Want to shape your cyber career? Stefania Chaplin explains why clear communication helps you influence others, align with your goals, and advocate for your role.
Starting today, Egnyte is available through the AWS Marketplace! Our partnership with AWS makes it easier to streamline procurement processes and maximize your technology investments. Read on to discover how our collaboration with AWS simplifies the integration of Egnyte into your existing tech stack, helping you unlock more value from your investment.
The Digital Operational Resilience Act (DORA) and the Revised Network and Information Systems (NIS 2) are two of the latest EU cybersecurity regulations designed to fortify the security posture and cyber resilience of in-scope entities. Both regulations share the same general purpose of increasing their respective sectors' overall transparency and security. Still, their approaches to this goal vary in several key aspects you’ll learn about in this guide.
In our first blog post, “Sysdig Secure-Google Chronicle integration – Why, what, and how“, we introduced the idea of connecting both platforms, highlighting their complementary strengths and providing a high-level overview. Now, we’re taking it a step further—moving beyond theory to focus on practical, real-world applications.
MITRE ATT&CK has become the go-to knowledge base for understanding how attackers operate since 2013. The framework’s 12 tactical categories map out attack stages from original access to final impact. Security teams can spot and block threats at multiple points before any damage occurs. This piece shows how companies can utilize MITRE ATT&CK’s framework to boost their EDR.
Agentic AI is transforming business. Organizations are increasingly integrating AI agents into core business systems and processes, using them as intermediaries between users and these internal systems. As a result, these organizations are improving efficiency, automating routine tasks, and driving innovation. But these benefits come at a cost. AI agents rely on APIs to access data and functionality from underlying systems. Without APIs, AI agents are useless.
Weak passwords are still one of the biggest threats to enterprise security. With 1Password Extended Access Management, IT teams gain visibility into credential risks and the tools to phase out passwords.
Shadow IT is a growing threat as employees adopt unsanctioned SaaS and AI tools that escape IT oversight. With 1Password Extended Access Management, security teams can uncover hidden risks, automate access controls, and guide users toward safer, approved applications.
Patrick Orzechowski (also known as “PO”) is Torq’s Field CISO, bringing his years of experience and expertise as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. You can find him talking to SOC leaders and CISOs from major brands at cybersecurity events around the world.