Tech
Splunk.conf: Cisco and Splunk expand agentic SOC vision | Computer Weekly
At Splunk’s annual .Conf event, the Cisco-backed observability and data security specialist made its first run at the agentic artificial intelligence (AI) enhanced security operations centre (SOC), unveiling two agent-powered security operations (SecOps) tools for users to explore.
In a Tuesday keynote address, Splunk security senior vice president and general manager Mike Horn said that SecOps must to evolve and the need to simplify workflows, accelerate and enhance SOC operations, and expand detection capabilities and threat visibility were clear.
Splunk Enterprise Security Essentials Edition and Splunk Enterprise Security Premier Edition – delivered within version 8.2 of the firm’s Enterprise Security (SEC) security information and event management (SIEM) solution – unify a number of security workflows in the threat detection, investigation and response (TDIR) sphere.
Essentials Edition unifies SEC 8.2 with Splunk AI Assistant in Security and is available today, while Premier goes a step further adding Splunk SOAR and Splunk UEBA, and enters controlled availability later in September.
Splunk and Cisco – which have made significant and speedy progress on technical integration since coming together in 2024 – claim that the new features will place agentic AI at the heart of the SOC in order to extend security intelligence across the network.
“Our security offerings unify detection, investigation, and response into a single, intuitive workspace, eliminating tool fragmentation and significantly boosting efficiency,” said Horn.
“Built-in AI can help cut alert noise and reduce investigation time from hours to minutes. Now every SOC can better position to stay ahead of advanced threats and empower analysts at every level.”
“With today’s increasingly sophisticated threats and sprawling attack surfaces, security teams can’t afford to waste time switching between fragmented tools and operating with siloed visibility,” added Michelle Abraham, research director for security and trust at IDC.
“By integrating multiple security capabilities into a single, cohesive environment, security platforms empower organisations to move from reactive to proactive security, streamlining workflows, improving detection and response, and ultimately reducing risk.”
In addition to this, parent Cisco plans to release a number of additional AI features to power the agentic SOC, with the intent of enabling cyber pros to keep focus on more strategic aspects of their roles while agent bots sift the raw security data and perform proactive, autonomous SecOps.
Some of the agentic capabilities in development include triaging to evaluate, prioritise and explain security alerts; malware reversal to explain malicious scripts; playbook authoring to translate natural language intent into functional SOAR playbooks; response importer, using multi-modal large language models (LLMs) to import standard operating procedures into security response plans; detection library to help turn detections from hypotheses to production, and personalised detection SPL generator to personalise detections within the library to align with customer SOC environments.
Additionally, Splunk expanded the integration of Cisco Isovalent Runtime Security (eBPF) into Splunk, enhancing workload visibility and better pinpointing issues, and announced that Splunk Cloud Platform’s Federated Search for Amazon S3 and Security Analytics and Logging (SAL) will allow cyber pros to run security analytics on Cisco firewall logs stored in SAL directly, without needed to ingest.
These features and capabilities will come on-stream within the next 12 months.
Era of simplification
Speaking to Computer Weekly at .Conf, James Hodge, Splunk GVP and chief strategy advisor for EMEA, said that the advent of the agentic SOC heralded an era of simplification for cyber security professionals, describing the underlying technology as “phenomenally complicated” in many ways.
“I was really encouraged, and really excited this week, because from a user perspective we’re simplifying all of that. We’re abstracting that complexity, and just surfacing what you need,” said Hodge.
“For anyone that works with it, the word I’d use is liberating, because you’re no longer battling with tools or techniques, you’re able to go and get that question answered so you can go and progress,” he added. “For people, it means they can get on with doing what they’re paid to do.”
Tech
The hidden military pressures behind the new push for small nuclear reactors
Donald Trump’s recent visit to the UK saw a so-called “landmark partnership” on nuclear energy. London and Washington announced plans to build 20 small modular reactors and also develop microreactor technology—despite the fact no such plants have yet been built commercially anywhere in the world.
