soc 2 Building a SOC Co-Pilot with Safe Retrieval Boundaries Apr 7, 2026 Automating Phishing Triage with n8n and Guardrailed LLMs Mar 5, 2026