{"id":798,"date":"2026-05-01T17:31:01","date_gmt":"2026-05-01T16:31:01","guid":{"rendered":"https:\/\/www.seven-stones.biz\/blog\/?p=798"},"modified":"2026-05-01T17:31:01","modified_gmt":"2026-05-01T16:31:01","slug":"siem-ai-and-the-mythical-solved-soc","status":"publish","type":"post","link":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/","title":{"rendered":"SIEM, AI, and the Mythical \u2018Solved SOC\u2019"},"content":{"rendered":"\n<p>I\u2019ve spent 25 years in information security. Long enough to see SIEM rise from the old audit requirements of &#8220;aggregated, network based logging&#8221;, with the birth of the &#8220;correlation&#8221; buzzword,  and with its fall seen the rise of the &#8220;normalisaton&#8221; buzzword. I\u2019ve built SOCs, tuned them, fought alert noise, and tried to control the spiralling cost that comes with doing security badly at scale.<\/p>\n\n\n\n<p>And through all of that, one principle has never changed.<\/p>\n\n\n\n<p><strong>Know your environment. Know your security strategy. Understand your threat model. Build a picture of normal. Alert on what is truly abnormal\u2014and truly risky.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Sacred Cows of the SOC<\/h2>\n\n\n\n<p>If you follow the above-described approach, something interesting happens. A number of \u201cmust-haves\u201d in modern SOC conversations start to look\u2026 negotiable:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>SOAR is not always mandatory<\/li>\n\n\n\n<li>Threat hunting is cool<\/li>\n\n\n\n<li>More analysts does not equal better outcomes<\/li>\n\n\n\n<li>Expensive threat intelligence feeds are mandatory<\/li>\n<\/ul>\n\n\n\n<p>These are not heretical views\u2014they\u2019re just uncomfortable ones. Because they challenge a model where complexity and cost are often mistaken for maturity.<\/p>\n\n\n\n<p>In reality, a well-understood environment with sharply defined risk tolerance will outperform a bloated SOC every time.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Enter AI: The New Buzzword Cycle<\/h2>\n\n\n\n<p>Now we have a new layer: AI, and if you read the current wave of content, you\u2019ll notice a pattern. The most confident \u201cAI success stories\u201d tend to avoid talking about SIEM at all!<\/p>\n\n\n\n<p>Instead, we get familiar phrases:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>\u201cEnriching data feeds\u201d<\/li>\n\n\n\n<li>\u201cAugmenting analysts\u201d<\/li>\n<\/ul>\n\n\n\n<p>Let\u2019s pause on one of those.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">\u201cEnrichment\u201d of Data<\/h3>\n\n\n\n<p>\u201cEnrichment\u201d has quietly joined the long list of SIEM buzzwords. But what does it actually mean? Better data? According to whom? Data quality is not universal. It is entirely dependent on <em>your<\/em> environment, <em>your<\/em> systems, and <em>your<\/em> risks. An event that is critical in one organisation is meaningless in another.<\/p>\n\n\n\n<p>You can train an AI model to process data. But can you teach it what <em>matters<\/em> in a specific, messy, evolving environment? That\u2019s not just a data problem. That\u2019s a context problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Analyst Productivity Argument<\/h2>\n\n\n\n<p>Another popular claim:<\/p>\n\n\n\n<blockquote class=\"wp-block-quote is-layout-flow wp-block-quote-is-layout-flow\">\n<p>\u201cAI won\u2019t replace analysts, but it will make them more productive.\u201d<\/p>\n<\/blockquote>\n\n\n\n<p>It sounds reasonable. It\u2019s also mostly unproven in the SIEM context. Take \u201cnoise reduction\u201d\u2014a classic SOC problem. Who defines noise?<\/p>\n\n\n\n<p>That decision requires:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Knowledge of the environment<\/li>\n\n\n\n<li>Understanding of business risk<\/li>\n\n\n\n<li>Familiarity with attacker behaviour<\/li>\n<\/ul>\n\n\n\n<p>That\u2019s not magic. But it <em>does<\/em> require experience and judgement. Can an AI learn this? Possibly, in constrained scenarios. Can it generalise this across real-world environments without introducing blind spots? That\u2019s much harder to believe.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Missing Layer: Technical Depth<\/h2>\n\n\n\n<p>What\u2019s consistently absent from \u201cAI transformed my SOC\u201d narratives is technical depth.<\/p>\n\n\n\n<p>Where are the discussions about?:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Operating systems<\/li>\n\n\n\n<li>Network behaviour<\/li>\n\n\n\n<li>Application logic<\/li>\n<\/ul>\n\n\n\n<p>Even in fully SaaS environments, you are still dealing with operating systems, identity layers, protocols, and execution paths.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Can AI Fix a Broken SOC?