falling victim to phishing attacks, this webinar is for you. We’ll give you practical steps to build a security posture that can actually stand up to modern phishing—all without adding more tools or overwhelming your team.

Read More ...
Subscribe for the Latest News
Webinars
Scaling Code Security for Builders Beyond Developer-First
Cyber Resilience in Action: How IBM and Index Engines Deliver a Detection-to-Recovery Pipeline
Passwordless Authentication: A Practical Approach to Modernizing Access