Software Analyst Cyber Research’s cover photo
Software Analyst Cyber Research

Software Analyst Cyber Research

Technology, Information and Media

Toronto, Ontario 6,189 followers

Empowering cybersecurity leaders with actionable insights and in-depth industry analysis of the cybersecurity industry

About us

Software Analyst Cybersecurity Research delivers in-depth analysis of the ever-evolving cybersecurity industry. Our mission is to empower security leaders, operators, investors, and cybersecurity professionals with the knowledge they need to navigate this complex field.

Website
https://softwareanalyst.substack.com/
Industry
Technology, Information and Media
Company size
2-10 employees
Headquarters
Toronto, Ontario
Type
Public Company
Founded
2020
Specialties
Finance, Equity Research, stocks, Investing, Technology, and Cybersecurity

Locations

  • Primary

    135 EAST LIBERTY ST TORONTO ON

    Toronto, Ontario M6K 0G7, CA

    Get directions

Employees at Software Analyst Cyber Research

Updates

  • SIEM is being rewritten, not retired Security leaders are no longer asking whether to move past legacy SIEMs. The real decision is which modern approach fits the next decade. Vendors are breaking from legacy architectures and pricing while addressing cost, complexity, and visibility. Anomali takes a threat intelligence first approach, enriching data with actor and campaign context through its Open Data Lake. It's decoupled storage and compute architecture avoids ingestion based pricing, while Anomali AI enables natural language queries and fast investigations. Exabeam builds on its UEBA foundation, linking behavior analytics and risk scoring into contextual timelines. Following its merger with LogRhythm, it now offers cloud, on prem, and hybrid options. The Exabeam Nova agents introduce autonomous operations and AI driven detection. Microsoft Security Sentinel is a fully cloud native SIEM integrated deeply across Azure, Defender, and Microsoft 365. It provides strong automation through Logic Apps and a vast KQL driven content ecosystem. Palo Alto Networks Cortex XSIAM unifies SIEM, XDR, SOAR, and exposure management into one platform. It correlates telemetry across data types, applies explainable AI to detection, and organizes investigations into case based workflows for efficiency and automation. Panther adopts a security data lake model with pricing tied to data sources rather than volume. It brings software engineering principles to detection through Python based “detection as code,” supported by AI driven rule generation and flexible AWS or SaaS deployment. SentinelOne’s AI SIEM keeps data “always hot” for instant search and real time detection. It's Purple AI assistant converts natural language into investigations and automates triage, while a usage based model ties costs to average daily ingest rather than peak volume. Vega offers a federated detection layer that queries data in place across SIEMs and data lakes, removing the need for centralized log aggregation. It charges only for data indexed outside existing systems, reducing duplication and overall costs. SIEM is not ending. It is reinventing. Read the full report using the link in the comments. #SIEM #SecurityOperations #ThreatDetection #XDR #SOAR #SecurityDataLake #CloudSecurity

    • No alternative text description for this image
  • Join us at the Cyber Leadership Forum in California We’re bringing together industry leaders to explore, The Next Wave in AI & Identity. Our session will feature Francis Odum, Founder of Software Analyst Cyber Research, and Danny Hatfield, Managing Director at Stifel Bank. We’ll unpack: ▪️ The evolving landscape of identity, agentic security, and AI driven defense ▪️ Emerging risks and opportunities identified by top CISOs, IT leaders, and innovators ▪️ How forward thinking executives are redefining trust and digital identity in an AI powered era Register here: https://lnkd.in/gGJU5wrJ #Cyber #Security #AI #Identity #Digital #California

    • No alternative text description for this image
  • Every organization scans. But not every organization knows what to fix first. In the 2000s, vulnerability management meant scanning, counting, and patching. CVSS scores and the number of resolved CVEs were the standard measure of security progress. That world no longer exists. In 2025, nearly every organization scans continuously. The challenge isn’t detection, it’s prioritization. Security teams must now determine what truly matters, understand the business impact of not fixing it, and demonstrate measurable risk reduction to the board. This shift has been driven by a changing landscape, faster attacker breakout times, the use of AI to scale exploits, broader attack surfaces, and growing executive accountability. These pressures have transformed vulnerability management into something larger, exposure management. The market has responded through convergence. Capabilities once scattered across VM, RBVM, ASM, CAASM, ASPM, and BAS are now merging under the CTEM (Continuous Threat Exposure Management) umbrella. Modern platforms no longer rely on static configuration reads or isolated feeds. They simulate network reachability, factor in exploit intelligence, and ingest unstructured data to evaluate real exploitability. Exposure management is also becoming measurable. Success is now defined by risk reduction, exploitability validation, and exposure trends, not by the number of vulnerabilities fixed. Read the full report with Zafran Security, XM Cyber, Cogent Security, Tonic Security, Nagomi Security, Axonius, Seemplicity, Astelia, and Orca Security, using the link in the comments. #Cybersecurity #ExposureManagement #CTEM #RiskManagement #VulnerabilityManagement #CyberRisk

