Portland, OR, USA
Jun 20, 2022   |  By Dan MacKenzie
Blocking access to certain URLs is a simple, effective strategy for protecting users and the network. But, in a world where new and increasingly sophisticated scams seem to appear almost weekly, the task of maintaining that list can become overly burdensome when performed manually. Torq offers a number of ways to automate URL blocklist management, reducing manual effort and speeding up response to new threats.
Jun 16, 2022   |  By Dan MacKenzie
Contractors, freelancers, and other temporary workers have become essential parts of the modern enterprise. For IT and security teams, these individuals present unique challenges compared to full-time workers—and potential risks. The ‘offboarding’ process for these contractors is often less formal than bringing them on. Meaning, many just stop using their entitlements and accounts without actually closing them. These dormant accounts can pose serious risks to the organization.
Jun 7, 2022   |  By Dan MacKenzie
Right now, much of the security world is focused on the RSA conference in San Francisco, California. The Torq team has been preparing for the event for months—and we’re thrilled that we finally get a chance to talk about Torq in person with other security professionals.
Jun 6, 2022   |  By Vince Power
Regardless of which role a person has in an organization, they will always need access to one or more databases to be able to perform the functions of their job. Whether that person is a cashier at McDonald's or a technical account manager supporting a Fortune 500 company, data entry and retrieval is core to the services they provide.
May 29, 2022   |  By Torq
Today’s developers move at increasingly rapid speed – making it more critical than ever to identify and resolve code vulnerabilities early in the software development lifecycle. By tackling security early – instead of waiting until testing and deployment – engineering teams can reduce unnecessary patching and maintenance cycles, reduce risks, and ensure timely delivery of new features.
May 23, 2022   |  By Dan MacKenzie
Whether for managing remote teams, supporting ‘bring your own device’ (BYOD) policies, or simply another layer in a data protection strategy, services like Microsoft Intune offer greater control over the devices on your network. But using the data from these services often requires tedious prep work, and this process is likely repeated multiple times a week, if not daily. Tedious, repetitive, structured: these are all signs that a process can and should be automated.
May 18, 2022   |  By Dan MacKenzie
The consensus on the state of cybersecurity professionals tends to fall somewhere between “burdened by high volumes of responsibility” and “dangerously understaffed and suffering from unhealthy levels of stress,” depending on how optimistic your source is.
May 13, 2022   |  By Faith Kilonzi
In cloud-native organizations and software as a service (SaaS) businesses, cloud security automation is becoming a must-have feature. You can’t stay ahead of threats across several levels of your cloud environment using manual procedures alone, and you can’t rely exclusively on cloud providers’ security technology, which doesn’t operate across different clouds and lacks advanced automation features.
May 9, 2022   |  By Faith Kilonzi
Toil — endless, exhausting work that yields little value in DevOps and site reliability engineering (SRE) — is the scourge of security engineers everywhere. You end up with mountains of toil if you rely on manual effort to maintain cloud security. Your engineers spend a lot of time doing mundane jobs that don’t actually move the needle. Toil is detrimental to team morale because most technicians will become bored if they spend their days repeatedly solving the same problems.
May 2, 2022   |  By Vince Power
As we previously discussed in the Automating Your Cloud Security Posture Management (CSPM) Response blog post, CSPM is a vital component in any environment leveraging cloud services. Whether you are using a single cloud or are in a multi-cloud scenario, the complexity of these cloud platforms is constantly expanding. Staying on top of new changes in policies and functionality to ensure that you are maintaining a secure environment is daunting - and almost impossible to do without automation. No one has the resources to spend on maintaining a large team of cloud specialists who just audit everything that is in use.
Jun 27, 2022   |  By Torq
Automation can transform how security teams operate, but knowing where to start can be the most difficult part. At Torq, we help teams make these decisions every day. Using our no-code automation platform, security teams can be up and running with their first workflow in as little as a few hours. The secret to making it work is our template library. This 45 minutes webinar will show you how to begin an automation program from scratch, using Torq.
May 2, 2022   |  By Torq
It’s been reported that 88% of all data breaches are caused by human error. Even the most security-aware employees are still susceptible to mistakes, especially when it comes to social engineering and the ubiquitous phishing email.
Mar 31, 2022   |  By Torq
As recent vulnerabilities like log4j have shown, having a standardized approach to identifying vulnerabilities and applying patches is essential to organizations looking to keep their systems safe from exploits. Whether it's preventative maintenance or responding to new 0-days, a continuous vulnerability management program ensures that security teams can rapidly identify risks and work cross-functionally to deploy patches and verify successful remediation.
Mar 4, 2022   |  By Torq
For today's digital-first organizations, a Cloud Security Posture Management Platform (CSPM) is a critical part of a successful cybersecurity program. CSPMs can identify risks across cloud environments in real-time, ensuring security, IT and DevOps teams are alerted to critical gaps in your security posture.
Feb 8, 2022   |  By Torq
Security teams are struggling to keep up with the increasing number of attack surfaces and the demands on remediating those attack surfaces in real-time. Security automation is the key to unlocking your security team’s productive potential, but traditional SOAR platforms (Security Orchestration, Automation, and Response) are complex and can take months of development to implement your first automation response sequence.
Jan 20, 2022   |  By Torq
The challenges and workloads facing today’s security teams are not getting easier, but the response methods of security teams are still manual, utilizing a patchwork of security tools that are not connected nor communicating with each other. What if you could utilize your organization’s most common communication tool (i.e. Slack) to bring security communications and operations into every part of your organization?
Dec 22, 2021   |  By Torq
In this brief video, Torq Field CTO Marco Garcia demonstrates how uncomplicated it is to investigate suspicious activity using Torq.
Jan 10, 2022   |  By Torq
Businesses of all types, and across all verticals, have gone digital-first. This shift enables many benefits, such as greater scalability and speed. But it also amplifies the security and compliance challenges that arise from digital systems. For CISOs, this shift amplifies the need to apply the same level of automation, speed, and business-wide accessibility for security that digitization has brought to other aspects of the business. In short, modern businesses need to adopt a digital-first approach to SecOps itself.
Jan 10, 2022   |  By Torq
The efficiency and scalability that security teams stand to gain from no-code automation is not novel. It's what development teams have been enjoying for years, thanks to the widespread adoption of CI/CD automation tools.

Torq is a no-code automation platform that modernizes security and operations teams. With Torq, frontline security professionals can easily create automated flows that help them respond to threats faster, remediate risks automatically, and deliver better security to their teams.

Torq’s no code automation modernizes how security and operations teams work with easy workflow building, limitless integrations, and numerous prebuilt templates.

Five minutes to powerful security automation:

  • Supercharge your security posture: Respond to threats faster with automatically triggered flows. Remediate risks as soon as they’re detected in your environment.
  • Accelerate security operations: Build flows with a no-code, drag & drop designer — no developers or professional services needed. Easily connect to any tool in your environment to ensure complete protection.
  • Work your way — only faster: Start with automating a single step, expand your flow to complex branches. Best practice templates get you started fast and REST APIs help you customize as needed.
  • Compliant and Secure Platform: Our infrastructure and operations undergo rigorous external audits and meet the highest grade of industry security, privacy and compliance standards.

No-code automation for powerful security.