Skip to content
The Security Bulldog
  • About
  • Blog
  • Contact
  • Get a Demo
  • Sign In

Posts by Jeff

Cyberattack disrupts operations at Brussels Airport, causes major flight cancellations

By Jeff | September 22, 2025
Cyberattack disrupts operations at Brussels Airport, causes major flight cancellations

Brussels Airport asks airlines to cancel half of departures after a cyberattack disrupted its check-in system.

Read More

Map your Playbooks to the Detections and How to Create Better Runbooks in an AI SOC

By Jeff | September 19, 2025
Map your Playbooks to the Detections and How to Create Better Runbooks in an AI SOC

Learn how to effectively map playbooks to detections and create tailored runbooks for AI-driven Security Operations Centers.

Read More

AI in Threat Intelligence: Key Use Cases

By Jeff | September 18, 2025
AI in Threat Intelligence: Key Use Cases

Explore how AI enhances threat intelligence by automating data analysis, improving detection, and streamlining incident response for cybersecurity teams.

Read More

AI in OSINT: Future of Threat Scoring

By Jeff | September 17, 2025
AI in OSINT: Future of Threat Scoring

Explore how AI is revolutionizing OSINT in cybersecurity, enhancing threat scoring through advanced data analysis and addressing ethical challenges.

Read More

Learn How NLPs Help with the Seven Components of Mean Time to Remediate (MTTR)

By Jeff | September 16, 2025
Learn How NLPs Help with the Seven Components of Mean Time to Remediate (MTTR)

Explore how Natural Language Processing (NLP) can significantly reduce Mean Time to Remediate (MTTR) in cybersecurity incident response.

Read More

How AI Enhances CVSS Scoring Accuracy

By Jeff | September 16, 2025
How AI Enhances CVSS Scoring Accuracy

Explore how AI enhances CVSS scoring by automating vulnerability assessments, improving accuracy, and reducing human bias for better cybersecurity strategies.

Read More

Top 7 Use Cases for SIEM and Threat Intelligence

By Jeff | September 2, 2025
Top 7 Use Cases for SIEM and Threat Intelligence

Learn how integrating SIEM with threat intelligence enhances cybersecurity by improving threat detection, response efficiency, and compliance monitoring.

Read More

AI-Driven Scenario Modeling for Threat Intelligence

By Jeff | September 1, 2025
AI-Driven Scenario Modeling for Threat Intelligence

AI-driven scenario modeling transforms cybersecurity by predicting threats through advanced data analysis, enhancing proactive defense strategies.

Read More

How to Integrate High-Quality OSINT with Proprietary Data

By Jeff | August 31, 2025
How to Integrate High-Quality OSINT with Proprietary Data

Learn how to effectively integrate OSINT with proprietary data to enhance cybersecurity threat detection and response processes.

Read More

How to Automate Threat Intelligence Workflows

By Jeff | August 30, 2025
How to Automate Threat Intelligence Workflows

Learn how automation enhances threat intelligence workflows, improves detection, and enables security teams to respond to cyber threats more effectively.

Read More
« Newer Posts
Older Posts »
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • March 2025
  • February 2025
  • January 2025
  • December 2024
  • October 2024
  • May 2024
  • April 2024
  • August 2023
  • May 2023
  • February 2023
  • November 2022
  • October 2022
  • August 2022
  • February 2022
  • Apache
  • Artificial Intelligence
  • Cyber Threat Intelligence
  • Cybersecurity
  • Hacking Tools
  • IOT
  • Machine Learning
  • Microsoft
  • Open Source Intelligence
  • Open Source Software
  • OSINT
  • Podcast
  • Productivity
  • Remediation
  • Security Operations Center
  • The Security Bulldog
  • Uncategorized
  • Use Case
  • Video
  • Privacy Policy
  • Terms of Service
© 2026 The Security Bulldog | Powered by Beaver Builder