The Value of Microsoft Security Copilot: SCU Billing and Why Agent Design Matters

March 27, 2026 | David Broggy

Hunter

From Shadow IT to GhostOps: The Rise of Unauthorized AI Agents in the Enterprise

February 24, 2026 | Grant Hutchons

If you have worked in enterprise IT for long enough, you have lived through the ...

Scenario 3: SOC/SIEM Takes in and Summarizes Windows Events (Log Files)

January 29, 2026 | Tom Neaves

In September last year I penned this blog Rogue AI Agents In Your SOCs and ...

Preparing for the AI Job Market: A Security Professional's Roadmap

January 14, 2026 | David Broggy

Every now and then, LevelBlue SpiderLabs diverts a bit from its normal course ...

Rogue AI Agents In Your SOCs and SIEMs – Indirect Prompt Injection via Log Files

September 05, 2025 | Tom Neaves

AI agents (utilizing LLMs and RAG) are being used within SOCs and SIEMS to both ...

How Threat Actors Conduct Election Interference Operations: An Overview

October 18, 2024 | Pauline Bolaños

The major headlines that arose from the three most recent US presidential ...

Sentinels of Ex Machina: Defending AI Architectures

August 05, 2024 | David Broggy

The introduction, adoption, and quick evolution of generative AI has raised ...

Adopt an AI Approach with Confidence, for CISOs and CIOs

July 29, 2024 | Scott Swanson and Kris Kimmerle

This article provides an AI adoption approach for technology leaders chartered ...

Clockwork Blue: Automating Security Defenses with SOAR and AI

July 01, 2024 | David Broggy

It’s impractical to operate security operations alone, using manual human ...

Scanning the Matrix: SIEM Best Practices

June 24, 2024 | David Broggy

(A thought from The Matrix: Neo likely used a SIEM before he took the red pill ...