<\/h2>\n\n\n\n<p>AI can easily flog a dead horse that is a cost-sinkhole SOC (plenty of those around on all continents &#8211; it needs a collective noun), but can it get a SOC to rise phoenix-like from the ashes of its dark history? That is as close to a &#8216;no&#8217; as you&#8217;re ever going to get without it actually being a &#8216;no&#8217;. <\/p>\n\n\n\n<p>I remain open minded, but i want to see technically grounded discussions in order to change that position. The SIEM community has long conversations for the long nights of winter e.g. &#8220;do i want to use sysmon if i have a CIS benchmark compliant Audit Policy service?&#8221;. This is the level that the conversation has to be, at, without perhaps the same volume.<\/p>\n\n\n\n<p>AI can absolutely make those SOCs <em>more efficient at being inefficient<\/em>. can it transform a fundamentally flawed SOC into an effective one? That\u2019s very close to a \u201cno.\u201d Not because AI is weak\u2014but because the problem is structural.<\/p>\n\n\n\n<p>If you don\u2019t understand your environment, your risk, and your attack surface, no amount of automation will fix that.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The Hard Problem: Teaching an Attack Mindset<\/h2>\n\n\n\n<p>At its core, effective detection relies on an attack mindset.<\/p>\n\n\n\n<p>That comes from:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understanding how systems really behave<\/li>\n\n\n\n<li>Knowing how they break<\/li>\n\n\n\n<li>Seeing how attackers chain small weaknesses into real impact<\/li>\n<\/ul>\n\n\n\n<p>We\u2019ve seen early attempts to automate parts of this\u2014especially in areas like network path analysis and automated penetration testing.<\/p>\n\n\n\n<p>But anyone who has participated in real-world red teaming or unrestricted penetration testing knows the truth: This is not a linear process. It involves intuition, creativity, and adapting to incomplete information. Teaching that to an AI agent is not impossible\u2014but it is a <em>very<\/em> hard problem.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thought<\/h2>\n\n\n\n<p>I\u2019m not anti-AI. Far from it. But I am sceptical of narratives that skip over the hard parts.<\/p>\n\n\n\n<p>Can AI replace the fundamentals?:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Understanding your environment<\/li>\n\n\n\n<li>Defining risk properly<\/li>\n\n\n\n<li>Thinking like an attacker<\/li>\n<\/ul>\n\n\n\n<p>Until AI can operate meaningfully at that level, it remains a tool, of sorts, hopefullly not a very expensive tool.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>AI can easily flog a dead horse that is a cost-sinkhole SOC (plenty of those around on all continents &#8211; it needs a collective noun), but can it get a SOC to rise phoenix-like from the ashes of its dark history? <a href=\"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[248,26,65,1,204,118,151,68,214,215],"tags":[250,249,125,157,251,217,218],"class_list":["post-798","post","type-post","status-publish","format-standard","hentry","category-ai","category-blog","category-cis-benchmarks","category-general","category-logging","category-saas","category-security-architecture","category-siem","category-threat-hunting","category-threat-intelligence","tag-agents","tag-ai","tag-saas","tag-siem","tag-soar","tag-threat-hunting","tag-threat-intelligence"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>SIEM, AI, and the Mythical \u2018Solved SOC\u2019 - Security Macromorphosis<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"SIEM, AI, and the Mythical \u2018Solved SOC\u2019 - Security Macromorphosis\" \/>\n<meta property=\"og:description\" content=\"AI can easily flog a dead horse that is a cost-sinkhole SOC (plenty of those around on all continents - it needs a collective noun), but can it get a SOC to rise phoenix-like from the ashes of its dark history? Continue reading &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/\" \/>\n<meta property=\"og:site_name\" content=\"Security Macromorphosis\" \/>\n<meta property=\"article:published_time\" content=\"2026-05-01T16:31:01+00:00\" \/>\n<meta name=\"author\" content=\"itibble@gmail.com\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:site\" content=\"@seven_stones\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"itibble@gmail.com\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/\"},\"author\":{\"name\":\"itibble@gmail.com\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\"},\"headline\":\"SIEM, AI, and the Mythical \u2018Solved SOC\u2019\",\"datePublished\":\"2026-05-01T16:31:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/\"},\"wordCount\":835,\"commentCount\":0,\"keywords\":[\"Agents\",\"AI\",\"SaaS\",\"SIEM\",\"SOAR\",\"Threat Hunting\",\"Threat