cPacket: Every Packet Counts

Lars Trøen provides an insightful overview of cPacket’s technologies, emphasizing how critical each packet is in network monitoring and analysis. He demonstrated how cPacket’s solutions enable deeper visibility into network traffic, significantly aiding in performance tuning and security threat detection. For additional insights from Security Field Day 13, please visit his coverage on this topic.


Dell’s Comprehensive Approach to AI and the Dell AI Factory

Tom Hollingsworth recently explored Dell’s sophisticated approach toward harnessing the power of AI through the introduction of the Dell AI Factory, aimed at integrating advanced AI solutions into enterprise environments. This initiative combines Dell’s technological infrastructure with smart tools to enhance operational efficiency and innovation within organizations. You can read more about Tom’s insights from Security Field Day 13 on Security Boulevard, covering this topic in greater detail.


Veeam’s Quiet Evolution: From Backups to Detection, Response, and Recovery

Skye Fugate explores the strategic transformation of Veeam from its traditional focus on backups to a broader role encompassing detection, response, and recovery capabilities in enterprise security environments. This shift reflects Veeam’s response to the evolving needs of modern IT infrastructure, where security is paramount. For additional insights on Security Field Day 13 by Skye Fugate, visit his LinkedIn feed.


Microsoft Security Copilot Agents and You

Karen Lopez provides an insightful examination of Microsoft Security Copilot Agents, highlighting their role and impact on IT security protocols. She discusses the integration of these agents into existing security frameworks and their potential to enhance data protection and threat response efficiency. Further insights from Karen on Security Field Day 13 can be found here on LinkedIn.


Learning how Dell’s Hardware-assisted Security brings value to the organization

Lars Trøen explores the significant advantages that Dell’s Hardware-assisted Security offers to organizations, emphasizing how this technology enhances overall system protection and operational efficiency. He highlights the integration of cutting-edge security features into Dell’s hardware, illustrating their pivotal role in countering emerging cyber threats. For further insights and detailed analysis of Security Field Day 13, be sure to check out additional content by Lars Trøen.


Why Supply Chain Security Is The First Line of Defense

Tom Hollingsworth highlights the critical role of supply chain security as the foundational defense mechanism in protecting organizational systems and data. By analyzing how vulnerabilities within the supply chain can lead to widespread security breaches, he emphasizes the need for robust security strategies that address both direct and indirect threats. For additional insights from Security Field Day 13, refer to Tom Hollingsworth’s coverage on Security Boulevard.


Security Field Day 13 – part 1 (finally!)

Futurum Research analyst Fernando Montenegro shares his perspective on the security industry following his first appearance as a delegate at Security Field Day 13. For additional information and coverage from Security Field Day 13, you can visit the Futurum Group website.


From Packets to Protection: How Network Observability Powers Security and Forensics

In this detailed exploration, Tom Hollingsworth discusses the critical role of network observability in enhancing security protocols and facilitating effective forensic analysis. He emphasizes how insights gleaned from observing network traffic can significantly bolster an organization’s cybersecurity measures against increasingly sophisticated threats. For further insights into Security Field Day 13, see additional coverage by Tom Hollingsworth on Security Boulevard.


Beyond the Perimeter: Dell’s Three-Pillar Defense Against Modern Cyber Threats

In his latest analysis, Jack Poller examines Dell’s strategic approach to combatting modern cyber threats through a robust three-pillar defense mechanism. Highlighting innovations in predictive analytics, endpoint security, and cloud protection, Poller sheds light on how Dell’s integrated solutions are designed to enhance organizational resilience in today’s complex security landscape. For additional insights from Security Field Day 13, follow Jack Poller’s coverage on LinkedIn Pulse.


cPacket Networks: The Network Observability Specialists Who Know Their Stack

Skye Fugate explores the expertise of cPacket Networks in network observability, highlighting their comprehensive understanding of networking stacks. The article details how cPacket Networks differentiates itself with deep network insights and smart data-led solutions that enhance network performance and security. For more on Security Field Day 13, read additional analyses by Skye Fugate on this topic.


Learning how Dell’s Hardware-assisted Security brings value to the organization

Lars Trøen recently explored the significant benefits of Dell’s Hardware-assisted Security and its impact on organizational protection. His insights highlight how these technological advancements bolster defense mechanisms, enhancing overall enterprise security. For more insights on Security Field Day 13 from Lars, visit his coverage.


Beyond Backup: How Coveware is Revolutionizing Veeam’s Ransomware Defense

Tom Hollingsworth provides an insightful exploration of how Coveware is enhancing Veeam’s ransomware defense mechanisms, pushing beyond traditional backup solutions to offer a more robust security posture. He explains the strategic integration of Coveware’s tools with Veeam’s technology, which not only secures data but also ensures faster recovery post-attack. For additional insights from Security Field Day 13, see Tom Hollingsworth’s coverage on Security Boulevard.


