Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest posts

Supercharging Vendor Risk Management: Vanta acquires Riskey

Today, we're taking a big step toward making trust management even easier for our customers: Vanta has acquired Riskey, a company leading the way in real-time third-party risk monitoring. Their continuous vendor monitoring and alerting will soon be part of Vanta’s Vendor Risk Management product. ‍ Managing vendor risk is more important than ever.

Understanding the Value of Incident Response Retainers

Despite growing investments and advances in cybersecurity, incidents and data breaches continue to increase year over year. From the continuous uptick of vulnerabilities to the rapidly expanding human attack surface, it’s clear that as new risk points appear, threat actors are right there, ready to take action.

The Attack On Browser-Based AI Agents Is Coming

We are working tirelessly on our AI First strategy to better protect both humans and their AI tools. KnowBe4 and its advocates spend a lot of time talking to audiences about AI-enabled threats, and rightly so, as recently covered in dozens of previous posts, including this recent one. This year and next promise to be an explosion of cyber threats better enabled by AI. After years of saying AI attacks would be coming, they are here and will be the way that most cybercrime is committed forevermore.

Modern Platforms Deserve Modern Protection: A Deleted VM's Wake-Up Call

Modern platforms demand modern protection. As organizations adopt Kubernetes, OpenShift, and hybrid cloud environments, legacy backup tools—designed for static, VM-only systems—fall short. Today’s applications span containers, VMs, and dynamic cloud-native services. Protecting OpenShift Virtualization requires more than basic snapshots or namespace-level restores—it requires precision.

Security Operations Center Best Practices to Boost Security & Automate Smarter

Patrick Orzechowski (also known as “PO”) is Torq’s Field CISO, bringing his years of experience and expertise as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. You can find him talking to SOC leaders and CISOs from major brands at cybersecurity events around the world. Running a SOC isn’t for the faint of heart. I should know.

How to protect your Finance and Banking DevOps data

Fintech and banking ranked among the top three most targeted industries in 2024, according to the CISO’s guide to DevOps threats. Real-world incidents underscore this trend: Byte Federal, the leading Bitcoin ATM operator in the U.S., suffered a breach linked to a GitLab vulnerability. Meanwhile, financial software provider Iress and crypto wallet company Ginco were both targeted by threat actors exploiting GitHub repositories. Source: 2024 DevOps Threats Unwrapped.

Outdated Systems and Modern Attacks: Ireland's Cyber Reckoning Has Arrived

Cybercriminals don’t need to be sophisticated. They just need the opportunity—and in Ireland, there’s still too much low-hanging fruit. Many of the vulnerabilities being exploited across Irish networks today aren’t new. They’re years old. Attackers are taking advantage of outdated systems that haven’t been patched, relying on free, off-the-shelf tools to scan for weaknesses—and finding them far too easily. This isn’t a theoretical risk.

Drupal Two factor Authentication (2FA) - Google Authenticator

Having a Second Factor Authentication while logging into any service we use, has become a norm these days. You also get a reward for activating or enabling MFA in some cases - which is something extra I guess. If you'd like to add this extra layer of security to your Drupal site, you're in the right place. In this video, we’ll walk you through how to configure Google Authenticator as the Two-Factor Authentication (2FA) method for End Users as well as Admins in your Drupal site.