<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Foresite Blog</title>
    <link>https://foresite.com/blog</link>
    <description>Stay ahead of the threat curve. Explore expert insights, threat intelligence, and Google Cloud cybersecurity trends from Foresite’s team of security practitioners.</description>
    <language>en</language>
    <pubDate>Fri, 24 Apr 2026 22:29:06 GMT</pubDate>
    <dc:date>2026-04-24T22:29:06Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>What the Google Cloud Next '26 Wiz and Google SecOps Announcement Changes</title>
      <link>https://foresite.com/blog/wiz-google-secops-next-26-announcement</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/wiz-google-secops-next-26-announcement" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/undefined-Apr-23-2026-06-40-41-0447-PM.png" alt="What the Google Cloud Next '26 Wiz and Google SecOps Announcement Actually Changes About How SOCs Will Be Built" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="line-height: 1.56;"&gt;&lt;span style="color: #353744;"&gt;Google Cloud Next '26 opened on April 22 with a Wiz and Google Security Operations announcement that most of the coverage is getting wrong. Not factually wrong — most of the trade press is accurate on what was announced. But the framing is small. The dominant story is "Google and Wiz shipped a better integration." The actual story is that the architectural center of gravity for a cloud-native SOC is moving, and this announcement is the first release where that movement becomes unmistakable.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/wiz-google-secops-next-26-announcement" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/undefined-Apr-23-2026-06-40-41-0447-PM.png" alt="What the Google Cloud Next '26 Wiz and Google SecOps Announcement Actually Changes About How SOCs Will Be Built" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="line-height: 1.56;"&gt;&lt;span style="color: #353744;"&gt;Google Cloud Next '26 opened on April 22 with a Wiz and Google Security Operations announcement that most of the coverage is getting wrong. Not factually wrong — most of the trade press is accurate on what was announced. But the framing is small. The dominant story is "Google and Wiz shipped a better integration." The actual story is that the architectural center of gravity for a cloud-native SOC is moving, and this announcement is the first release where that movement becomes unmistakable.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Fwiz-google-secops-next-26-announcement&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Google SecOps</category>
      <category>MXDR</category>
      <category>Google Cloud Next</category>
      <category>Agentic SOC</category>
      <category>Wiz</category>
      <pubDate>Fri, 24 Apr 2026 00:13:27 GMT</pubDate>
      <guid>https://foresite.com/blog/wiz-google-secops-next-26-announcement</guid>
      <dc:date>2026-04-24T00:13:27Z</dc:date>
      <dc:creator>David Grable</dc:creator>
    </item>
    <item>
      <title>Shadow Agent Risk: What's Running in Your Organization Right Now</title>
      <link>https://foresite.com/blog/ai-security-shadow-agent-risk</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/ai-security-shadow-agent-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite-filter-the-noise-gcn2026.webp" alt="AI Security and Shadow Agent Risk: What's Running in Your Organization Right Now" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2 style="line-height: 1.08;"&gt;&lt;span style="color: #353744;"&gt;What's Running in Your Organization Right Now&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="line-height: 1.56; font-weight: bold; color: #6b665f;"&gt;The biggest AI security threat to most organizations isn't an outside attacker. It's the AI tools your own employees are already using.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/ai-security-shadow-agent-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite-filter-the-noise-gcn2026.webp" alt="AI Security and Shadow Agent Risk: What's Running in Your Organization Right Now" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2 style="line-height: 1.08;"&gt;&lt;span style="color: #353744;"&gt;What's Running in Your Organization Right Now&lt;/span&gt;&lt;/h2&gt; 
&lt;p style="line-height: 1.56; font-weight: bold; color: #6b665f;"&gt;The biggest AI security threat to most organizations isn't an outside attacker. It's the AI tools your own employees are already using.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Fai-security-shadow-agent-risk&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Google SecOps</category>
      <category>AI Security</category>
      <category>Security Operations</category>
      <category>AI Governance</category>
      <category>Shadow Agents</category>
      <pubDate>Thu, 09 Apr 2026 19:47:23 GMT</pubDate>
      <guid>https://foresite.com/blog/ai-security-shadow-agent-risk</guid>
      <dc:date>2026-04-09T19:47:23Z</dc:date>
      <dc:creator>Brian Pepperdine</dc:creator>
    </item>
    <item>
      <title>The CISO's Guide to Google Cloud Next 2026</title>
      <link>https://foresite.com/blog/ciso-guide-google-cloud-next-2026</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/ciso-guide-google-cloud-next-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/ciso-guide-google-cloud-next-2026.webp" alt="The CISO's Guide to Google Cloud Next 2026 by Foresite Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;What to prioritize, what to expect, and what questions to ask before you leave Las Vegas.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/ciso-guide-google-cloud-next-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/ciso-guide-google-cloud-next-2026.webp" alt="The CISO's Guide to Google Cloud Next 2026 by Foresite Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;What to prioritize, what to expect, and what questions to ask before you leave Las Vegas.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Fciso-guide-google-cloud-next-2026&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Google SecOps</category>
