Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Framing the Modern Conversation Around Digital Transformation and Digital Risk

Following my recent AISA session about security transformation in October, I am digging further into the value that can come from both security and digital transformation, applying security service edge capabilities and zero trust principles as part of the broader digital transformation strategy.. In the first part of this three-part blog series, I am going to take a look at how an understanding of digital strategy and digital risk are foundational to a modern security transformation journey.

5 Data Security Trends You Might Be Missing

Malware is becoming more sophisticated, and it would be impossible to prevent and defend from every single cyber threat out there. As the digital dependence of enterprises grows in tandem with the enterprise’s growth, we at Rubrik are seeing some consistent trends that can be mapped to their exacerbating cyber risk. In today's competitive landscape, it is even more important to secure your data to defend against cyber attacks.

3072-bit Key Length: Additional Strength to Code Signing Certificate

As data is becoming a critical asset and data breach incidents are increasing, the software is becoming a primary factor for both. And for securing it, Code Signing Certificate is a primary component software publishers use. Developers have recently been utilizing certificates with a 2048-bit key length. But, in 2021, a new policy was enacted, directing CAs to issue Code Signing Certificates with a 3072-Bit Key Length. The primary aim of defining such a standard was to strengthen security.

Endpoint protection - the ultimate guide in 2023

Calling all enterprises, endpoint management is changing. New endpoint protection platforms & AI-powered solutions are a game-changer for companies looking to enhance their security capabilities and remain bulletproof. The worst of the pandemic appears to be behind us; however, enterprises are still adjusting to the post-COVID new normal. For many industries, remote work and the hybrid office remain essential adjustments that are not going back to normal.

Stories from the SOC - Phishing for credentials

Humans are considered the weakest link in cybersecurity. No matter how much a company invests in firewalls, antivirus, and other security software to detect, deter, and prevent attacks humans will always be the main vectors for compromise. If no adequate user-security training is provided within the organization, they will always be at risk. Phishing is one of the oldest cyber-attacks yet one of the most used by attackers due to its effectiveness and low cost.

Torq Announces Advisory Board Featuring Global Cybersecurity Visionaries

Torq is extremely proud to announce the formation of the Torq Advisory Board, a group of some of the world’s most respected cybersecurity professionals, including several industry-leading CISOs and heads of information security. All of our advisors have made major impacts in cybersecurity for their companies, and for the industry at large.

Torq's No-Code Security Automation Solution Now Available in AWS Marketplace

Torq is proud to announce the immediate general availability of its no-code security solution in AWS Marketplace, the curated digital catalog with thousands of software listings from independent software vendors that make it easy to find, test, buy, and deploy software that runs on Amazon Web Services (AWS).

Lookout ZTNA Named an Overall Leader in KuppingerCole Leadership Compass

Zero trust, if implemented well, is recognized by the industry as the best way to support remote and hybrid work, especially as workers everywhere connect to SaaS applications to stay productive. But securing an entire organization goes way beyond SaaS apps. Legacy apps running on-premises or in private clouds are still critical for many organizations, especially for those who have made hefty investments in storage and network appliances to support these important applications.

Mobile Device Forensics: Challenges, Threats, & Solutions

Mobile forensics is the process of accessing, recovering, and analyzing digital evidence from mobile devices using a court accepted methodology. The information that can be gleaned from a criminal’s phone is highly valuable. That’s why mobile forensics and digital forensics as a whole are valuable assets for law enforcement and intelligence agencies worldwide.

Building a World-Class eSIM Registration Process

Telcos are part of the vital infrastructure that serves as a forerunner for the rest of the industry as their digital environments change. Many major telecommunications companies have large retail infrastructures that are purpose-built to onboard new customers in shops, but the retail industry has been harmed over the years by security concerns and the demand for personal involvement at every stage of onboarding. This influences their capacity to effectively grow their user base.