Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Agent-to-Agent: How Torq + Intezer Power the Autonomous SOC

Torq AMP spotlights the partners redefining what’s possible in security operations. Each partner brings a unique strength that seamlessly extends Torq’s autonomous SOC platform. Together, these partnerships help SOC teams achieve speed, accuracy, and scale that were once out of reach. Explore the future of SOC in the AMP’d Sessions video series. Security operations centers (SOCs) have long been stuck in a reactive, overwhelmed state. Analysts are swamped with alerts.

The Art of Stronger Passwords in the Age of AI

Passwords are the most common form of authentication, the classic “something you know.” They remain the most widely used method of securing accounts around the world. Research shows that about half of all applications still rely on passwords alone, and only about 12 percent of people use a unique password for every application. The problem is that humans can only remember five to seven passwords on average, yet most of us juggle seventy to one hundred online accounts.

Debunking Three Critical Security Myths

Being compliant doesn’t mean you’re secure. Achieving and maintaining CMMC compliance may demonstrate conformance and look good on paper, but it does not guarantee protection. Too often, government contractors check the boxes, pass the audit, and assume their job is done and they’re protected. Then a real-world attack happens—and the so-called “protections” fall apart. The defenses that met the standard weren’t built to stop real threats.

The Human Factor in Cybersecurity: How to Reduce Risk, Build Culture, and Strengthen Resilience

In today’s cybersecurity landscape, one thing remains constant: humans are both our greatest asset and our biggest risk. Despite increasingly sophisticated technology, human risk, insider threats, and social engineering attacks like phishing,continue to lead the charge when it comes to successful breaches.

CloudCasa and SUSE Storage: A Cost-Effective Disaster Recovery Solution for Kubernetes and SUSE Virtualization

CloudCasa by Catalogic and SUSE have partnered to deliver a new disaster recovery solution for Kubernetes and SUSE Virtualization environments. This joint approach combines CloudCasa’s Kubernetes-native backup and recovery platform with SUSE Storage (a.k.a. Longhorn) and its Disaster Recovery Volumes feature. This provides a resilient, storage-driven DR strategy that reduces cost, complexity, and recovery times.

What You Need to Know about the Comcast Data Breach

Comcast is a global powerhouse as one of the foremost telecommunications and media conglomerates. It was established in 1963 as a small cable operator in Mississippi. Comcast’s mission focuses on connection through broadband television and film. Besides being the largest home internet service in the United States, it owns large media platforms like NBC-Universal and Universal Pictures.

Privileged Session Management (PSM): How It Strengthens Data Security

A single negligent click, command, or keystroke by a privileged user can let cybercriminals enter your network. This is where privileged session management (PSM) comes in. PSM enables you to monitor high-risk sessions and detect suspicious activity in real time, preventing insider and external threats from going unnoticed. In this article, we explain why PSM is critical in cybersecurity and how it can protect your sensitive data from threats.

PCI DSS 4.0.1 Checklist (2025): Automate 6.4.3 and 11.6.1

PCI DSS 4.0.1 became mandatory on March 31, 2025, bringing in 47 new requirements that fundamentally changed how compliance works. Organizations that treated PCI as an annual audit exercise now face a standard that expects real-time visibility into payment pages. Requirements 6.4.3 and 11.6.1 are the most impactful additions, which require real-time visibility into scripts and payment page changes. A spreadsheet updated quarterly can’t deliver that.

Weekly Cyber Security News 02/10/2025

Let’s catch up on the more interesting vulnerability disclosures and cyber security news gathered from articles across the web this week. This is what we have been reading about on our coffee break! Ouch. Really ouch. Just a hop and a skip away: I suppose it is fair to point out that you need physical access to perform this. Hard, but not impossible: A win is a win.

Stripe OLT Achieves Microsoft Cloud Security Specialisation

Stripe OLT has achieved the Microsoft Cloud Security Specialisation, strengthening our position as one of the UK’s leading IT and Cyber Security providers. This certification – as well as our prior Microsoft Threat Protection Advanced Specialization certification – demonstrates our proven expertise in securing cloud environments with Microsoft’s advanced security tools.