logo
#

Latest news with #SecOps

Cybersecurity Expert Adeel Shaikh Releases Updated Book on AI-Driven SOC Transformation
Cybersecurity Expert Adeel Shaikh Releases Updated Book on AI-Driven SOC Transformation

Yahoo

time13-06-2025

  • Business
  • Yahoo

Cybersecurity Expert Adeel Shaikh Releases Updated Book on AI-Driven SOC Transformation

Second edition of 'AI-Driven Transformation of the SOC and SecOps' explores ethical automation, operational efficiency, and the future of intelligent security systemsAdeel Shaikh Muhammad Image DUBAI, United Arab Emirates, June 13, 2025 (GLOBE NEWSWIRE) -- Adeel Shaikh Muhammad, a leading cybersecurity and AI strategist, speaker, and author, has announced the release of the second edition of his highly regarded book, AI-Driven Transformation of the SOC and SecOps. The new edition provides updated insights into how Artificial Intelligence (AI) is revolutionizing Security Operations Centers (SOCs) and SecOps, helping security professionals reduce alert fatigue, unify security tools, and enhance incident response using machine learning and automation. Building on the success of the first edition, the updated version includes additional case studies, expanded analysis of AI-driven SOC workflows, and a deeper discussion on balancing automation with ethical and regulatory considerations. The book is designed for security leaders, analysts, and decision-makers navigating the fast-changing threat landscape and seeking practical strategies to implement intelligent, adaptive defenses. Adeel brings over 15 years of experience in information security and IT across the Gulf region and beyond, having led more than 70+ Cybersecurity and IT projects in sectors including government, finance, education, and energy. His expertise is widely sought in both operational and strategic contexts, where he consults on digital transformation, SOC optimization, and the responsible use of emerging technologies. He also shares insights and industry updates on his LinkedIn profile, where he engages with peers and professionals in the cybersecurity and AI communities. Alongside his industry work, Adeel is currently pursuing a Doctorate in Business Administration from the Swiss School of Management. His academic research, titled 'Exploring the Impact of Artificial Intelligence on Enhancing and Simplifying SOC Mechanisms,' explores how AI can streamline threat detection and incident response processes, with a specific focus on the evolving cybersecurity landscape. In a recent interview with Edward Preston on The EPic HYPE Show, Adeel spoke about the necessity of grounding AI tools in trust and security: 'AI can be a force multiplier, but it must be rooted in trust. Without securing the underlying systems where data lives, we're just building smart tools on shaky ground.' His insights were also featured during a fireside session at RSA Conference 2025, where he joined a panel hosted by AI security platform Kindo to discuss the intersection of automation and ethics in modern SOC environments. 'If an AI system blocks a user, flags a transaction, or initiates a response, who is accountable?' Adeel asked. 'We need governance frameworks that define these boundaries clearly.' In addition to AI-Driven Transformation of the SOC and SecOps, Adeel is the author of AI and Us: The Ethical Choices, which examines the broader societal and regulatory implications of artificial intelligence. Both titles are available on Amazon and have been adopted by universities, training academies, and enterprise security teams looking to stay ahead of industry developments. In 2025, Adeel was honored as Cybersecurity Architect of the Year by the Cybersecurity Excellence Awards for his work in designing secure digital infrastructures and promoting resilience in mission-critical systems. He also serves as a Global Ambassador for Responsible AI with the Global Council for Responsible AI (GCRAI), where he advocates for transparent, auditable AI systems that respect user privacy and accountability standards. Adeel's future plans include hosting a series of workshops across the Gulf region, contributing to policy discussions on AI regulation, and supporting regional enterprises in adopting intelligent, secure, and compliant cybersecurity strategies. As digital threats become more advanced and widespread, Adeel's work continues to resonate with organizations seeking guidance in implementing AI responsibly and effectively. His emphasis on combining technical innovation with human oversight offers a roadmap toward more resilient and trustworthy security infrastructures. Media Contact:Adeel Shaikh Muhammadme@ +971 50 759 A photo accompanying this announcement is available at while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data

