Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Risk Based Authentication Returns to the Forefront

Risk based authentication pairs login events with behavioural signals, stepping up security when anomalies appear in how users work. As organisations onboard part time staff and gig workers, continuous authentication and smarter policies help balance security with convenience for a diverse workforce.

Torq HyperAgents: The Next Evolution of Agentic SecOps

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Tal Benyunes was one of the first engineers at Torq and now leads Product for HyperAgents, Torq’s agentic AI initiative. Shaped by early career roles in mission-critical cybersecurity environments and leading companies, Tal brings deep technical expertise and strategic insight to the development of AI Agents.

From Pressure to Potential: Turning Compliance into Opportunity with MDR

The pressure to meet cybersecurity and data protection rules keeps growing. more attacks, more remote work, and more connected systems have expanded the attack surface for every business. Regulators and customers now expect organizations to prove they can monitor, detect, and respond to threats at all times. For many small and midsized businesses, that level of coverage is hard to achieve without dedicated staff and around-the-clock operations.

Zero Trust That Actually Works: How Reach Maps NIST & CISA Frameworks Into Real Security Gains

Most organizations don’t lack intent; they lack a clear understanding of what’s deployed today, what gaps matter most, and how to turn guidance into enforceable baselines. Reach connects to your existing security tools and automatically maps configurations to established maturity models like CISA’s Zero Trust Maturity Model 2.0 — producing a real-time posture assessment across identity, device, endpoint, email, and network with no surveys or guesswork.

November Release Rollup: Contract Analyst, Deep Research Agent, and More

We’re excited to share new updates and enhancements for November, including: For more info on these updates, check out the list below and dive into the detailed articles. In addition, this month we’re excited to announce the Egnyte Community. Join the Egnyte Community to get the latest updates, chat with experts, share feedback, and learn from other users.

Intel Chat: AI takes over entry work, AI cyber espionage, JackFix & weaponizing Blender files [272]

Support our show by sharing your favorite episodes with a friend, subscribe, give us a rating or leave a comment on your podcast platform. This podcast is brought to you by LimaCharlie, maker of the SecOps Cloud Platform, infrastructure for SecOps where everything is built API first. Scale with confidence as your business grows.

Why a Cloud SIEM Just Makes Sense

The irony of being an adult working in IT and security is that where having your head “in the clouds” was inappropriate as a child, today most of your activities require you to have your head in the cloud. Organizations moved their business operations to the cloud because they could achieve various operational benefits, like improved collaboration and reduced costs. Yet, many companies still maintain an on-premises SIEM.

Best Application Security Testing Providers: Top 7 in 2025

Top application security testing providers include Mend, Invicti, and Black Duck, offering a range of services like Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA). Some providers also provide specialized services like securing AI applications and vulnerability management.

UK's New Cyber Bill Fortifies Defenses

The services we rely on daily—healthcare, transport, energy, and water—are the backbone of our society. An attack on these systems can cause massive disruption, affecting everything from hospital appointments to the power in our homes. In response to this growing threat, the UK government introduced the Cybersecurity and Resilience Bill on November 12, 2025, a landmark piece of legislation designed to significantly strengthen the nation’s defenses against cyber-attacks.

Solving Human Risk: Automate Governance and Prioritize Action

In our previous blog post, “Closing the Visibility Gap,” we established that visibility is the first step in managing the modern human attack surface; however, prioritizing that data is the next major concern for any CISO. Prioritization of human risk data is critical, as it directly informs governance and effective high-level decision-making. Simply put, prioritization is crucial to driving action.