The Era of Agentic Security with Microsoft Security Copilot

In his recent discussion on The Era of Agentic Security with Microsoft Security Copilot, Tom Hollingsworth explores the evolution of cybersecurity tools, emphasizing the innovative strides Microsoft has made in integrating AI technologies to enhance security operations. He highlights how Microsoft Security Copilot serves as a paradigm shift towards more autonomous, AI-driven security systems that proactively manage and protect IT environments. For additional insights on Security Field Day 13, you can read more articles by Tom Hollingsworth on Security Boulevard.


Fortifying Defenses: Veeam’s Comprehensive Approach to Cyber Resilience

Jack Poller offers a comprehensive review of Veeam’s enhanced cybersecurity measures, illustrating a multi-layered approach aimed at increasing an organization’s cyber resilience. He discussed key enhancements like improved data protection capabilities and the integration of proactive measures to prevent data breaches. You can read more of Jack Poller’s analyses from Security Field Day 13 on LinkedIn Pulse.


Key Takeaways from Security Field Day

Milou Meier attended Security Field Day and provided a look at each of the presenting companies in this LinkedIn Pulse article. Dell Technologies offers a comprehensive range of security services to enhance organizational security. These services include a zero trust framework and managed services. Additionally, AI tools, such as Microsoft Security’s copilot agents, play a crucial role in mitigating cyberattack risks, improving visibility, and optimizing Sec Ops efficiency. Veeam Solutions and Coveware Services provide essential backup and incident response solutions, ensuring resilience against ransomware and other threats.


We Are Long Past Passwords

Passwords have served their use in the enterprise. We need to start moving away from simple passwords as an authentication mechanism. In this episode of the Tech Field Day podcast, Tom Hollingsworth is joined by Tony Efantis, Karen Lopez, and Fernando Montenegro as they discuss the premise that we are long past passwords, exploring the complexities and frustrations of relying on them for myriad online accounts. The conversation highlights the concept of economic externalities, where developers easily implement simple passwords, but the burden of managing hundreds of unique credentials falls on the individual user. While passwords were initially designed for basic authentication, there has been a shift towards alternative mechanisms like one-time codes sent to email or passkeys because of user laziness and the security risks associated with password reuse and compromised credentials. Ultimately, what is needed a balanced, risk-based authentication approach is necessary, tailoring security levels to the sensitivity of the data being protected, and leveraging technologies like biometrics and background risk assessments to create a more convenient and secure user experience, even as attackers continue to evolve their methods.


Breaking Free from Hardcoded Security: Microsoft Introduces Human-in-the-Loop AI Agents

Microsoft has unveiled a groundbreaking innovation in cybersecurity with their introduction of human-in-the-loop AI agents, designed to transcend traditional hardcoded security practices. These AI systems feature advanced capabilities to analyze and respond to security threats dynamically, incorporating human oversight for heightened accuracy and adaptability. For additional insights into Security Field Day 13, explore Jack Poller’s comprehensive analysis on LinkedIn Pulse.


Uncompromising Network Visibility: How cPacket Augments Security with Advanced Telemetry and AI

Jack Poller recently dissected how cPacket Networks is enhancing security in today’s enterprises by integrating advanced telemetry and AI into their network solutions. His analysis illustrates how cPacket’s sophisticated tools provide an unrivaled clarity and insight, allowing for proactive threat detection and management. For additional discussions and insights from Security Field Day 13, follow Jack Poller’s coverage on LinkedIn Pulse.


Microsoft Security Copilot Agents: The Teammates Who Don’t Sleep (and That’s the Point)

Skye Fugate’s latest LinkedIn post discusses the newly introduced Microsoft Security Copilot Agents, highlighting how these advanced artificial intelligence tools continuously monitor and respond to security threats, effectively operating 24/7 without the need for rest. These agents are designed to enhance security teams’ efficiency by handling routine tasks and alerting human counterparts to more complex security issues. For a deeper understanding of these developments, find more coverage of Security Field Day 13 on LinkedIn.


Techstrong Gang – June 3, 2025

The June 3, 2025 episode of Techstrong Gang explored the evolving state of cloud computing, the bloat and inefficiencies of modern production code, and the latest cybersecurity trends, with a strong emphasis on thoughtful, real-world practitioner insights. The third segment focused on Security Field Day, hosted by Foskett, where supply chain security, the evolving promise of data protection vendors claiming to provide full security stacks, and the C-suite’s growing desire for security platform consolidation were analyzed. Yet, despite executive wishes, frontline security professionals remain skeptical and prioritize proven, best-of-breed solutions. The episode concluded with a look at the disconnect between executive strategy and practitioner reality, the increasing role of AI agents, and the persistent people and process challenges that stand between vision and execution in enterprise IT.