The UK prime minister, Keir Starmer, promised these plans will deliver a “golden age” of nuclear energy that will also “drive down bills.” Yet the history of nuclear power has been decades of overhype, soaring costs and constant delays. Around the world, the trends point the wrong way.
So why the renewed excitement about going nuclear? The real reasons have less to do with energy security, or climate change—and far more to do with military power.
At first sight, the case may seem obvious. Nuclear supporters frame small modular reactors, or SMRs, as vital for cutting emissions, meeting rising demand for electricity from cars and data centers. With large nuclear plants now prohibitively expensive, smaller reactors are billed as an exciting new alternative.
But these days even the most optimistic industry analyses concede that nuclear—even SMRs—is unlikely to compete with renewables. One analysis in New Civil Engineer published earlier this year concluded that SMRs are “the most expensive source per kilowatt of electricity generated when compared with natural gas, traditional nuclear and renewables.”
Independent assessments—for instance by the formerly pro-nuclear Royal Society—find that 100% renewable systems outperform any energy system, including nuclear on cost, flexibility and security. This helps explain why worldwide statistical analysis shows nuclear power is not generally linked to carbon emissions reductions, while renewables are.
Partly, the enthusiasm for SMRs can be explained by the loudest institutional voices tending to have formal pro-nuclear remits or interests: they include the industry itself and its suppliers, nuclear agencies, and governments with entrenched military nuclear programs. For these interests, the only question is which kinds of nuclear reactors to develop, and how fast. They don’t wonder if we should build reactors in the first place: the need is seen as self-evident.
At least big nuclear reactors have benefited from economies of scale and decades of technological optimization. Many SMR designs are just “powerpoint reactors,” existing only in slides and feasibility studies. Claims these unbuilt designs “will cost less” are speculative at best.
Investment markets know this. While financiers see SMR hype as a way to profit from billions in government subsidies, their own analyses are less enthusiastic about the technology itself.
So why then, all this attention to nuclear in general and smaller reactors in particular? There is clearly more to this than meets the eye.
The hidden link
The neglected factor is the military dependence on civil nuclear industries. Maintaining a nuclear-armed navy or weapons program requires constant access to generic reactor technologies, skilled workers and special materials. Without a civilian nuclear industry, military nuclear capabilities are significantly more challenging and costly to sustain.
Nuclear submarines are especially important here as they would very likely require national reactor industries and their supply chains even if there was no civil nuclear power. Barely affordable even vessel by vessel, nuclear submarines become even more expensive when the costs of this “submarine industrial base” is factored in.
Rolls-Royce is an important link here, as it already builds the UK’s submarine reactors and is set to build the newly announced civil SMRs. The company said openly in 2017 that a civil SMR program would “relieve the Ministry of Defense of the burden of developing and retaining skills and capability.”
Here, as emphasized by Nuclear Intelligence Weekly in 2020, the Rolls-Royce SMR program has an important “symbiosis with UK military needs.” It is this dependency that allows military costs (in the words of a former executive with submarine builders BAE Systems), to be “masked” behind civilian programs.
By funding civil nuclear projects, taxpayers and consumers cover military uses of nuclear power in subsidies and higher bills—without the added spending appearing in defense budgets.
When the UK government funded us to investigate the value of this transfer, we put it at around £5 billion per year in the UK alone. These costs are masked from public view, covered by revenues from higher electricity prices and the budgets of supposedly civilian government agencies.
This is not a conspiracy but a kind of political gravitational field. Once governments see nuclear weapons as a marker of global status, the funding and political support becomes self-perpetuating.
The result is a strange sort of circularity: nuclear power is justified by energy security and cost arguments that don’t stand up, but is in reality sustained for strategic reasons that remain unacknowledged.
A global pattern
The UK is not unique, though other nuclear powers are much more candid. US energy secretary Chris Wright described the US-UK nuclear deal as important for “securing nuclear supply chains across the Atlantic.” Around US$25 billion a year (£18.7 billion) flows from civil to military nuclear activity in the US.
Russia and China are both quite open about their own inseparable civil-military links. French president Emmanuel Macron put it clearly: “Without civilian nuclear, no military nuclear, without military nuclear, no civilian nuclear.”
