Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Torq's AI-Native Autonomous SOC Wins Check Point's CPX 2025 Innovation Sandbox Competition

Torq took home the top prize at Check Point’s 2025 Innovation Sandbox Competition during their annual CPX conference in Las Vegas. Chris Coburn, Torq’s Sr. Director of Tech Alliances, faced off against 13 other companies to pitch Torq’s AI-native autonomous SOC to a panel of judges and voting audience.

How AI-Automated Fuzzing Uncovered a Vulnerability in wolfSSL

Despite wolfSSL’s rigorous software testing practices, in October 2024, Code Intelligence—an application security vendor—discovered a potentially exploitable defect in wolfSSL. Remarkably, the potential vulnerability was found without human intervention. The only manual step was executing a single command to trigger autonomous fuzz testing. Watch the video for a live demo of AI-automated fuzzing.

AIOps: Optimize IT Operations and Enhance Security with AI

Businesses must manage IT operations and cybersecurity in the day-to-day and ever-evolving digital world, which is becoming more and more complicated. Cyber threats, system warnings, and the increasing amount of data are too much for traditional IT management techniques to handle. This is where artificial intelligence for IT operations changes the game.

Leveraging Generative AI with DevSecOps for Enhanced Security

AI has made good on its promise to deliver value across industries: 77% of senior business leaders surveyed in late 2024 reported gaining a competitive advantage from AI technologies. While AI tools allow developers to build and ship software more efficiently than ever, they also entail risk, as AI-generated code can contain vulnerabilities just like developer-written code. To enable speed and security, DevSecOps teams can adopt tools to integrate security tasks into developer workflows.

Introducing Sysdig Threat Management: Combating threats in cloud security

Cloud security teams are often faced with an onslaught of noise from their detection tooling, making it nearly impossible to distinguish truly malicious threats from benign behaviors. Many threats will go uninvestigated simply because there aren’t enough analysts for the sheer amount of alerts, leaving organizations exposed to potential breaches.

7 Marketing Strategies to Improve Customer Insights and Engagement

Understanding customers is key to increasing engagement and sales. People interact with businesses in many ways, including social media, websites, emails, and ads. With consumer preferences constantly evolving, businesses must stay ahead by understanding how and where their audience engages.