Jack Poller

@poller@infosec.exchange
38 Followers
66 Following
396 Posts
Founder & Principal Analyst, Paradigm Technica, covering Security, Cloud, and AI; former marketer, SW & HW Eng; Firearms Instructor & FFL, photographer, auto racer
Twitterhttps://twitter.com/poller
LinkedInwww.linkedin.com/in/jackpoller
Enterprise Strategy Grouphttps://www.esg-global.com/analysts/jack-poller
Twittodonhttps://twittodon.com/share.php?t=poller&m=poller@infosec.exchange

For CISOs looking to do more with less while maintaining transparency and control, this represents a fundamental shift in how we approach security operations.

Read the full analysis https://www.linkedin.com/pulse/breaking-free-from-hardcoded-security-microsoft-ai-agents-jack-poller-pecve
5/6

Breaking Free from Hardcoded Security: Microsoft Introduces Human-in-the-Loop AI Agents

Traditional security automation, often implemented through Security Orchestration, Automation, and Response (SOAR) platforms, relies on predefined rules, if-statements, for loops, and functions. While effective for routine and highly similar tasks, this approach faces significant challenges.

Security teams can finally focus on what matters most - genuine threats and strategic security initiatives - instead of drowning in false alarms and manual processes.
4/6
๐Ÿ‘ฅ Human-in-the-loop design keeps you in control of every action
๐Ÿ“ˆ Continuous learning from your feedback and business context
The result?
3/6
Microsoft's Security Copilot Agents are changing the game entirely.
What makes these AI agents different?
๐Ÿง  Dynamic reasoning instead of hardcoded rules - they adapt like human analysts
๐Ÿ” Transparent decision trees so you can see exactly how AI reached its conclusions
2/6
๐Ÿงต๐Ÿ” The Future of Security Operations is Here: AI That Actually Thinks
Traditional security automation is breaking down. While SOAR platforms excel at routine tasks, they crumble when faced with new threats or unexpected scenarios.
1/6

For security professionals in complex environments - this could transform your ability to detect C2 channels, data exfiltration, and lateral movement.

Check out the full article here:

https://www.linkedin.com/pulse/uncompromising-network-visibility-how-cpacket-augments-jack-poller-njmke

What visibility gaps are you seeing in your network security?
4/5

Uncompromising Network Visibility: How cPacket Augments Security with Advanced Telemetry and AI

The axiom โ€œyou can't secure what you can't seeโ€ rings truer than ever. Security professionals increasingly rely on network telemetry to gain visibility into their environments, understand normal versus abnormal behavior, and detect threats that might otherwise go unnoticed.

Key insight: Even when attackers compromise application logs, cPacket captures the real network story.
3/5
๐ŸŒ Pervasive Capture - Trillions of packets daily across hybrid environment
๐Ÿค– AI-Driven Detection - Auto-baseline normal behavior, flag anomalies
๐Ÿ” Digital Forensics - Complete network context for incident analysis
๐Ÿ”— Seamless Integration - Augments existing security tools
2/5