Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

8 ways MSSPs gain competitive advantage with the SecOps Cloud Platform

Earlier this year, we introduced the LimaCharlie SecOps Cloud Platform (SCP). The SCP is a unified platform for modern cybersecurity operations. Similar to what the public cloud did for IT, the SCP offers security teams core cybersecurity capabilities and infrastructure: on-demand, pay-per-use, and API-first. In short, the SCP is a new paradigm for cybersecurity. It’s a game-changer for enterprise security teams and cybersecurity solutions builders.

Hyperautomation Is Blowing Up the SOAR Market

It wasn’t long ago that we at Torq proclaimed “SOAR is dead!” And it didn’t take long for the industry to catch on. Leading analyst firm GigaOm in its recent GigaOm Radar report named Torq a leader and an outperformer in the security automation market, namely for our hyperautomation capabilities that legacy SOAR just can’t touch. And our competitors have also started jumping on the hyperautomation bandwagon since we shifted our focus to this model.

Tips for Building a SOC Analyst Home Lab

Do you aspire to become a standout in the SOC world? To excel, you must consistently cultivate both your technical hard skills and non-technical soft skills. No specific career path is the golden ticket; each individual’s journey to SOC stardom is a blend of conventional education and hands-on training, seasoned with vital real-world experience. A purpose-built SOC analyst home lab is one proven self-guided learning tool to sharpen your technical know-how.

Building a Healthier and More Productive SOC

Security professionals are burning out, and they often aren’t getting enough support from their higher-ups. In fact, Devo and Wakefield Research have found that 45% of IT professionals surveyed felt that their leaders haven’t proactively responded to employee burnout, and 59% wish their leaders would offer additional training, mentorship, and development. Responsibility for tackling this issue lies with InfoSec leaders and their organizations.

What to Look for in a Security Operations Platform

Despite concerns of a global recession, a new IDC Worldwide Spending Guide forecasts cybersecurity investments will reach $219 billion in 2023, an increase of 12.1%. No doubt, the ongoing rise in cyberattacks and an increase in focus by boards and the C-suite on mitigating risk and building resilience are behind the steadfast commitment to invest in security solutions and services.

Solving the Integration Problem at Scale: How Torq Connects With Any Tool Using Hyperautomation

Setting up your security tools to work together seamlessly is often easier said than done, leading to time-consuming tasks and potential security gaps, especially without the proper tools. You must have both the ability to connect to any product, using APIs, CLIs or proprietary protocols, and do that in a simple no-code manner, without having to know the ins and outs of each technology. Without these, the ability to quickly automate is greatly diminished – as in legacy SOAR products.

8 Steps to Achieve Cybersecurity Compliance

Cybersecurity compliance is complicated. As the cybersecurity industry changes, so do compliance requirements and, depending on your organization’s operations, compliance could mean adhering to multiple frameworks and reporting to multiple governing bodies. In fact, 67% of organizations surveyed by Arctic Wolf follow between one to three sets of guidelines.

Redefining Cybersecurity Operations: The Power of Torq's Workflow-Centric Case Management

Cybersecurity is a landscape forever in motion, an arena where threats evolve at an alarming pace. The tools we employ to counter threats should match this pace and anticipate the unforeseeable. Still, a chasm exists where tools are not keeping up with the changes, particularly regarding case management. I’m Dor Morgenstern, lead PM for Case Management at Torq. With a background rooted in cybersecurity, I’ve seen firsthand the evolving challenges that security operations face.

How Security Operations Reduces the Risk of a Cyber Incident by Over 90%

The value of cybersecurity solutions is uniquely difficult to quantify. As with any risk-reduction investment, the ideal outcome is we simply avoid the outcome we’re defending against. But then how can we understand the value of our security strategy? Even if we can identify attempted compromises that are thwarted, it’s still challenging to scope out the potential impacts we were able to avert.

What Is Smishing and How Organizations Can Protect Themselves

In the summer of 2022, a few Twilio employees received an odd text message. Through the messaging app Signal, threat actors tricked employees into giving away credentials, resulting in the compromise of over 130 connected organizations. 130 businesses breached from one text message. Ouch. That kind of tactic is becoming all too common, with stolen credentials reaching the top of the list of initial access points.