Cybersecurity Expert Adeel Shaikh Releases Updated Book on AI-Driven SOC Transformation
Cybersecurity Expert Adeel Shaikh Releases Updated Book on AI-Driven SOC Transformation

Yahoo

time13-06-2025

  • Business
  • Yahoo

Cybersecurity Expert Adeel Shaikh Releases Updated Book on AI-Driven SOC Transformation

Second edition of 'AI-Driven Transformation of the SOC and SecOps' explores ethical automation, operational efficiency, and the future of intelligent security systemsAdeel Shaikh Muhammad Image DUBAI, United Arab Emirates, June 13, 2025 (GLOBE NEWSWIRE) -- Adeel Shaikh Muhammad, a leading cybersecurity and AI strategist, speaker, and author, has announced the release of the second edition of his highly regarded book, AI-Driven Transformation of the SOC and SecOps. The new edition provides updated insights into how Artificial Intelligence (AI) is revolutionizing Security Operations Centers (SOCs) and SecOps, helping security professionals reduce alert fatigue, unify security tools, and enhance incident response using machine learning and automation. Building on the success of the first edition, the updated version includes additional case studies, expanded analysis of AI-driven SOC workflows, and a deeper discussion on balancing automation with ethical and regulatory considerations. The book is designed for security leaders, analysts, and decision-makers navigating the fast-changing threat landscape and seeking practical strategies to implement intelligent, adaptive defenses. Adeel brings over 15 years of experience in information security and IT across the Gulf region and beyond, having led more than 70+ Cybersecurity and IT projects in sectors including government, finance, education, and energy. His expertise is widely sought in both operational and strategic contexts, where he consults on digital transformation, SOC optimization, and the responsible use of emerging technologies. He also shares insights and industry updates on his LinkedIn profile, where he engages with peers and professionals in the cybersecurity and AI communities. Alongside his industry work, Adeel is currently pursuing a Doctorate in Business Administration from the Swiss School of Management. His academic research, titled 'Exploring the Impact of Artificial Intelligence on Enhancing and Simplifying SOC Mechanisms,' explores how AI can streamline threat detection and incident response processes, with a specific focus on the evolving cybersecurity landscape. In a recent interview with Edward Preston on The EPic HYPE Show, Adeel spoke about the necessity of grounding AI tools in trust and security: 'AI can be a force multiplier, but it must be rooted in trust. Without securing the underlying systems where data lives, we're just building smart tools on shaky ground.' His insights were also featured during a fireside session at RSA Conference 2025, where he joined a panel hosted by AI security platform Kindo to discuss the intersection of automation and ethics in modern SOC environments. 'If an AI system blocks a user, flags a transaction, or initiates a response, who is accountable?' Adeel asked. 'We need governance frameworks that define these boundaries clearly.' In addition to AI-Driven Transformation of the SOC and SecOps, Adeel is the author of AI and Us: The Ethical Choices, which examines the broader societal and regulatory implications of artificial intelligence. Both titles are available on Amazon and have been adopted by universities, training academies, and enterprise security teams looking to stay ahead of industry developments. In 2025, Adeel was honored as Cybersecurity Architect of the Year by the Cybersecurity Excellence Awards for his work in designing secure digital infrastructures and promoting resilience in mission-critical systems. He also serves as a Global Ambassador for Responsible AI with the Global Council for Responsible AI (GCRAI), where he advocates for transparent, auditable AI systems that respect user privacy and accountability standards. Adeel's future plans include hosting a series of workshops across the Gulf region, contributing to policy discussions on AI regulation, and supporting regional enterprises in adopting intelligent, secure, and compliant cybersecurity strategies. As digital threats become more advanced and widespread, Adeel's work continues to resonate with organizations seeking guidance in implementing AI responsibly and effectively. His emphasis on combining technical innovation with human oversight offers a roadmap toward more resilient and trustworthy security infrastructures. Media Contact:Adeel Shaikh Muhammadme@ +971 50 759 A photo accompanying this announcement is available at