      <category>Threat Intelligence</category>
      <category>AI Security</category>
      <category>Managed Security</category>
      <category>Security Operations</category>
      <category>Catalyst Platform</category>
      <category>Google Cloud Next</category>
      <category>Agentic SOC</category>
      <category>MCP</category>
      <category>Shadow Agents</category>
      <category>CISO</category>
      <pubDate>Tue, 07 Apr 2026 14:05:52 GMT</pubDate>
      <guid>https://foresite.com/blog/ciso-guide-google-cloud-next-2026</guid>
      <dc:date>2026-04-07T14:05:52Z</dc:date>
      <dc:creator>Foresite Cybersecurity</dc:creator>
    </item>
    <item>
      <title>Survive &amp; Thrive at Google Cloud Next 2026</title>
      <link>https://foresite.com/blog/survive-thrive-at-google-cloud-next-2026</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/survive-thrive-at-google-cloud-next-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_gcn26_field-guide.webp" alt="30+ insider tips on logistics, sessions, food, networking, and Vegas survival from the Foresite team. Everything the official guide won't tell you about Google Cloud Next 2026." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;span style="color: #3e18f4;"&gt;The Field Guide&lt;/span&gt;&lt;/h2&gt; 
&lt;div&gt; 
 &lt;span style="color: #6b665f; font-size: 12px;"&gt;INSIDER INTEL&amp;nbsp;· NOT GOOGLE MARKETING&lt;/span&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/survive-thrive-at-google-cloud-next-2026" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_gcn26_field-guide.webp" alt="30+ insider tips on logistics, sessions, food, networking, and Vegas survival from the Foresite team. Everything the official guide won't tell you about Google Cloud Next 2026." class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;span style="color: #3e18f4;"&gt;The Field Guide&lt;/span&gt;&lt;/h2&gt; 
&lt;div&gt; 
 &lt;span style="color: #6b665f; font-size: 12px;"&gt;INSIDER INTEL&amp;nbsp;· NOT GOOGLE MARKETING&lt;/span&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Fsurvive-thrive-at-google-cloud-next-2026&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Google SecOps</category>
      <category>Security Operations</category>
      <category>Google Cloud Next</category>
      <category>Field Guide</category>
      <category>Agentic SOC</category>
      <category>CISO</category>
      <category>Networking</category>
      <category>Conference Tips</category>
      <pubDate>Tue, 07 Apr 2026 14:00:02 GMT</pubDate>
      <guid>https://foresite.com/blog/survive-thrive-at-google-cloud-next-2026</guid>
      <dc:date>2026-04-07T14:00:02Z</dc:date>
      <dc:creator>Mitchell Prieve</dc:creator>
    </item>
    <item>
      <title>A Practitioner’s Analysis: What the M-Trends Hand-Off Finding Means for Your SOC</title>
      <link>https://foresite.com/blog/m-trends-2026-soc-handoff</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/m-trends-2026-soc-handoff" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_m-trends26.webp" alt="A Practitioner’s Analysis: What the M-Trends Hand-Off Finding Means for Your SOC by Foresite Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;span style="font-size: 18px;"&gt;M-Trends 2026 Analysis · SOC Strategy · Foresite&lt;/span&gt;&lt;/h2&gt; 
&lt;h3&gt;&lt;span style="color: #3195f7;"&gt;TL;DR&lt;/span&gt;&lt;/h3&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;M-Trends 2026 documents a sharp rise in attacker “hand-offs” — initial access brokers passing environment access to ransomware operators, sometimes in under 30 seconds. That finding doesn’t make human judgment obsolete. It makes the case for getting AI agents to do the investigative groundwork faster, so practitioners can make better decisions sooner. Speed without governance is just faster chaos. The right answer is both.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;The New Reality: From Initial Access to Ransomware Hand-Off in Seconds&lt;/h2&gt; 
&lt;p&gt;Every year the M-Trends report lands and security teams mine it for the headline dwell time number. This year that number rose to 14 days, up from 11 in 2024 — and the report is clear on why: long-term espionage operations and North Korean IT worker campaigns, which deliberately move slow and averaged a 122-day dwell time, pulled the global median up. For ransomware specifically, dwell time actually dropped to a median of nine days. The picture is more segmented than the headline suggests.&lt;/p&gt; 
&lt;p&gt;But the finding worth spending real time on is buried in the ransomware section, and it’s about speed of a different kind.&lt;/p&gt; 
&lt;p&gt;Mandiant documented a significant rise in attacker “hand-offs”: an initial access broker compromises an environment — often through opportunistic techniques like malicious advertisements or compromised websites — then passes that foothold to a second-stage ransomware operator. Prior compromise was the most frequently confirmed initial infection vector for ransomware-related incidents Mandiant investigated in 2025, up from 15% to 30% year-over-year. This pattern now accounts for nearly a third of ransomware cases they worked.&lt;/p&gt; 
&lt;p&gt;In a third, less well-defined model Mandiant describes — where the two groups operate as what the report characterizes as behavior consistent with a distribution cluster — the time between the initial access partner’s earliest activity and the secondary group’s earliest attributed activity is generally less than 30 seconds. Across the broader “division of labor” model, Mandiant observed a median of 22 seconds for that handover. To be precise about what those numbers mean: they measure the point at which the secondary group gains access, not necessarily when they begin hands-on-keyboard activity. But the direction of travel is clear.&lt;/p&gt; 
