Prophet AI Blog

Discover the Prophet AI Blog, your go-to source for the latest security insights and news, helping you stay ahead in threat detection and investigation.

Top MDR Providers of 2026: What to Evaluate and Where the Category Falls Short

A comparison of the top MDR providers in 2026, grounded in market share, peer reviews, and analyst recognition. Covers what each provider investigates, what tends to get escalated, and the structural limits of the MDR category itself.

April 23, 2026
Ajmal Kohgadai

Mean Time to Detect (MTTD): Definition, Formula, and Why the Metric Fails in Practice

Traditional MTTD metrics often misrepresent actual SOC effectiveness. MTTD should measure meaningful detection which is the moment when a threat is actively recognized.

April 23, 2026
Ajmal Kohgadai

Discover Prophet AI for Security Operations

See for yourself how AI can transform the way security teams operate

The SOC Hierarchy of Needs: A Maturity Model for Modern Operations

From Alert Management to Posture Improvements, this guide maps the SOC Hierarchy of Needs for modern security teams

February 11, 2026
Ajmal Kohgadai

5 AI SOC Best Practices

Unlock the full potential of an AI SOC. Discover 5 operational best practices to eliminate alert backlogs, enforce consistency, and unshackle detection engineers

February 3, 2026
Jon Hencinski
Gourav Nagar

When Zoom Phishes You: Unmasking a Novel TOAD Attack Hidden in Legitimate Infrastructure

Prophet AI discovered a novel TOAD attack weaponizing Zoom’s legitimate infrastructure to bypass Secure Email Gateways. Learn how attackers abuse "Display Names" to mimic PayPal and how Prophet AI detects these "verified" phishing threats.

January 28, 2026
Augusto Barros

How to keep up with talent attrition in a SOC?

Stop the "revolving door" of SOC turnover. Discover how AI-enabled automation eliminates Level 1 toil, reduces alert noise, and transforms your SOC from a burnout factory into a fulfilling career

January 23, 2026
Augusto Barros

Prophet AI in Action: Unmasking "Zombie" Credentials in Subsidiary Infrastructure

"Dead" keys can still open doors. Read the case study of how Prophet AI investigated a dormant AWS access key attack, automating response and remediation to mere minutes.

January 23, 2026
Augusto Barros