Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation

Friday Flows Episode 20: Regularly Update Insecure AWS EC2 Security Groups

Launching an AWS EC2 instance can be done in seconds, but are they being set up securely for success? In today's Friday Flows, Michael Tolan helps us celebrate the 700th Tines Story Library addition with a look at a customer submitted workflow to audit and remediate default security groups for virtual machines in AWS.

Friday Flows Episode 19: Manage CrowdStrike IOCs in Slack

Analyst’s often take in IOCs from many different sources and manually copy & paste them into security tools to search for them across environments or add them to blocklists. This can be time-consuming & repetitive. This Friday Flows features a workflow that utilizes APIs to easily manage IOC’s in CrowdStrike & collaborate with peers in Slack.

The 9 best security podcasts, according to practitioners

Security teams are busier than ever, so it’s no surprise that practitioners are using podcasts to keep up to date with cybersecurity news, ideas, and tools. The data backs this one up - according to the 2023 Voice of the SOC report, 83% of security professionals listen to at least one security podcast. So which podcasts are practitioners listening to? Our report, which surveyed 900 security professionals in the US and Europe, identifies 9 frontrunners.

Rise of the Machines: The 2024 SOC Transformation

We’ve been taught to fear the rise of the machines. But what if machines taking over is a good thing? Leonid Belkind, our CTO and Co-Founder, sat down with Brittney Zec, our Senior Social Media & Content Manager to share insights on how AI-driven hyperautomation addresses the existential challenges SOC analysts face.

Introducing Step Builder

Introducing Step Builder! Here at Torq, we just launched a new feature that takes the manual work out of building steps and eliminates the need for advanced coding expertise. And you can build custom steps in just minutes with a few button clicks - or a wave of a magic wand! Now in GA, Step Builder extends Torq’s already impressive list of no-code capabilities. It gives Torq users the ability to quickly and easily create custom content without the need to code, making your options for integration truly limitless.

Step Builder: One Giant Leap for No-Code Capabilities

No-code support should be just that – the ability to build automations without coding. At Torq, we continually work to extend the out-of-the-box no-code automation features available in our platform. That’s just what we’re doing with Step Builder, a new no-code feature that is now in GA. Step Builder gives Torq users the ability to quickly and easily create custom content without the need to code, making your options for integration limitless.
Featured Post

Breaking the cybersecurity automation logjam won't break the bank

Right now, to boost efficiency and achieve economies of scale, businesses want to automate as much as possible. In back office processes, approaches like Robotic Process Automation (RPA), for example, are now increasingly standard and are expected to be a $20bn-plus market by 2030. In parallel, enterprises are looking to ChatGPT and Generative AI to help them speed up everything from creating marketing brochures to drug discovery.

Torq + Abnormal: Key Use Cases for More Secure Email

At Torq, we like to say “if it talks, we can connect to it.” Our limitless integrations are what set us apart from the pack. Our hyperautomation platform connects to any system seamlessly, no matter its complexity. It’s our open architecture that empowers this dramatic unification of your tech stack, and lets you maximize your security investment while enhancing efficiency and effectiveness of your security operations.

Europe's Regulatory Environment to Drive Automation in GRC

The past decade has seen governments around the world introduce significant new legislation covering data, cybersecurity, and technology. This has been part of a sustained effort to regain some influence over big tech and impose good governance practices on how businesses capture, protect, and manage data. This shift towards greater regulation has been largely led by the EU, which implemented the General Data Protection Regulation (GDPR) in 2018.