&lt;div style="text-align: center; line-height: 1.15;"&gt; 
 &lt;br&gt; 
 &lt;span style="font-size: 14px; color: #6b665f;"&gt;The M-Trends 2026 report documents the time between key phases in the attacker hand-off model, with the secondary group gaining access in some cases in under 30 seconds.&lt;/span&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;The report’s own framing of this is worth quoting directly: “alerts traditionally considered ‘lower priority’ can very quickly become significant compromises.” That is not a theoretical risk. It is a documented pattern that more than doubled as an infection vector within Mandiant’s ransomware investigations in a single year.&lt;/p&gt; 
&lt;p&gt;Mandiant also notes a defender advantage embedded in this model: initial access partners with known relationships to specific ransomware operators can be tracked. When a FAKEUPDATES alert fires, for instance, defenders who understand UNC1543’s relationship with UNC2165 can treat that alert with elevated criticality and hunt for follow-on activity immediately. Intelligence about the hand-off pattern is itself a detection asset — if your operation is set up to use it.&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2&gt;The Wrong Conclusion: “Our Analysts Need to Be Faster”&lt;/h2&gt; 
&lt;p&gt;The instinctive response to faster attacker timelines is to demand faster human response: tighter SLAs, more headcount, quicker triage. That instinct is understandable. It’s also aimed at the wrong bottleneck.&lt;/p&gt; 
&lt;p&gt;The bottleneck isn’t analyst intent. It’s the volume and velocity of work that reaches them before they can exercise any judgment. Google’s own agentic SecOps research puts the false positive rate at 83% — the vast majority of what analysts process never becomes a real incident. &lt;em&gt;(Source: &lt;a href="https://services.google.com/fh/files/misc/future-secops-powered-ai-agents-infographic.pdf"&gt;Google Future of SecOps Infographic&lt;/a&gt;.)&lt;/em&gt; Compressing the SLA on that process doesn’t fix it. It just means analysts are moving faster through work that shouldn’t be reaching them at all.&lt;/p&gt; 
&lt;p&gt;You cannot compress human decision-making to 22 seconds. You can only decide what work reaches a human inside that window — and how prepared they are when it does.&lt;/p&gt; 
&lt;p&gt;The human cost of that design is real. 71% of SOC staff rate their workplace pain at 6–9 out of 10. Half of all CISOs are projected to change roles due to stress. The industry is short 4.8 million people globally. &lt;em&gt;(Sources: &lt;a href="https://www.globenewswire.com/news-release/2022/10/11/2531943/0/en/Devo-s-Annual-SOC-Performance-Report-Reveals-71-of-Security-Professionals-are-Likely-to-Quit-Due-to-a-Combination-of-Challenges-in-the-SOC.html"&gt;SANS/Devo SOC Survey&lt;/a&gt;; &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2025-02-05-gartner-hr-survey-reveals-more-than-half-of-csuite-leaders-are-likely-to-leave-over-the-next-2-years"&gt;Gartner&lt;/a&gt;; &lt;a href="https://www.isc2.org/Insights/2024/10/Cybersecurity-Workforce-INSIGHTS-October-2024"&gt;ISC2&lt;/a&gt;.)&lt;/em&gt; Those figures don’t come from M-Trends, but they describe the environment inside which M-Trends’ findings land. Asking more of analysts inside a model that already burns them out is not a strategy. It’s acceleration toward a cliff.&lt;/p&gt; 
&lt;p&gt;The UNC1543 and UNC2165 case study in the report is useful here. In that specific incident, the hand-off to UNC2165 took approximately 70 minutes, with another ~45 minutes before their earliest interactive activity. That is a window a well-run SOC can work with. The sub-30-second figure applies to a tighter, distribution-cluster model — not every hand-off. The point is not that humans are always too late. It’s that the investigation workload arriving at human desks needs to be triaged and enriched before it gets there, so the analyst is making a decision, not starting from scratch.&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2&gt;The Right Conclusion: Agents Do the&lt;br&gt;Groundwork. Practitioners Make the Call.&lt;/h2&gt; 
&lt;p&gt;The Practitioner-Governed Agentic SOC is not a model that removes humans from security operations. It’s a model that removes humans from the work that doesn’t require them, so they’re fully present for the work that does. That distinction matters, because most of what’s sold as “agentic security” today either hands the AI too much authority or hands the customer too much responsibility for governing it.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Autonomous triage at machine speed.&lt;/strong&gt; An AI agent — running on a platform like Google Cloud, where Gemini-powered agents operate across the full telemetry stack — handles initial investigation before a human analyst is paged. It correlates signals, enriches identity context, maps indicators, and presents a fully assembled case. The analyst doesn’t start an investigation. They review one. That shift — from doing to deciding — is where the time compression happens.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Practitioner governance at every decision point.&lt;/strong&gt;strong&amp;gt; This is the part most agentic pitches omit. Google’s SAIF framework is explicit: autonomous agents require human controllers. The question is who provides that control and who is accountable for the outcome. In the practitioner-governed model, a named practitioner reviews every autonomous investigation and authorizes high-impact actions before they execute. Containment, isolation, escalation — all staged for human approval. The agent compresses the time to decision. The practitioner owns the decision.&lt;/p&gt; 
&lt;p&gt;This is one way to operationalize what Mandiant is recommending: reduce behavioral variety, enrich alerts with contextual data, and give analysts the space to investigate low-impact events rapidly before they become high-impact ones. An agent that enriches and contextualizes before the analyst sees the alert is doing exactly that work. The practitioner layer ensures the output is verified, explainable, and defensible to regulators, insurers, and the board.&lt;/p&gt; 
