PinnedPublished inDeepTempoWe’re losing — but it can’t get any worse, right?LLMs are being used in many ways by attackers; how blind are you?Mar 5Mar 5
PinnedPublished inDeepTempoThe Promise of Cybersecurity Foundation ModelsWhen we introduce our Tempo LogLMs — we often explain that Tempo is a Foundation Model. But what is a foundation model? And is there a…Feb 231Feb 231
PinnedPublished inDeepTempoWatching the Watcher: How we evaluated DeepTempo with the help of a Large FinancialFeb 12Feb 12
Published inDeepTempoFrom Burnout to Breakthrough: How Cybersecurity Leaders See 2025 and BeyondIn the last few weeks, I’ve done some learning in public, interviewing three of our advisors and making those interviews public on YouTube…5d ago5d ago
Published inDeepTempoInvisible C2 — thanks to AI-powered techniquesJust about every cyberattack needs a Command and Control (C2) channel — a way for attackers to send instructions to compromised systems…Mar 14Mar 14
Published inDeepTempoAnomaly Detection for CybersecurityA long promising approach comes of ageDec 28, 2024Dec 28, 2024
Fighting on the New Front Line of Security with Snowflake and LogLMsTempo — a Snowflake Native App — harnesses AI and Log Language Models for Proactive CybersecurityDec 18, 2024Dec 18, 2024
Published inDeepTempoPlatforms are the ProblemA better path forward for cybersecurityDec 14, 20241Dec 14, 20241
Published inDeepTempoYour tech is old, your business models are archaic, and you are burned outOtherwise — cyber security is doing great — except for the billions in wasted spending AND the risk to our way of lifeNov 25, 2024Nov 25, 2024