Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Deloitte & Memcyco Exclusive Panel: The Untold Cost of website and SSO impersonation attacks

Cyber iCON 2024: Event sponsor, Memcyco, and host, Deloitte, present their cybersecurity partnership and market offering that will redefine what “cyber threat intelligence” can and should mean. Alongside exclusively invited partners, they’ll be sharing expert insight and stunning innovations in digital domain protection. This will be a unique platform for industry leaders hungry to fortify cyber threat defenses and exchange ideas while discovering breakthrough strategies and technologies.

Cybersecurity Standards: The Urgent Need for an Evolving Framework || Razorthorn Security

Join me in a candid conversation about the critical need for a robust and evolving cybersecurity framework. In this video, I discuss the challenges faced by well-intentioned individuals who advocate for the creation of a collective and effective group of infosec professionals from diverse backgrounds. Government initiatives often fall short, with the reluctance to invest in a dynamic and continuously improving standard.

Navigating the Chaos: How Forums Keep Us Informed Amid Rapid Changes || Razorthorn Security

Embark on a journey into the fast-paced world of ever-changing landscapes. In the realm of technology and cybersecurity, staying up-to-date is an ongoing challenge. How do we keep pace with the relentless speed of change? Join me in this video as we explore the necessity of forums and communal discussions to stay informed about legislative updates, changes in the cyber threat landscape, and the evolving tactics of adversaries.

Why the future of AppSec is ASPM from Snyk AppRisk

Applications are getting bigger and more complex. With sprawling software supply chains, distributed developers, AI-enhanced productivity, and more technology, deployment, and cloud options than ever securing applications is harder than ever. To enable fast and secure development in this new reality, AppSec needs a comprehensive, proactive approach — one that helps address what matters most to reduce risk. They need to implement ASPM to shift the AppSec paradigm.

Rise of the Machines: The 2024 SOC Transformation

We’ve been taught to fear the rise of the machines. But what if machines taking over is a good thing? Leonid Belkind, our CTO and Co-Founder, sat down with Brittney Zec, our Senior Social Media & Content Manager to share insights on how AI-driven hyperautomation addresses the existential challenges SOC analysts face.

Introducing Step Builder

Introducing Step Builder! Here at Torq, we just launched a new feature that takes the manual work out of building steps and eliminates the need for advanced coding expertise. And you can build custom steps in just minutes with a few button clicks - or a wave of a magic wand! Now in GA, Step Builder extends Torq’s already impressive list of no-code capabilities. It gives Torq users the ability to quickly and easily create custom content without the need to code, making your options for integration truly limitless.