&lt;p&gt;The black box problem that defines many MSSP relationships — where AI actions happen inside a proprietary platform with no audit trail — doesn’t exist when a named practitioner authorizes every significant action inside your own environment. That’s not just a better security model. It’s a better governance model.&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2&gt;Is Your Security Partner Built for This?&lt;/h2&gt; 
&lt;p&gt;M-Trends 2026 documents a threat landscape that has become measurably more segmented, more automated, and faster in its most dangerous phases. Internal detection rates actually improved in 2025 — 52% of organizations detected malicious activity internally, up from 43% — which shows that better human-led operations are possible and are happening. The report is not a case against human judgment. It’s a case for putting human judgment where it belongs: at the decision point, not the bottom of an alert queue.&lt;/p&gt; 
&lt;p&gt;The practical question for any security leader reading M-Trends is whether their current operation — or their current partner’s operation — is structured to act on that. Can your team treat a FAKEUPDATES detection with elevated criticality in under a minute because they have the threat intelligence context loaded and the investigation pre-built? Or does that alert sit in a queue until a human manually opens it and starts from scratch?&lt;/p&gt; 
&lt;p&gt;As a leading &lt;a href="https://foresite.com/google"&gt;Google Cloud partner&lt;/a&gt; specializing in this practitioner-governed model, we help organizations move beyond the limitations of traditional security operations. The mission is to deliver resilience and trusted outcomes — not just a queue of alerts.&lt;/p&gt; 
&lt;p style="line-height: 1.15; text-align: center;"&gt;&lt;br&gt;&lt;span style="font-size: 14px; color: #6b665f;"&gt;The Resilience Maturity Matrix from M-Trends 2026 maps security posture across two axes: Minimal Viable Security (prevention friction) and Recovery Path Reliability. Active Resilience — the target state — combines hardened identity with a recovery environment severed from the attack surface.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h3&gt;See the model in action&lt;/h3&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2; border-width: 0px; border-style: none;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 20%; padding: 8px;"&gt;&lt;/td&gt; 
    &lt;td style="width: 80%; padding: 8px;"&gt; &lt;p&gt;If the M-Trends hand-off data has you questioning whether your current operation is structured to respond at this speed, the right next step is a direct conversation. We offer a 15-minute whiteboard session with one of our practitioners — mapping your current detection model against this threat profile and identifying where the gaps are. No slides, no pitch. An operational conversation.&lt;/p&gt; &lt;p&gt;&lt;a href="https://foresite.com/contact-us"&gt;Schedule a Practitioner Session →&lt;/a&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;div&gt;
  &amp;nbsp; 
 &lt;h4&gt;Read the source&lt;/h4&gt; 
&lt;/div&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2; border-width: 0px; border-style: none;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 20%; padding: 8px;"&gt;&lt;/td&gt; 
    &lt;td style="width: 80%; padding: 8px;"&gt; &lt;p&gt;The M-Trends 2026 report was published this month. The hand-off analysis, the ransomware infection vector data, and Mandiant’s “Active Resilience” framework — their term for severing the recovery path from the attack surface, hardening identity controls, and treating ransomware as a resilience problem rather than purely a detection one — are worth reading directly, not through a vendor summary. Download the full report.&lt;/p&gt; &lt;p&gt;&lt;a href="https://cloud.google.com/security/resources/m-trends?utm_source=Foresite&amp;amp;utm_medium=partner-blog&amp;amp;utm_campaign=FY26-Q1-GLOBAL-STO89-website-of-dgcsm-MTlaunch-170085&amp;amp;utm_content=partnerPOV"&gt;Download the M-Trends 2026 Report →&lt;/a&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/m-trends-2026-soc-handoff" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_m-trends26.webp" alt="A Practitioner’s Analysis: What the M-Trends Hand-Off Finding Means for Your SOC by Foresite Cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;&lt;span style="font-size: 18px;"&gt;M-Trends 2026 Analysis · SOC Strategy · Foresite&lt;/span&gt;&lt;/h2&gt; 
&lt;h3&gt;&lt;span style="color: #3195f7;"&gt;TL;DR&lt;/span&gt;&lt;/h3&gt; 
&lt;blockquote&gt; 
 &lt;p&gt;M-Trends 2026 documents a sharp rise in attacker “hand-offs” — initial access brokers passing environment access to ransomware operators, sometimes in under 30 seconds. That finding doesn’t make human judgment obsolete. It makes the case for getting AI agents to do the investigative groundwork faster, so practitioners can make better decisions sooner. Speed without governance is just faster chaos. The right answer is both.&lt;/p&gt; 
&lt;/blockquote&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h2&gt;The New Reality: From Initial Access to Ransomware Hand-Off in Seconds&lt;/h2&gt; 
&lt;p&gt;Every year the M-Trends report lands and security teams mine it for the headline dwell time number. This year that number rose to 14 days, up from 11 in 2024 — and the report is clear on why: long-term espionage operations and North Korean IT worker campaigns, which deliberately move slow and averaged a 122-day dwell time, pulled the global median up. For ransomware specifically, dwell time actually dropped to a median of nine days. The picture is more segmented than the headline suggests.&lt;/p&gt; 
&lt;p&gt;But the finding worth spending real time on is buried in the ransomware section, and it’s about speed of a different kind.&lt;/p&gt; 