Across these states, military nuclear capabilities are seen as a way to stay at the world’s “top table”. An end to their civilian program would threaten not just jobs and energy, but their great power status.
The next frontier
Beyond submarines, the development of “microreactors” is opening up new military uses for nuclear power. Microreactors are even smaller and more experimental than SMRs. Though they can make profits by milking military procurement budgets, they make no sense from a commercial energy standpoint.
However, microreactors are seen as essential in US plans for battlefield power, space infrastructure and new “high energy” anti-drone and missile weaponry. Prepare to see them become ever more prominent in “civil” debates—precisely because they serve military goals.
Whatever view is taken of these military developments, it makes no sense to pretend they are unrelated to the civil nuclear sector. The real drivers of the recent US–UK nuclear agreement lie in military projection of force, not civilian power production. Yet this remains absent from most discussions of energy policy.
It is a crucial matter of democracy that there be honesty about what is really going on.
This article is republished from The Conversation under a Creative Commons license. Read the original article.
Citation:
The hidden military pressures behind the new push for small nuclear reactors (2025, October 27)
retrieved 27 October 2025
from https://techxplore.com/news/2025-10-hidden-military-pressures-small-nuclear.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
Tech
This Gas Pizza Oven Was My Favorite of the Summer. It’s Half Off Today
Cookware brand All-Clad surprised me this year. This summer, it breezed into the backyard pizza world with a debut pizza oven that I like as well as any oven I’ve tested this year. Right now, that excellent All-Clad gas-powered pizza oven is a whopping $800 off the suggested retail price, only at the All-Clad site.
What’s so good about the oven? The All-Clad gas-powered pizza oven heats up fast, and crests 900 degrees Fahrenheit after 20 minutes. It’s insulated well, comes with a built-in thermometer that’s pretty accurate, and it’s made with the sturdy stainless steel All-Clad is known for.
But especially, All-Clad’s pizza oven comes with a rotating pizza stone that removes a lot of the fuss and bother of cooking pizza evenly. Instead of having to hover nervously over each pie with a pizza peel, in order to turn the pizza before the backside burns, all I have to do is launch the pizza in the middle of the pizza stone.
The oven does the rest, spinning the pizza at a rate of one revolution every 40 seconds or so. It’s not foolproof—you have to launch the pizza in the center of the pizza stone to get an even cook—but it is a game-changer. This is true especially if I’m making multiple pizzas in a go-round. It means I’m able to prep the next pie while the current one is still spinning and baking.
Photograph: Matthew Korfhage
Tech
How blind and low-vision users manage their passwords
Passwords remain the go-to authentication tool in everyday life, says CISPA researcher Alexander Ponticello. At the same time, passwords are often a security weak spot: too short, too simple, and reused far too often. Blind and low-vision people face an additional hurdle: Systems need to work together sensibly for authentication processes to run smoothly.
A new qualitative study with 33 U.S. participants shows how this group manages passwords—and where improvements are needed. Ponticello presented his paper “How Blind and Low-Vision Users Manage Their Passwords” at the IT security conference CCS 2025 in Taipei.
Passwords are still the default tool for online security—but they’re also a constant source of problems. Many people today have hundreds of accounts and for which they must manage passwords of varying complexity. Password managers can help: They create strong passwords, store them, and autofill login credentials—problem solved, right?
Unfortunately, this isn’t the case, because password managers are far from being used consistently by everyone. Previous studies show that the main reasons are the fear of complicated setup, lack of trust, and lack of knowledge about existing tools. Older user groups also tend to be generally hesitant about digital tools. Ponticello’s new study expands research on password management and password manager use to a group that has received little attention so far: blind and low-vision users.
Widespread use of password managers in the community
Password managers can be an important tool for blind and low-vision people to manage their login credentials. “In fact, all 33 respondents in our study used password managers—sometimes consciously, sometimes unconsciously, simply because their browser or device offered to manage them,” says Ponticello. These included third-party programs such as LastPass or 1Password, as well as browser-integrated password managers like the one built into Google Chrome and system-integrated password managers such as Apple Passwords.