New AI-Detection Engineering Assistant from Cymulate Automates SIEM Rule Validation for SecOps and Blue Teams
New AI-Detection Engineering Assistant from Cymulate Automates SIEM Rule Validation for SecOps and Blue Teams

Yahoo

time09-06-2025

  • Business
  • Yahoo

New AI-Detection Engineering Assistant from Cymulate Automates SIEM Rule Validation for SecOps and Blue Teams

Innovation streamlines threat detection engineering with automated testing, control integrations and enhanced detections NEW YORK & TEL AVIV, Israel, June 09, 2025--(BUSINESS WIRE)--Cymulate, the leader in threat exposure validation, today announced the release of its powerful new AI-powered detection engineering assistant for security information and event management (SIEM) rule threat coverage validation. Now, the Cymulate Platform automates and streamlines the detection engineering process for blue teams and SecOps, allowing them to build, test and optimize threat detection with AI-assisted live-data attack simulations and customized threat detection. With this launch, Cymulate eliminates the friction of manual detection validation by automating the correlation and testing process, answering the two most important questions in modern detection engineering: "Does my rule work?" and "What threats does it actually cover?" This enables SecOps and blue teams to identify coverage gaps and tune rules in minutes, whereas previously, mapping detection rules to relevant threats required hours of manual effort, reviewing rule logic, identifying threat coverage and testing scenarios one by one. By automating the correlation between detection rules and Cymulate attack scenarios leveraging advanced AI analysis, organizations can now ensure their SIEM rules are continuously validated against real-world threats and optimized with precision. "Detection engineering doesn't have to be complicated, and Cymulate applies AI to help organizations across the globe drastically simplify their process. What once required lengthy back-and-forth between detection engineers and red teamers can now be done in just minutes," said Avihai Ben-Yossef, co-founder and CTO of Cymulate. "As today's threat actors look to exploit security gaps faster and with more sophisticated methods, it's clear that security teams need a continuous focus on threat detection. Cymulate is proud to set the standard for exposure validation, and our new SIEM solution applies the latest AI-driven automation technology to address some of the most complicated areas in detection engineering." The Cymulate platform now features deeper integrations with SIEMs and AI-powered analysis to map detection rules to its extensive library of more than 100,000 attack scenarios. Cymulate validates SIEM detection rules through live-data attack simulations, which test and validate both detection logic and the collection of logs and events required to support the rule. The Cymulate Exposure Validation Platform helps SecOps and blue teams: Identify gaps in their detection capabilities before adversaries can go unnoticed Operationalize threat intel to build custom threat validation Understand when and why existing threat detection fails to trigger Accelerate detection tuning with relevant indicators of behavior, pre-built Sigma rules and EDR rule Maximize visibility and coverage across the MITRE ATT&CK® framework To learn more about the Cymulate Exposure Validation Platform, visit About Cymulate Cymulate, the leader in security and exposure validation, provides the single source of truth for threat exposure and the actions required to close security gaps before attackers can exploit them. More than 1,000 customers worldwide rely on the Cymulate platform to baseline their security posture and strengthen cyber resilience with continuous discovery, validation, prioritization, and guided remediation of security weaknesses. Cymulate automates advanced offensive security testing to validate controls, threats, and attack paths. As an open platform, Cymulate integrates with existing security and IT infrastructure and drives the workflows of the exposure management process. For more information, visit View source version on Contacts Media Contact: Melissa CifarelliAccount Directorprcymulate@

New AI-Detection Engineering Assistant from Cymulate Automates SIEM Rule Validation for SecOps and Blue Teams
New AI-Detection Engineering Assistant from Cymulate Automates SIEM Rule Validation for SecOps and Blue Teams