&lt;p&gt;Mandiant documented a significant rise in attacker “hand-offs”: an initial access broker compromises an environment — often through opportunistic techniques like malicious advertisements or compromised websites — then passes that foothold to a second-stage ransomware operator. Prior compromise was the most frequently confirmed initial infection vector for ransomware-related incidents Mandiant investigated in 2025, up from 15% to 30% year-over-year. This pattern now accounts for nearly a third of ransomware cases they worked.&lt;/p&gt; 
&lt;p&gt;In a third, less well-defined model Mandiant describes — where the two groups operate as what the report characterizes as behavior consistent with a distribution cluster — the time between the initial access partner’s earliest activity and the secondary group’s earliest attributed activity is generally less than 30 seconds. Across the broader “division of labor” model, Mandiant observed a median of 22 seconds for that handover. To be precise about what those numbers mean: they measure the point at which the secondary group gains access, not necessarily when they begin hands-on-keyboard activity. But the direction of travel is clear.&lt;/p&gt; 
&lt;div style="text-align: center; line-height: 1.15;"&gt; 
 &lt;br&gt; 
 &lt;span style="font-size: 14px; color: #6b665f;"&gt;The M-Trends 2026 report documents the time between key phases in the attacker hand-off model, with the secondary group gaining access in some cases in under 30 seconds.&lt;/span&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;br&gt;The report’s own framing of this is worth quoting directly: “alerts traditionally considered ‘lower priority’ can very quickly become significant compromises.” That is not a theoretical risk. It is a documented pattern that more than doubled as an infection vector within Mandiant’s ransomware investigations in a single year.&lt;/p&gt; 
&lt;p&gt;Mandiant also notes a defender advantage embedded in this model: initial access partners with known relationships to specific ransomware operators can be tracked. When a FAKEUPDATES alert fires, for instance, defenders who understand UNC1543’s relationship with UNC2165 can treat that alert with elevated criticality and hunt for follow-on activity immediately. Intelligence about the hand-off pattern is itself a detection asset — if your operation is set up to use it.&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2&gt;The Wrong Conclusion: “Our Analysts Need to Be Faster”&lt;/h2&gt; 
&lt;p&gt;The instinctive response to faster attacker timelines is to demand faster human response: tighter SLAs, more headcount, quicker triage. That instinct is understandable. It’s also aimed at the wrong bottleneck.&lt;/p&gt; 
&lt;p&gt;The bottleneck isn’t analyst intent. It’s the volume and velocity of work that reaches them before they can exercise any judgment. Google’s own agentic SecOps research puts the false positive rate at 83% — the vast majority of what analysts process never becomes a real incident. &lt;em&gt;(Source: &lt;a href="https://services.google.com/fh/files/misc/future-secops-powered-ai-agents-infographic.pdf"&gt;Google Future of SecOps Infographic&lt;/a&gt;.)&lt;/em&gt; Compressing the SLA on that process doesn’t fix it. It just means analysts are moving faster through work that shouldn’t be reaching them at all.&lt;/p&gt; 
&lt;p&gt;You cannot compress human decision-making to 22 seconds. You can only decide what work reaches a human inside that window — and how prepared they are when it does.&lt;/p&gt; 
&lt;p&gt;The human cost of that design is real. 71% of SOC staff rate their workplace pain at 6–9 out of 10. Half of all CISOs are projected to change roles due to stress. The industry is short 4.8 million people globally. &lt;em&gt;(Sources: &lt;a href="https://www.globenewswire.com/news-release/2022/10/11/2531943/0/en/Devo-s-Annual-SOC-Performance-Report-Reveals-71-of-Security-Professionals-are-Likely-to-Quit-Due-to-a-Combination-of-Challenges-in-the-SOC.html"&gt;SANS/Devo SOC Survey&lt;/a&gt;; &lt;a href="https://www.gartner.com/en/newsroom/press-releases/2025-02-05-gartner-hr-survey-reveals-more-than-half-of-csuite-leaders-are-likely-to-leave-over-the-next-2-years"&gt;Gartner&lt;/a&gt;; &lt;a href="https://www.isc2.org/Insights/2024/10/Cybersecurity-Workforce-INSIGHTS-October-2024"&gt;ISC2&lt;/a&gt;.)&lt;/em&gt; Those figures don’t come from M-Trends, but they describe the environment inside which M-Trends’ findings land. Asking more of analysts inside a model that already burns them out is not a strategy. It’s acceleration toward a cliff.&lt;/p&gt; 
&lt;p&gt;The UNC1543 and UNC2165 case study in the report is useful here. In that specific incident, the hand-off to UNC2165 took approximately 70 minutes, with another ~45 minutes before their earliest interactive activity. That is a window a well-run SOC can work with. The sub-30-second figure applies to a tighter, distribution-cluster model — not every hand-off. The point is not that humans are always too late. It’s that the investigation workload arriving at human desks needs to be triaged and enriched before it gets there, so the analyst is making a decision, not starting from scratch.&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2&gt;The Right Conclusion: Agents Do the&lt;br&gt;Groundwork. Practitioners Make the Call.&lt;/h2&gt; 
&lt;p&gt;The Practitioner-Governed Agentic SOC is not a model that removes humans from security operations. It’s a model that removes humans from the work that doesn’t require them, so they’re fully present for the work that does. That distinction matters, because most of what’s sold as “agentic security” today either hands the AI too much authority or hands the customer too much responsibility for governing it.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Autonomous triage at machine speed.&lt;/strong&gt; An AI agent — running on a platform like Google Cloud, where Gemini-powered agents operate across the full telemetry stack — handles initial investigation before a human analyst is paged. It correlates signals, enriches identity context, maps indicators, and presents a fully assembled case. The analyst doesn’t start an investigation. They review one. That shift — from doing to deciding — is where the time compression happens.&lt;/p&gt; 
