Blogs
July 30, 2025 / July 30, 2025 by Neal Bridges | Leave a Comment
This is blog #6 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized data is the differentiator in AI for Security Operations. As part of this blog series, we’re introducing the release of six mission-specific AI Agents now available in preview to Query customers. These agents are designed […]
Read more »
July 28, 2025 / July 28, 2025 by Neal Bridges | Leave a Comment
This is blog #5 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized data is the differentiator in AI for Security Operations. As part of this blog series, we’re introducing the release of six mission-specific AI Agents now available in preview to Query customers. These agents are designed […]
July 24, 2025 / July 24, 2025 by Neal Bridges | Leave a Comment
This is blog #4 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized data is the differentiator in AI for Security Operations. As part of this blog series, we’re introducing the release of six mission-specific AI Agents now available in preview to Query customers. These agents are designed […]
July 23, 2025 / July 23, 2025 by Neal Bridges | Leave a Comment
This is blog #3 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized data is the differentiator in AI for Security Operations. As part of this blog series, we’re introducing the release of six mission-specific AI Agents now available in preview to Query customers. These agents are designed […]
July 22, 2025 / July 22, 2025 by Neal Bridges | Leave a Comment
Background: The Inescapable Human Element In my three decades in cybersecurity, from Big 4 consulting war rooms to the CISO’s chair, I’ve seen technologies come and go. We’ve chased silver bullets from next-gen firewalls to EDR, and now we stand at the leading edge of the AI revolution. Yet, the most powerful and often underestimated […]
July 16, 2025 / July 18, 2025 by Neal Bridges | Leave a Comment
This is blog #2 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized data is the differentiator in AI for Security Operations. As part of this blog series, we’re introducing the release of six mission-specific AI Agents...
July 14, 2025 / July 18, 2025 by Neal Bridges | Leave a Comment
This is blog #1 in a series of 6 discussing AI Agents, the Query Security Data Mesh, and why normalized data is the differentiator in AI for Security Operations. As part of this blog series, we’re introducing...
July 10, 2025 / July 10, 2025 by Neal Bridges | Leave a Comment
Background: Why a Security Data Operations Self-Assessment is Non-Negotiable In my 30 years navigating the ever-shifting landscapes of IT and cybersecurity, from Big 4 consulting trenches to CISO leadership at Fortune 100s, I’ve witnessed a fundamental truth evolve: security operations and security data are two sides of the same coin. You simply cannot have a […]
July 1, 2025 / June 27, 2025 by Neal Bridges | Leave a Comment
After more than 30 years on the front lines of cybersecurity—from the trenches of incident response in Fortune 100 companies to the strategy rooms of Big 4 consulting and the CISO’s office—I’ve seen the industry evolve at a dizzying pace. But one truth has become more profound with each passing year: The modern Security Operations […]
April 21, 2025 / April 21, 2025 by Neal Bridges | Leave a Comment
This is part II of a series exploring the concepts and potential of Federated Security. See more. Introduction In the trenches of cybersecurity, investigations and threat hunting are where the rubber meets the road. The combination of your people, processes, and technology will match up against a threat and/or adversary. Both investigations (including incident response) […]