Business Wire

time09-06-2025

  • Business
  • Business Wire

New AI-Detection Engineering Assistant from Cymulate Automates SIEM Rule Validation for SecOps and Blue Teams

NEW YORK & TEL AVIV, Israel--(BUSINESS WIRE)-- Cymulate, the leader in threat exposure validation, today announced the release of its powerful new AI-powered detection engineering assistant for security information and event management (SIEM) rule threat coverage validation. Now, the Cymulate Platform automates and streamlines the detection engineering process for blue teams and SecOps, allowing them to build, test and optimize threat detection with AI-assisted live-data attack simulations and customized threat detection. With this launch, Cymulate eliminates the friction of manual detection validation by automating the correlation and testing process, answering the two most important questions in modern detection engineering: 'Does my rule work?' and 'What threats does it actually cover?' This enables SecOps and blue teams to identify coverage gaps and tune rules in minutes, whereas previously, mapping detection rules to relevant threats required hours of manual effort, reviewing rule logic, identifying threat coverage and testing scenarios one by one. By automating the correlation between detection rules and Cymulate attack scenarios leveraging advanced AI analysis, organizations can now ensure their SIEM rules are continuously validated against real-world threats and optimized with precision. 'Detection engineering doesn't have to be complicated, and Cymulate applies AI to help organizations across the globe drastically simplify their process. What once required lengthy back-and-forth between detection engineers and red teamers can now be done in just minutes,' said Avihai Ben-Yossef, co-founder and CTO of Cymulate. 'As today's threat actors look to exploit security gaps faster and with more sophisticated methods, it's clear that security teams need a continuous focus on threat detection. Cymulate is proud to set the standard for exposure validation, and our new SIEM solution applies the latest AI-driven automation technology to address some of the most complicated areas in detection engineering.' The Cymulate platform now features deeper integrations with SIEMs and AI-powered analysis to map detection rules to its extensive library of more than 100,000 attack scenarios. Cymulate validates SIEM detection rules through live-data attack simulations, which test and validate both detection logic and the collection of logs and events required to support the rule. The Cymulate Exposure Validation Platform helps SecOps and blue teams: Identify gaps in their detection capabilities before adversaries can go unnoticed Operationalize threat intel to build custom threat validation Understand when and why existing threat detection fails to trigger Accelerate detection tuning with relevant indicators of behavior, pre-built Sigma rules and EDR rule Maximize visibility and coverage across the MITRE ATT&CK® framework To learn more about the Cymulate Exposure Validation Platform, visit About Cymulate Cymulate, the leader in security and exposure validation, provides the single source of truth for threat exposure and the actions required to close security gaps before attackers can exploit them. More than 1,000 customers worldwide rely on the Cymulate platform to baseline their security posture and strengthen cyber resilience with continuous discovery, validation, prioritization, and guided remediation of security weaknesses. Cymulate automates advanced offensive security testing to validate controls, threats, and attack paths. As an open platform, Cymulate integrates with existing security and IT infrastructure and drives the workflows of the exposure management process. For more information, visit

Angel or Adversary: Deep Instinct Research Highlights the Double-Edged Sword of AI in Cybersecurity
Angel or Adversary: Deep Instinct Research Highlights the Double-Edged Sword of AI in Cybersecurity

Business Wire

time04-06-2025

  • Business
  • Business Wire

Angel or Adversary: Deep Instinct Research Highlights the Double-Edged Sword of AI in Cybersecurity