Intelligence\"],\"articleSection\":[\"AI\",\"Blog\",\"CIS Benchmarks\",\"General\",\"Logging\",\"SaaS\",\"Security Architecture\",\"SIEM\",\"Threat Hunting\",\"Threat Intelligence\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/\",\"name\":\"SIEM, AI, and the Mythical \u2018Solved SOC\u2019 - Security Macromorphosis\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#website\"},\"datePublished\":\"2026-05-01T16:31:01+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/siem-ai-and-the-mythical-solved-soc\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SIEM, AI, and the Mythical \u2018Solved SOC\u2019\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/\",\"name\":\"Security Macromorphosis\",\"description\":\"Ian Tibble&#039;s Security Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.seven-stones.biz\\\/blog\\\/#\\\/schema\\\/person\\\/dd7adbe0152f2279b133661b823e0c28\",\"name\":\"itibble@gmail.com\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g\",\"caption\":\"itibble@gmail.com\"},\"description\":\"Author of Security De-engineering, CTO at Seven Stones (Indonesia)\",\"sameAs\":[\"http:\\\/\\\/www.seven-stones.biz\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"SIEM, AI, and the Mythical \u2018Solved SOC\u2019 - Security Macromorphosis","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/","og_locale":"en_US","og_type":"article","og_title":"SIEM, AI, and the Mythical \u2018Solved SOC\u2019 - Security Macromorphosis","og_description":"AI can easily flog a dead horse that is a cost-sinkhole SOC (plenty of those around on all continents - it needs a collective noun), but can it get a SOC to rise phoenix-like from the ashes of its dark history? Continue reading &rarr;","og_url":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/","og_site_name":"Security Macromorphosis","article_published_time":"2026-05-01T16:31:01+00:00","author":"itibble@gmail.com","twitter_card":"summary_large_image","twitter_creator":"@seven_stones","twitter_site":"@seven_stones","twitter_misc":{"Written by":"itibble@gmail.com","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/#article","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/"},"author":{"name":"itibble@gmail.com","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"headline":"SIEM, AI, and the Mythical \u2018Solved SOC\u2019","datePublished":"2026-05-01T16:31:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/"},"wordCount":835,"commentCount":0,"keywords":["Agents","AI","SaaS","SIEM","SOAR","Threat Hunting","Threat Intelligence"],"articleSection":["AI","Blog","CIS Benchmarks","General","Logging","SaaS","Security Architecture","SIEM","Threat Hunting","Threat Intelligence"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/","url":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/","name":"SIEM, AI, and the Mythical \u2018Solved SOC\u2019 - Security Macromorphosis","isPartOf":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#website"},"datePublished":"2026-05-01T16:31:01+00:00","author":{"@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28"},"breadcrumb":{"@id":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.seven-stones.biz\/blog\/siem-ai-and-the-mythical-solved-soc\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.seven-stones.biz\/blog\/"},{"@type":"ListItem","position":2,"name":"SIEM, AI, and the Mythical \u2018Solved SOC\u2019"}]},{"@type":"WebSite","@id":"https:\/\/www.seven-stones.biz\/blog\/#website","url":"https:\/\/www.seven-stones.biz\/blog\/","name":"Security Macromorphosis","description":"Ian Tibble&#039;s Security Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.seven-stones.biz\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.seven-stones.biz\/blog\/#\/schema\/person\/dd7adbe0152f2279b133661b823e0c28","name":"itibble@gmail.com","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4efc9caa4c914912bcf9dd199b33f34a0d42e56752f4f713cd8d0c5416733603?s=96&d=mm&r=g","caption":"itibble@gmail.com"},"description":"Author of Security De-engineering, CTO at Seven Stones (Indonesia)","sameAs":["http:\/\/www.seven-stones.biz"]}]}},"_links":{"self":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/798","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/comments?post=798"}],"version-history":[{"count":4,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/798\/revisions"}],"predecessor-version":[{"id":803,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/posts\/798\/revisions\/803"}],"wp:attachment":[{"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/media?parent=798"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/categories?post=798"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.seven-stones.biz\/blog\/wp-json\/wp\/v2\/tags?post=798"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}