Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Sustainable compliance made easy: Incorporating environmental responsibility into GRC strategies

As we speak about changing the regulatory and environmental landscape, organizations are shifting toward more responsible, sustainable practices not only to abide by regulations but also to build resilience, trust, and competitive advantage. Governance, risk, and compliance (GRC) strategies are evolving by incorporating environmental responsibility, ensuring that compliance is not merely a checkbox activity but a core part of an organization’s overall sustainability practices.

Beyond Agent-Washing: How Torq Delivers True Agentic Automation for Security

Eldad Livni is the Co-Founder and Chief Innovation Officer at Torq. Prior to founding Torq, Eldad co-founded and served as CPO of Luminate Security, a pioneer in Zero Trust/SASE. Following Luminate’s acquisition by Symantec, he went on to act as CPO of Symantec’s Zero Trust/Secure Access Cloud offering. The security industry has a new buzzword problem.

From Fragments to Full Picture: Turning Threat News into Actionable Campaign Intelligence

Consider this scenario: a critical zero-day vulnerability is announced for a popular enterprise software and you, as a threat analyst, are tasked with briefing leadership on which threat actors are exploiting it and how. You start to research and are immediately overwhelmed. One news site reports on a Chinese APT using the exploit, another blog details an Iranian group, and a third report lists CVEs without context.

OCSF for Security Hub: Sumo Logic and AWS speaking the same language

In technology, the proof of a lasting relationship is in the infrastructure — the pipelines, security services, and log plumbing have to work seamlessly together long before anyone sees the outcome. That’s precisely what Sumo Logic and AWS have built. Aligned around open standards like OCSF (Open Cybersecurity Schema Framework), integrated with services like Security Hub and GuardDuty, and connected through shared telemetry, it makes cloud security and observability possible at scale.

Faked Out: How a Fraud IRS Website Fueled a Sophisticated Remote Access Campaign

The BlueVoyant Security Operations Team (SOC) and Threat Fusion Cell (TFC) researchers recently analyzed a sophisticated phishing incident where a user was lured into visiting a fake IRS website to verify a “tax refund”. The scheme was initiated via a phishing email, leading the user to the fraudulent site.

Six workflows every financial services security team should be automating

Security teams in financial services and insurance (FSI) companies have their work cut out for them. These organizations safeguard some of the most important data in the world—making them prime targets for attackers and among the most heavily regulated industries to operate in. Breach costs in finance remain among the highest of any sector, averaging $6.08M per incident in 2024. At the same time, many teams juggle dozens of disconnected systems and legacy platforms.

How to choose compliance audit software: A buyer's guide

With regulatory complexity rising across all industries, managing multiple frameworks and amended regulations simultaneously has become the new security standard. Regular audits and continuous improvement have also become essential, both to ensure ongoing compliance and to strengthen customer trust. ‍ However, manual compliance audits are time- and resource-intensive. Their complexity grows with each new framework, significantly raising the risk of human error and compliance fatigue.