Skip to content
The Security Bulldog
  • About
  • Blog
  • Contact
  • Get a Demo
  • Sign In

Posts by Jeff

Cyberattack disrupts operations at Brussels Airport, causes major flight cancellations

By Jeff | September 22, 2025
Cyberattack disrupts operations at Brussels Airport, causes major flight cancellations

Brussels Airport asks airlines to cancel half of departures after a cyberattack disrupted its check-in system.

Read More

Map your Playbooks to the Detections and How to Create Better Runbooks in an AI SOC

By Jeff | September 19, 2025
Map your Playbooks to the Detections and How to Create Better Runbooks in an AI SOC

Learn how to effectively map playbooks to detections and create tailored runbooks for AI-driven Security Operations Centers.

Read More

AI in Threat Intelligence: Key Use Cases

By Jeff | September 18, 2025
AI in Threat Intelligence: Key Use Cases

Explore how AI enhances threat intelligence by automating data analysis, improving detection, and streamlining incident response for cybersecurity teams.

Read More

AI in OSINT: Future of Threat Scoring

By Jeff | September 17, 2025
AI in OSINT: Future of Threat Scoring

Explore how AI is revolutionizing OSINT in cybersecurity, enhancing threat scoring through advanced data analysis and addressing ethical challenges.

Read More

Learn How NLPs Help with the Seven Components of Mean Time to Remediate (MTTR)

By Jeff | September 16, 2025
Learn How NLPs Help with the Seven Components of Mean Time to Remediate (MTTR)

Explore how Natural Language Processing (NLP) can significantly reduce Mean Time to Remediate (MTTR) in cybersecurity incident response.

Read More

How AI Enhances CVSS Scoring Accuracy

By Jeff | September 16, 2025
How AI Enhances CVSS Scoring Accuracy

Explore how AI enhances CVSS scoring by automating vulnerability assessments, improving accuracy, and reducing human bias for better cybersecurity strategies.

Read More

Top 7 Use Cases for SIEM and Threat Intelligence

By Jeff | September 2, 2025
Top 7 Use Cases for SIEM and Threat Intelligence

Learn how integrating SIEM with threat intelligence enhances cybersecurity by improving threat detection, response efficiency, and compliance monitoring.

Read More

AI-Driven Scenario Modeling for Threat Intelligence

By Jeff | September 1, 2025
AI-Driven Scenario Modeling for Threat Intelligence

AI-driven scenario modeling transforms cybersecurity by predicting threats through advanced data analysis, enhancing proactive defense strategies.

Read More

How to Integrate High-Quality OSINT with Proprietary Data

By Jeff | August 31, 2025
How to Integrate High-Quality OSINT with Proprietary Data

Learn how to effectively integrate OSINT with proprietary data to enhance cybersecurity threat detection and response processes.

Read More

How to Automate Threat Intelligence Workflows

By Jeff | August 30, 2025
How to Automate Threat Intelligence Workflows

Learn how automation enhances threat intelligence workflows, improves detection, and enables security teams to respond to cyber threats more effectively.

Read More
« Newer Posts
Older Posts »
© 2026 The Security Bulldog | Powered by Beaver Builder