“Those who intentionally chose a password manager usually relied on recommendations from acquaintances or advice in relevant forums. Accessibility played at least as important a role as system security,” Ponticello explains.
Real accessibility only if systems work together
“Depending on the degree of impairment, blind and low-vision users rely primarily on screen readers to use their devices in everyday life. Our first intuition was that it must be a big problem that screen readers read passwords aloud in public. However, this proved to be less of a problem, as almost all study participants told us that they use headphones,” says the researcher.
In addition, the speech output usually runs so fast that bystanders can hardly understand anything. However, for blind and low-vision people to use password managers smoothly, screen readers, password managers, apps, and websites must work together accordingly.
“If one of these parties fails, the whole system breaks down,” says Ponticello.
Unfortunately, there are still programs where accessibility seems to be an afterthought. At the latest when updates need to be installed, some users have experienced that programs no longer work properly. The result: Users feel they cannot reliably depend on the systems.
Security versus everyday life: Compromises are common
Many of the users surveyed therefore combine password managers with backup strategies. Some even keep password lists in Braille—safely stored, but still analog.
“That’s not inherently insecure,” the researcher explains. “But you have to be aware of who might have access to that list.” Other study participants said they intentionally create simpler passwords so they can enter them without a tool if necessary.
“That contradicts security best practices,” he says, “but above all it shows that systems need to become more reliable.”
What (still) needs to be done—and how to do it better
According to Ponticello, one problem is how password managers generate passwords: Random passwords with special characters are often hard for blind people to find on the keyboard. A better alternative would be passphrases that string whole words together.
“Unfortunately, screen readers then read those passwords letter by letter instead of recognizing the words. The integration hasn’t been thought through to the end,” the researcher says. App stores could also help by clearly labeling a tool’s accessibility and introducing special review categories for affected users where blind and low-vision people can get information directly.
“But the most important thing is: We need accessibility by design—correct labels for buttons, a sensible focus order, and consistent screen reader flows.”
Outlook
Conducting a similar study with German users could be Ponticello’s next step. So far, legislation in the U.S. has been stricter than in the EU. Laws such as the Americans with Disabilities Act have long enforced strict accessibility standards for websites and digital services there. The EU is following suit with the European Accessibility Act (EAA).
In Germany, this led to the Accessibility Strengthening Act, which has been required to be applied since June 28, 2025. “I’m curious to see what effects this will have in the future,” says Ponticello.
Ponticello’s study shows: Accessibility is not a luxury but a basic prerequisite for digital security. Many hurdles—from lack of labeling to fragile integrations—can be solved if platforms, developers, and lawmakers take them seriously.
“We need to adapt the systems, not the people,” the researcher says. “Only then can passwords be used securely by everyone.”
More information:
How Blind and Low-Vision Users Manage Their Passwords. cispa.de/en/research/publicati … nage-their-passwords
Provided by
CISPA Helmholtz Center for Information Security
Citation:
How blind and low-vision users manage their passwords (2025, October 27)
retrieved 27 October 2025
from https://techxplore.com/news/2025-10-vision-users-passwords.html
This document is subject to copyright. Apart from any fair dealing for the purpose of private study or research, no
part may be reproduced without the written permission. The content is provided for information purposes only.
-
Tech1 week agoHow to Protect Yourself Against Getting Locked Out of Your Cloud Accounts
-
Tech1 week agoThe DeltaForce 65 Brings Das Keyboard Into the Modern Keyboard Era—for Better or Worse
-
Business1 week agoGovernment vows to create 400,000 jobs in clean energy sector
-
Business1 week agoDiwali 2025: Gold & silver likely to consolidate next week; Here’s what analysts said – The Times of India
-
Tech1 week agoGemini in Google Home Keeps Mistaking My Dog for a Cat
-
Fashion1 week agoEgypt’s apparel exports rise 25% in H1, trims US market reliance
-
Fashion1 week agoReal UK GDP grows 0.3% QoQ in quarter to Aug 2025: ONS
-
Business1 week agoInflation expected to jump to highest since January last year



