Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Shift in SOC Escalation: From Manual to AI-Powered

Patrick Orzechowski (also known as “PO”) is Torq’s Field CISO, bringing his years of experience and expertise as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. You can find him talking to SOC leaders and CISOs from major brands at cybersecurity events around the world. Every SOC has an escalation process — but not every SOC has one that is truly effective.

Tanium Connector for Microsoft Intune - Tanium Tech Talks #145

Today see how Tanium can quickly synchronize device data from multiple tenants. Bring mobile devices in as native Tanium entities Consolidate multiple Intune tenants into a single view Mobile OS support:,,, etc. Two tiers of RBAC for Intune actions New sensors for Intune device data Sync device data to Super fast from time to configure to seeing data Use an Intune account with read-only access for synchronization.

Ask SME Anything: What is Unified Data Security?

Tired of the data security "alphabet soup"? DSPM. DLP. Protecting data in the AI era shouldn't require a glossary. In this episode of Ask SME Anything, Netskope expert Ankur Chadda cuts through the jargon and breaks down the fundamentals of unified data security, revealing four crucial questions every security professional must be able to answer to effectively protect your data from emerging threats.

Stop Alert Fatigue: Delivering Time and Assurance to the SOC Team

In his talk from Black Hat USA 2025, A10 Networks security expert Jamison Utter challenges the conventional approach to security alerting and automation. He argues against the "magic AI" hype and champions a model where intelligent systems augment human analysts, rather than overwhelming them. Jamison highlights the critical process of filtering security data to deliver real value to the SOC team.

Preparing for the Cyber Security and Resilience Bill (CSRB): Compliance Insights from the Field

I've spent the last few months talking to partners and prospects across EMEA about the upcoming Cyber Security and Resilience Bill, and there's a common theme: everyone knows it's coming, but most aren't sure where to start. The conversations usually begin with "Is this just another compliance checkbox?" and end with "How do we actually implement this without ripping out our entire infrastructure?" Here's what I've learnt from these discussions.

Why Veterans Are Cybersecurity's Secret Weapon

Veterans in cybersecurity are just built different. They show up like a well-timed patch, quietly, decisively, and with an instinct for risk you can't fake. When you've owned mission-critical systems where the blast radius of a mistake is measured in lives, not log lines, you develop a rare sixth sense for risk that you simply can't teach in a bootcamp.

30+ due diligence questions to ask AI vendors in a security review

Introducing third-party AI into your systems can be a milestone for productivity and growth, but it also expands your attack surface in unpredictable ways. If your AI vendors have weak controls, threats like data poisoning and algorithm failure can ripple through your systems.

Navigating the Fog: A Guide to Application Security in the Cloud

The speed of cloud development and the ubiquity of open-source code have created an unprecedented risk surface. For many engineering and security teams, the result is a dense fog of fragmented tools, reactive workflows, and rising software supply chain threats. To move forward, your strategy for application security in the cloud must be proactive, unified, and developer-friendly.

The Next-Level Threat: Defending Against BrickStorm and the 393-Day Dwell Time

A new threat campaign, codenamed BrickStorm and attributed to a China nexus group tracked as UNC5221, has security researchers sounding the alarm. This is a highly sophisticated espionage operation, and its most staggering feature is the adversary’s patience. The astonishing average time they remain inside a victim’s network before being detected is well over a year—393 days to be exact.