&lt;p&gt;&lt;strong&gt;Practitioner governance at every decision point.&lt;/strong&gt;strong&amp;gt; This is the part most agentic pitches omit. Google’s SAIF framework is explicit: autonomous agents require human controllers. The question is who provides that control and who is accountable for the outcome. In the practitioner-governed model, a named practitioner reviews every autonomous investigation and authorizes high-impact actions before they execute. Containment, isolation, escalation — all staged for human approval. The agent compresses the time to decision. The practitioner owns the decision.&lt;/p&gt; 
&lt;p&gt;This is one way to operationalize what Mandiant is recommending: reduce behavioral variety, enrich alerts with contextual data, and give analysts the space to investigate low-impact events rapidly before they become high-impact ones. An agent that enriches and contextualizes before the analyst sees the alert is doing exactly that work. The practitioner layer ensures the output is verified, explainable, and defensible to regulators, insurers, and the board.&lt;/p&gt; 
&lt;p&gt;The black box problem that defines many MSSP relationships — where AI actions happen inside a proprietary platform with no audit trail — doesn’t exist when a named practitioner authorizes every significant action inside your own environment. That’s not just a better security model. It’s a better governance model.&lt;br&gt;&lt;br&gt;&lt;/p&gt; 
&lt;h2&gt;Is Your Security Partner Built for This?&lt;/h2&gt; 
&lt;p&gt;M-Trends 2026 documents a threat landscape that has become measurably more segmented, more automated, and faster in its most dangerous phases. Internal detection rates actually improved in 2025 — 52% of organizations detected malicious activity internally, up from 43% — which shows that better human-led operations are possible and are happening. The report is not a case against human judgment. It’s a case for putting human judgment where it belongs: at the decision point, not the bottom of an alert queue.&lt;/p&gt; 
&lt;p&gt;The practical question for any security leader reading M-Trends is whether their current operation — or their current partner’s operation — is structured to act on that. Can your team treat a FAKEUPDATES detection with elevated criticality in under a minute because they have the threat intelligence context loaded and the investigation pre-built? Or does that alert sit in a queue until a human manually opens it and starts from scratch?&lt;/p&gt; 
&lt;p&gt;As a leading &lt;a href="https://foresite.com/google"&gt;Google Cloud partner&lt;/a&gt; specializing in this practitioner-governed model, we help organizations move beyond the limitations of traditional security operations. The mission is to deliver resilience and trusted outcomes — not just a queue of alerts.&lt;/p&gt; 
&lt;p style="line-height: 1.15; text-align: center;"&gt;&lt;br&gt;&lt;span style="font-size: 14px; color: #6b665f;"&gt;The Resilience Maturity Matrix from M-Trends 2026 maps security posture across two axes: Minimal Viable Security (prevention friction) and Recovery Path Reliability. Active Resilience — the target state — combines hardened identity with a recovery environment severed from the attack surface.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt; 
&lt;h3&gt;See the model in action&lt;/h3&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2; border-width: 0px; border-style: none;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 20%; padding: 8px;"&gt;&lt;/td&gt; 
    &lt;td style="width: 80%; padding: 8px;"&gt; &lt;p&gt;If the M-Trends hand-off data has you questioning whether your current operation is structured to respond at this speed, the right next step is a direct conversation. We offer a 15-minute whiteboard session with one of our practitioners — mapping your current detection model against this threat profile and identifying where the gaps are. No slides, no pitch. An operational conversation.&lt;/p&gt; &lt;p&gt;&lt;a href="https://foresite.com/contact-us"&gt;Schedule a Practitioner Session →&lt;/a&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;div&gt;
  &amp;nbsp; 
 &lt;h4&gt;Read the source&lt;/h4&gt; 
&lt;/div&gt; 
&lt;div style="overflow-x: auto; max-width: 100%; width: 100%; margin-left: auto; margin-right: auto;"&gt; 
 &lt;table style="width: 100%; border-collapse: collapse; table-layout: fixed; border: 1px solid #99acc2; border-width: 0px; border-style: none;"&gt; 
  &lt;tbody&gt; 
   &lt;tr&gt; 
    &lt;td style="width: 20%; padding: 8px;"&gt;&lt;/td&gt; 
    &lt;td style="width: 80%; padding: 8px;"&gt; &lt;p&gt;The M-Trends 2026 report was published this month. The hand-off analysis, the ransomware infection vector data, and Mandiant’s “Active Resilience” framework — their term for severing the recovery path from the attack surface, hardening identity controls, and treating ransomware as a resilience problem rather than purely a detection one — are worth reading directly, not through a vendor summary. Download the full report.&lt;/p&gt; &lt;p&gt;&lt;a href="https://cloud.google.com/security/resources/m-trends?utm_source=Foresite&amp;amp;utm_medium=partner-blog&amp;amp;utm_campaign=FY26-Q1-GLOBAL-STO89-website-of-dgcsm-MTlaunch-170085&amp;amp;utm_content=partnerPOV"&gt;Download the M-Trends 2026 Report →&lt;/a&gt;&lt;/p&gt; &lt;/td&gt; 
   &lt;/tr&gt; 
  &lt;/tbody&gt; 
 &lt;/table&gt; 
&lt;/div&gt; 
&lt;p&gt;&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Fm-trends-2026-soc-handoff&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Google SecOps</category>
      <category>Google Cloud Security</category>
      <category>M-Trends 2026</category>