    • No alternative text description for this image
  • The old DLP systems taught us, that protection shouldn’t come at the cost of chaos. For years, companies tried to operationalize DLP, only to be buried under thousands of false positives. Pattern match tools were loud, clunky, and imprecise. Meanwhile, actual confidential data slipped away unnoticed. That’s where dope.security Dopamine DLP comes in. It integrated OpenAI, and uses large language models to understand the content moving through endpoints. By integrating directly into an on device Secure Web Gateway, it classifies and blocks sensitive data exfiltration in real time, without backhauling traffic or relying on slow stopover proxies. Every upload or prompt is analyzed in context, from PDFs to AI inputs, and evaluated within seconds via zero data retention APIs. There is no manual rules, pattern lists and endless false alerts. Just AI precision working to identify what matters, while respecting privacy and compliance. Administrators can choose between Block, Monitor, or Warning modes, and each event is logged with a clear Dopamine explanation. There is no manual rule configuration or regex pattern matching required. It’s a shift from reactive defense to intelligent prevention. Read the full announcement with Kunal Agarwal, using the link in the comments. #Cybersecurity #DataLossPrevention #EndpointSecurity #InformationSecurity #DataProtection #Compliance #LLM

    • No alternative text description for this image
  • The legacy SIEM era is closing. What’s emerging is something far more distributed, flexible, and intelligent. For years, practitioners have voiced the same concerns, rising costs, noisy data, and analysts buried under management overhead. SIEM is now evolving. The modern SOC no longer relies on SIEM as a standalone solution. Instead, it’s becoming part of a larger ecosystem, one that includes data pipelines, data lakes, automation workflows, and adjacent platforms such as SOAR and XDR. This evolution is being driven by a few undeniable realities: 1/ The Cost Problem Cloud adoption keeps pushing data volumes higher, forcing teams to choose between visibility and cost. Organizations are now seeking predictable pricing, full visibility without blind spots, and long term retention without penalty. 2/ The Overhead Trap Legacy SIEMs require heavy upkeep and specialized staff. The market response is faster onboarding, ready to use detections, and automation that shifts analysts’ focus from maintenance to investigation and response. 3/ The Analyst Dilemma Research shows that up to 80% of alerts are false positives, with analysts spending hours triaging them. Reducing alert fatigue and improving signal quality have become top priorities. As the industry redefines what a SIEM should be, vendors are shifting toward SDPPs. Acquisitions like CrowdStrike with Onum and SentinelOne with Observo AI, reflect this movement. Meanwhile, decoupled architectures and data lakes are reshaping flexibility and cost control. Emerging models separate storage from compute, allowing organizations to retain data across environments, from public clouds to regulated ecosystems. Read the full report with Anomali, Exabeam, Microsoft Security, Palo Alto Networks, Panther, SentinelOne and Vega using the link in the comments. #Cybersecurity #SIEM #SecurityOperations #XDR #SOAR #DataPipelines #SecurityAnalytics #AI #CISO #CyberRisk #ThreatDetection #SecurityArchitecture

    • No alternative text description for this image
  • AI has entered the SOC, now the conversation is shifting from “what it can do” to “what it’s worth.” SOCs have faced more tools and more alerts, with the result being rising costs, mounting complexity, and analysts stretched thin. Join Prophet Security and Software Analyst Cyber Research with Francis Odum and Justin Lachesky, tomorrow on October 9, 2025, at 12pm ET. In this webinar, experts will cover: ▪️ How AI reduces false positives and analyst fatigue, driving measurable cost savings ▪️ Why efficiency alone isn’t the full ROI story, productivity and risk reduction matter ▪️ Real world examples of AI driven SOC transformations, with metrics that resonate with CISOs and CFOs Last chance to register with Ajmal K. and Priyanka Thupili here: https://lnkd.in/gvpHA3eA #Cybersecurity #AI #SOC #SecurityOperations #CyberRisk #CISO #CFO #SecurityROI

