Security That Explains Itself: What the SOC Really Wants from AI

AI in security operations is evolving into a reasoning partner, but explainability is crucial for building trust and ensuring accountability in AI-driven security decisions. Read more in this article by Vriti Magee following the recent special Tech Field Day presentation by Microsoft Security!

The Principle of the Hidden Key

1Password’s approach to agentic AI security emphasizes deterministic authorization, ensuring every action is traceable and secure. Their Security Principles for AI prioritize keeping secrets secret, ensuring auditability, and minimizing exposure. This is implemented through the Model Context Protocol (MCP), which allows AI to interact with systems without accessing credentials, and partnerships like Browserbase for secure autofill. Read more coverage of Security Field Day by Vriti Magee on her blog!

When Networks Learn to Flow

Nile’s Zero Trust architecture simplifies enterprise security by integrating it directly into the network, eliminating the need for complex overlays. Their approach, based on the “Power of Zero,” emphasizes Zero Trust, Zero Touch, and Zero CapEx, ensuring every device is secure by default and operations are autonomous. By focusing on identity-based security and removing unnecessary human dependency, Nile aims to make network security as seamless as possible. Read more Security Field Day coverage on Vriti Magee’s blog!

Inside the Tab

Vriti Magee follows SquareX’s Security Field Day presentation on Browser Detection and Response. They focused on understanding browser-based attacks by observing user interactions within the browser. Their architecture, consisting of a browser extension and a web policy platform, enables real-time threat prevention by enforcing policies at the browser runtime. This shift from control to understanding emphasizes the importance of context-based visibility in cybersecurity.

My First Cartel Meeting (and What It Taught Me About DNS)

Vriti Magee shares a fascinating narrative of an unconventional encounter that illuminated the complexities of DNS, showing its pivotal role in online security and network operations. Through this personal experience, Vriti highlights the significance of understanding DNS not just as a technical component, but as a crucial part of broader cybersecurity strategies. For more insights following Security Field Day, subscribe to Vriti’s blog!

What If Your Storage Knew How to Talk Back?

Vriti Magee recently posted on LinkedIn following MinIO’s presentation at Cloud Field Day 23. PromptObject allows developers to interact with unstructured data using natural language prompts, retrieving structured JSON responses. This integration with LLM APIs and the Model Context Protocol (MCP) standardizes AI agent interactions with storage, enabling functions like listing buckets and generating dashboards.

Behind the Exabytes: A Field Note from Inside the Cloud

In this article, Vriti Magee takes a look at Sality’s presentation at Cloud Field Day 23. Scality’s RING platform, a practical storage architecture for data-intensive organizations, supports exabyte-scale growth and internal cloud services. Its disaggregated architecture allows independent scaling of compute, storage, and metadata, managing 12 exabytes of data with low latency and high reliability. Scality’s architecture supports native erasure coding, geo-distributed availability zones, and asynchronous replication, making it a backbone for regulated enterprises building internal clouds.

The Lifeboat Is Already in the Water: Rethinking Business Continuity in a Distributed World

In this article by Vriti Magee, the focus is on the evolving strategies for business continuity in an era where traditional centralized operational models are becoming obsolete. It highlights the necessity for organizations to adopt a more distributed approach to ensure resilience and operational stability amidst global disruptions. For more insights into Qumulo, check out our coverage of Cloud Field Day 23.

The Right Cloud, on Our Terms

At Cloud Field Day 23, the emphasis was placed on harnessing the correct cloud solutions that align perfectly with specific organizational needs, ensuring that enterprises can operate on their own terms. The discussions highlighted how tailored cloud services and infrastructure can lead to enhanced efficiency and greater control over data and resources. For more comprehensive coverage of Cloud Field Day 23, watch for articles by Vriti Magee!

Scaling Smarter Optimizes Cloud Costs in the Age of Data Abundance

Keeping every application and every scrap of data on the public cloud becomes very expensive; we need to improve our cloud economics. This episode of the Tech Field Day podcast features Vriti Magee, Mitch Lewis, and Alastair Cooke. The belief that data is the new oil has led many companies to retain every piece of data they generate, often in object storage on public cloud platforms. The continuous growth of this data leads to a growing bill from the cloud provider, often with no clear plan in place for recouping the value of the money spent. Generative AI requires training data, which is another reason to retain everything; again, there needs to be value returned to the business. New designs for cloud applications must include data management and managed retention as key criteria. Sustainable, honest designs that enable business change are vital for delivering value back to the business.

Vriti Magee

Technology Strategist focused on the synergies between cloud, security, and AI to shape intelligent resilient, and trustworthy enterprise architectures.