      <category>Agentic SOC</category>
      <category>MSSP effectiveness</category>
      <category>SOC Strategy</category>
      <category>Attack Lifecycle</category>
      <pubDate>Thu, 26 Mar 2026 22:50:37 GMT</pubDate>
      <guid>https://foresite.com/blog/m-trends-2026-soc-handoff</guid>
      <dc:date>2026-03-26T22:50:37Z</dc:date>
      <dc:creator>Jeremy Hehl</dc:creator>
    </item>
    <item>
      <title>Lessons for SOC Leaders from the Log4j 2021 Crisis</title>
      <link>https://foresite.com/blog/log4j-2021-lessons-for-soc-leadership</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/log4j-2021-lessons-for-soc-leadership" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_log4j-2021-lessons-for-soc-leadership_share.webp" alt="The Echoes of Past Incidents (Log4j 2021): The Invisible Enemy Inside the Gates - by Alec Fenton, Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The echoes of past incidents (Log4j 2021): The invisible enemy inside the gates&lt;/h2&gt; 
&lt;p&gt;Welcome back to our series, &lt;a href="https://foresite.com/blog/tag/echoes-of-past-incidents"&gt;The Echoes of Past Incidents&lt;/a&gt;, where we examine the scars of cybersecurity history to better protect our future. As leaders in &lt;a href="https://foresite.com/solutions/security-operations"&gt;Security Operations&lt;/a&gt; at Foresite, we study these events not to critique the victims, but to understand the evolving tactics of our adversaries and the gaps they exploit.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/log4j-2021-lessons-for-soc-leadership" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_log4j-2021-lessons-for-soc-leadership_share.webp" alt="The Echoes of Past Incidents (Log4j 2021): The Invisible Enemy Inside the Gates - by Alec Fenton, Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The echoes of past incidents (Log4j 2021): The invisible enemy inside the gates&lt;/h2&gt; 
&lt;p&gt;Welcome back to our series, &lt;a href="https://foresite.com/blog/tag/echoes-of-past-incidents"&gt;The Echoes of Past Incidents&lt;/a&gt;, where we examine the scars of cybersecurity history to better protect our future. As leaders in &lt;a href="https://foresite.com/solutions/security-operations"&gt;Security Operations&lt;/a&gt; at Foresite, we study these events not to critique the victims, but to understand the evolving tactics of our adversaries and the gaps they exploit.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Flog4j-2021-lessons-for-soc-leadership&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Threat Detection</category>
      <category>Echoes of Past Incidents</category>
      <category>Log4j vulnerability</category>
      <category>JNDI attack</category>
      <category>Log4Shell 2021</category>
      <category>zero-day exploitation</category>
      <pubDate>Wed, 21 Jan 2026 12:04:31 GMT</pubDate>
      <guid>https://foresite.com/blog/log4j-2021-lessons-for-soc-leadership</guid>
      <dc:date>2026-01-21T12:04:31Z</dc:date>
      <dc:creator>Alec Fenton</dc:creator>
    </item>
    <item>
      <title>Advanced Tips for Google SecOps SOAR Automation</title>
      <link>https://foresite.com/blog/google-secops-soar-advanced-tips</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/google-secops-soar-advanced-tips" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_google-secops-soar-advanced-tips.webp" alt="Mastering the Craft: Advanced Tips an Tricks for Google SecOps SOAR, by Scott Anderson of Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;div&gt; 
    &lt;div&gt; 
     &lt;div&gt;
       &amp;nbsp; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/google-secops-soar-advanced-tips" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_google-secops-soar-advanced-tips.webp" alt="Mastering the Craft: Advanced Tips an Tricks for Google SecOps SOAR, by Scott Anderson of Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;div&gt; 
    &lt;div&gt; 
     &lt;div&gt;
       &amp;nbsp; 
     &lt;/div&gt; 
    &lt;/div&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Fgoogle-secops-soar-advanced-tips&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Google SecOps</category>
      <category>Security Operations</category>
      <category>SOAR</category>
      <category>Practitioner Perspective</category>
      <category>Threat Response</category>
      <category>SOAR Automation</category>
      <category>Playbook Engineering</category>
      <category>SOC Modernization</category>
      <pubDate>Wed, 07 Jan 2026 12:52:01 GMT</pubDate>
      <guid>https://foresite.com/blog/google-secops-soar-advanced-tips</guid>
      <dc:date>2026-01-07T12:52:01Z</dc:date>
      <dc:creator>Scott Anderson</dc:creator>
    </item>
    <item>
      <title>Lessons for SOC Leaders from the JLR 2023 Cyber Attack</title>
      <link>https://foresite.com/blog/jlr-2023-lessons-for-soc-leadership</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/jlr-2023-lessons-for-soc-leadership" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_jlr-2023_lessons-for-protecting-factory-floor.webp" alt="The Echoes of Past Incidents (JLR 2023): A Practical Lesson in Protecting the Factory Floor - by Alec Fenton, Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The echoes of past incidents (JLR 2023): A practical lesson in protecting the factory floor&lt;/h2&gt; 
&lt;p&gt;Welcome back to the latest entry in our series, &lt;a href="https://foresite.com/blog/tag/echoes-of-past-incidents"&gt;The Echoes of Past Incidents&lt;/a&gt;. It’s a foundational truth in cybersecurity: we study past incidents so our clients don’t have to repeat them. As leaders in &lt;a href="https://foresite.com/solutions/security-operations"&gt;Security Operations&lt;/a&gt; at Foresite, we constantly examine these pivotal moments to extract the core wisdom needed to protect modern businesses today.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/jlr-2023-lessons-for-soc-leadership" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_jlr-2023_lessons-for-protecting-factory-floor.webp" alt="The Echoes of Past Incidents (JLR 2023): A Practical Lesson in Protecting the Factory Floor - by Alec Fenton, Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The echoes of past incidents (JLR 2023): A practical lesson in protecting the factory floor&lt;/h2&gt; 