NEW YORK--(BUSINESS WIRE)-- Deep Instinct, the preemptive data security company built on the first and only AI-based deep learning framework for cybersecurity, today released the sixth edition of its Voice of SecOps Report, which delves into the growing influence of AI in business, with a focus on its impact on Security Operations (SecOps). While AI adoption is accelerating, the findings uncover a more complex reality: security teams are limited by knowledge gaps, inconsistent implementation, and mounting operational pressures as they face an increasingly treacherous, AI-driven threat landscape. The research, ' Cybersecurity & AI: Promises, Pitfalls​​ – and Prevention Paradise,' found that nearly three-quarters (72%) of organizations have revised their cybersecurity strategies over the past year due to AI, and a whopping 86% have increased their use of AI within SecOps. Despite the investments, two-thirds of respondents were confused about fundamental AI definitions, with 38% unable to differentiate between machine learning and deep learning – signaling an alarming knowledge gap in the industry. Additional key findings from the report include the following: AI-Powered Cyber Threats Drive a Focus on Prevention As cybercriminals build and adopt AI tools, the nature and scale of attacks have drastically evolved and expanded. Nearly half (46%) of organizations experienced an uptick in targeted phishing attacks, while 43% reported deepfake impersonation attempts. Attacks on local or cloud storage were also a growing concern, cited as a top risk by 83% of respondents, second only to phishing (84%). In response to these AI-powered attacks, 82% of organizations say they have shifted toward a prevention-first security strategy, with 64% noting a direct push from the C-suite to adopt more proactive defense measures. Benefits of AI in Cybersecurity Roles Are Clear, Yet It Unexpectedly Contributes to Burnout SecOps teams appear to be reaping the benefits of AI, with 76% stating it makes their roles easier while saving security teams an average of 12 hours per week on manual processes. However, while GenAI may be simplifying some aspects of SecOps workloads, nearly 70% of security professionals believe AI also contributes to burnout. Regulatory complexity adds another layer of strain, with 32% citing difficulties in keeping up with increasing AI-related policies, and an additional 37% fearing AI-related regulations are a financial penalty waiting to happen. Preemptive Data Security: The New Imperative In the face of mounting threats, operational burnout, and AI confusion, preemptive data security – a subset of Gartner's recently introduced preemptive cybersecurity market category – offers a definitive path forward. By harnessing the power of deep learning to prevent threats before they execute, organizations will reduce risk, ease the burden on SecOps teams, and stay ahead of relentless adversaries. 'The traditional 'detect and respond' cybersecurity model is broken – it's reactive, expensive, and no match for AI-powered threats,' said Lane Bess, CEO of Deep Instinct. 'To win this fight, cybersecurity teams must shift from chasing threats to preventing them. Preemptive data security – powered by deep learning, the most advanced form of AI – is the only way for SecOps teams to regain control and stay ahead of adversaries.' To get the full report and download past Voice of SecOps reports, please visit s. Then register for our webinar, Cybersecurity & AI: Promises, Pitfalls – and Prevention Paradise (2025 Voice of SecOps Research), to learn about the top findings from this year's report. Survey Methodology Sapio Research surveyed 500 senior cybersecurity experts from companies with 1000+ employees in the U.S. The interviews were conducted online in April 2025 using an email invitation and an online survey. Respondents worked at organizations that operated in either financial services, technology, manufacturing, retail, healthcare, public sector, or critical infrastructure (such as telecoms, energy, utilities, and transportation). For this specific report, the C-suite is defined as those who hold chief, global, head of department, or director roles, while reports are those who hold a manager, administrator, analyst, team lead, or officer role. About Deep Instinct Deep Instinct, the first and only preemptive data security company built on a deep learning cybersecurity framework, prevents unknown threats in <20 milliseconds, 750X faster than the fastest ransomware can encrypt. Deep Instinct Data Security X (DSX) secures data at-rest or in-motion – across cloud, NAS, applications, and endpoints. DSX Brain, Deep Instinct's deep learning framework, prevents zero-day threats that no one else can find, with >99% accuracy and a <0.1% false positive rate. DIANNA, the DSX Companion, leverages GenAI to provide unparalleled explainability into unknown threats in <10 seconds. For more, visit

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store