Sep 16, 2025
•
12 min read
Sep 11, 2025
•
11 min read
Introducing the AI SOC Shift Map
Aug 21, 2025
•
14 min read
Memory, Bias, and Drift in Real SOCs
Aug 13, 2025
•
6 min read
Jul-Aug / 25
Jul 31, 2025
•
10 min read
Are Your SOC Playbooks Broken?
Jul 22, 2025
•
14 min read
Start Building It
Jun 25, 2025
•
10 min read
DSAEM Loop (Detect > SOP > Automate > Emulate > Measure
Jun 17, 2025
•
13 min read
May 29, 2025
•
4 min read
Introducing PICERL Index
May 20, 2025
•
14 min read
May 7, 2025
•
12 min read
What’s the Actual Difference?
Apr 28, 2025
•
9 min read
Technical considerations for Security Operations teams
Apr 23, 2025
•
8 min read
Apr 3, 2025
•
12 min read
Addressing Critical Investigation and Triage Bottlenecks
Mar 25, 2025
•
10 min read
And What Your Team Will Actually Do
Mar 20, 2025
•
11 min read
A Practical Guide to Automated Alert Triage
Mar 6, 2025
•
8 min read
NextGen MDR
Feb 18, 2025
•
15 min read
A Practical Blueprint for Every IR Stage
Jan 31, 2025
•
9 min read
Choosing Your AI Sidekick
Dec 12, 2024
•
9 min read
Rethinking the SOC with Autonomous SecOps Orchestration
Nov 25, 2024
•
13 min read
Leveraging AI Agents to Evolve Cybersecurity Practices
Oct 21, 2024
•
8 min read
Here’s Your Unbiased Buyer’s Guide
Sep 11, 2024
•
11 min read
Understanding the Diverging Trends
Aug 29, 2024
•
8 min read
How to Balance SOAR, Hyperautomation, and Dedicated Tools
Aug 6, 2024
•
10 min read
ASAP - Why not another buzz word
Jul 18, 2024
•
12 min read
Enhance, Support, and Orchestrate Your Defenses
Jul 11, 2024
•
7 min read
SOC vs SecEng
Jun 24, 2024
•
10 min read
How RPA and Hyperautomation Can Supercharge Your DORA Compliance
Jun 6, 2024
•
4 min read
New Developments in SOAR, Hyperautomation, and Autonomous SOC
May 29, 2024
•
8 min read
May 15, 2024
•
8 min read
Responding to Cyber Threats with Flexible Roadmaps
Apr 18, 2024
•
5 min read
Open Source Security Automation Projects
Apr 9, 2024
•
6 min read
Apr 1, 2024
•
9 min read
comprehensive list and analysis (2024)
Mar 18, 2024
•
11 min read
Framework for Cyber Threat Detection and Security Automation
Feb 20, 2024
•
10 min read
Feb 5, 2024
•
9 min read
Jan 16, 2024
•
4 min read
Mastering Cyber Threats with Hyperautomation Techniques
Jan 12, 2024
•
6 min read
How Automation Can Improve Efficiency and Effectiveness
Jan 10, 2024
•
3 min read
Jan 4, 2024
•
6 min read
Building a Robust Security Automation & Orchestration Program
Dec 27, 2023
•
3 min read
Blog Categories
Welcome to the one and only Cyber Security Automation dedicated blog. This space is dedicated to practical insights on security automation, detection engineering, and the move toward AI-driven, autonomous SOCs. I cover the frameworks, playbooks, and tools that help security teams automate with purpose, whether you’re building workflows, scaling your detection program, or exploring how AI fits into your operations. If you’re focused on making your security program faster, smarter, and more effective, you’ll find value here.
© 2025 Filip Stojkovski.