&lt;p&gt;Welcome back to the latest entry in our series, &lt;a href="https://foresite.com/blog/tag/echoes-of-past-incidents"&gt;The Echoes of Past Incidents&lt;/a&gt;. It’s a foundational truth in cybersecurity: we study past incidents so our clients don’t have to repeat them. As leaders in &lt;a href="https://foresite.com/solutions/security-operations"&gt;Security Operations&lt;/a&gt; at Foresite, we constantly examine these pivotal moments to extract the core wisdom needed to protect modern businesses today.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Fjlr-2023-lessons-for-soc-leadership&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>IT/OT Convergence</category>
      <category>Manufacturing Cybersecurity</category>
      <category>Supply Chain Risk Management</category>
      <category>Network Segmentation</category>
      <category>Operational Technology (OT) Security</category>
      <category>Echoes of Past Incidents</category>
      <pubDate>Wed, 31 Dec 2025 16:50:09 GMT</pubDate>
      <guid>https://foresite.com/blog/jlr-2023-lessons-for-soc-leadership</guid>
      <dc:date>2025-12-31T16:50:09Z</dc:date>
      <dc:creator>Alec Fenton</dc:creator>
    </item>
    <item>
      <title>Lessons for SOC Leaders from the 2017 Equifax Breach</title>
      <link>https://foresite.com/blog/equifax-2017-lessons-for-soc-leadership</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/equifax-2017-lessons-for-soc-leadership" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_equifax-2017-lessons-for-soc-leadership.webp" alt="The Echoes of Past Incidents (Equifax 2017): A Fundamental Reminder for SOC Leadership - by Alec Fenton, Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The echoes of past incidents (Equifax 2017): A fundamental reminder for SOC leadership&lt;/h2&gt; 
&lt;p&gt;It's a foundational truth in cybersecurity: we study past mistakes so our clients don't have to repeat them. As leaders in Security Operations at Foresite, we frequently examine these pivotal moments to extract the core wisdom needed to protect modern businesses today.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/equifax-2017-lessons-for-soc-leadership" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/website/blog-new-25/foresite_equifax-2017-lessons-for-soc-leadership.webp" alt="The Echoes of Past Incidents (Equifax 2017): A Fundamental Reminder for SOC Leadership - by Alec Fenton, Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;The echoes of past incidents (Equifax 2017): A fundamental reminder for SOC leadership&lt;/h2&gt; 
&lt;p&gt;It's a foundational truth in cybersecurity: we study past mistakes so our clients don't have to repeat them. As leaders in Security Operations at Foresite, we frequently examine these pivotal moments to extract the core wisdom needed to protect modern businesses today.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Fequifax-2017-lessons-for-soc-leadership&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Security Operations</category>
      <category>Equifax Breach</category>
      <category>Cybersecurity Fundamentals</category>
      <category>Detection &amp; Response</category>
      <category>Patch Management</category>
      <category>Echoes of Past Incidents</category>
      <pubDate>Thu, 18 Dec 2025 15:29:16 GMT</pubDate>
      <guid>https://foresite.com/blog/equifax-2017-lessons-for-soc-leadership</guid>
      <dc:date>2025-12-18T15:29:16Z</dc:date>
      <dc:creator>Alec Fenton</dc:creator>
    </item>
    <item>
      <title>Fence Holes and Cybersecurity | Tanium Deep Dive</title>
      <link>https://foresite.com/blog/fence-holes-and-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/fence-holes-and-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/Imported_Blog_Media/amish-buggy-fence.jpg" alt="Fence holes an Cybsecurity by Thomas Mark, Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Not long ago I moved to a rural area with a decent-sized Amish population. I don’t grow crops outside of the family garden, manufacture products aside from hobbies, or have herd animals (although does having too many dogs count? Asking for a friend). Since people know I work from home, the question invariably arises: “So, what do you do?”&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://foresite.com/blog/fence-holes-and-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://foresite.com/hubfs/Imported_Blog_Media/amish-buggy-fence.jpg" alt="Fence holes an Cybsecurity by Thomas Mark, Foresite" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Not long ago I moved to a rural area with a decent-sized Amish population. I don’t grow crops outside of the family garden, manufacture products aside from hobbies, or have herd animals (although does having too many dogs count? Asking for a friend). Since people know I work from home, the question invariably arises: “So, what do you do?”&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=44780962&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fforesite.com%2Fblog%2Ffence-holes-and-cybersecurity&amp;amp;bu=https%253A%252F%252Fforesite.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Endpoint Security</category>
      <category>Security Operations</category>
      <category>Tanium</category>
      <category>Tanium Deep Dive</category>
      <category>Practitioner Insights</category>
      <category>Cybersecurity Hygiene</category>
      <pubDate>Tue, 16 Dec 2025 21:30:26 GMT</pubDate>
      <guid>https://foresite.com/blog/fence-holes-and-cybersecurity</guid>
      <dc:date>2025-12-16T21:30:26Z</dc:date>
      <dc:creator>Thomas Mark</dc:creator>
    </item>
  </channel>
</rss>