    • No alternative text description for this image
  • What happens when EDR vendors pivot into the SIEM market? It is a shift few expected, yet it may redefine how security operations are built. The logic is straightforward. EDR already sits closest to where attacks begin, endpoints and cloud workloads. That vantage point provides high fidelity telemetry, process lineage, identity context, and device posture, that improves correlation, accelerates investigations, and cuts down analyst noise. From there, the architectural advantage becomes clear. An EDR first platform can unify protection events and operational logs under a single agent and data model, streaming everything into one analytic fabric. That eliminates extra collectors, reduces deployment friction, and speeds time to value. Response is the next differentiator. EDR vendors already control precise host level response actions. When SIEM level analytics and workflows are layered on top, teams can detect, investigate, and contain incidents inside one console without pivoting between tools. Finally, there is a go to market reality. Established EDR providers already hold large customer footprints, extensive detection content, and recognized performance in evaluations. That foundation gives them credibility to expand into SIEM. The challenge ahead will be matching the integration breadth, compliance coverage, and migration tooling of entrenched incumbents. SentinelOne’s entry into this space illustrates the trend. Building on its recognized EDR strengths, acquisitions in log analytics and identity security, and expansion into cloud workload protection, SentinelOne has launched Singularity AI SIEM. The platform aims to unify endpoint, identity, and cloud telemetry into a cost predictable, AI native architecture. Features such as natural language analytics through Purple AI and hyperautomation workflows highlight its intent to re architect the SOC for an AI first era. The pivot of EDR vendors into SIEM signals a deeper change, the SOC is moving toward unified platforms that start with stronger data, scale through cloud native fabrics, and automate at every layer. Read the full report using the link in the comments. #Cybersecurity #SIEM #EDR #AI #SecurityOperations #SOC #CISO #ThreatDetection

    • No alternative text description for this image
  • A new chapter begins at SACR. We’re proud to announce the launch of SACR 2.0, the next phase in our mission to advance cybersecurity research. We’re thrilled to welcome Aqsa Taylor as Chief Research Officer (CRO), joining the leadership team to help shape the next era of SACR. Aqsa brings deep expertise from her time at Twistlock and Palo Alto Networks, where she helped pioneer advancements in cloud security, process mining, and SecOps. Her leadership and technical depth will play a central role in scaling our research and strengthening our practitioner first mission. With this, we’re announcing three key initiatives under SACR 2.0: 1/ SACR 2.0 Organization: Expanding from a single analyst publication, into a full fledged research institution. Expect to see new analysts joining in the coming weeks. 2/ Leadership Expansion: Welcoming Aqsa Taylor, whose vision and experience will accelerate our research and community programs. 3/ SACR Security Leaders Network: A new practitioner community starting with two private CISO dinners in California this fall, with more events to follow. Watch the full announcement and interview with Aqsa Taylor: https://lnkd.in/g8pKzxr9 #Cybersecurity #Research #Leadership #SACR #CloudSecurity #SecOps #Community

  • Software Analyst Cyber Research reposted this

    View profile for Francis Odum

    Founder @ Software Analyst Cybersecurity Research

    Big things are on the horizon… SACR is stepping into its next phase. I’ve been holding onto something I can finally share on Monday. This isn’t just an update, it’s deeply personal. A moment that will reshape how you see me, and the story I’ve been building. I believe it will also spark new conversations. Stay tuned. The announcement drops on Monday.

  • Is AI in the SOC delivering measurable ROI, or just another line item? For years, SOCs have wrestled with the more tools deployed, the more alerts generated. The outcome? Rising costs, mounting complexity, and an analyst workforce stretched to its limits. Now, a new question has taken center stage. Can AI not only improve detection and response, but also demonstrate tangible financial return for the SOC? Join Prophet Security with Justin Lachesky and Software Analyst Cyber Research with Francis Odum upcoming session, on "The ROI of AI in the SOC", taking place on October 9, 2025 at 12pm ET. In this webinar, experts will break down: ▪️ How AI can reduce false positives and analyst fatigue, translating directly into cost savings ▪️ Why efficiency gains are only part of the ROI story, with productivity and risk reduction as critical measures ▪️ Real world examples of AI driven SOC transformation, including metrics that resonate with both CISOs and CFOs Register here: https://lnkd.in/gBqrT8qj #Cybersecurity #AI #SOC #SecurityOperations #CyberRisk #CISO #CFO #SecurityROI

    • No alternative text description for this image

Similar pages

Browse jobs