Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

January 2024

Rise of the Machines: The 2024 SOC Transformation

We’ve been taught to fear the rise of the machines. But what if machines taking over is a good thing? Leonid Belkind, our CTO and Co-Founder, sat down with Brittney Zec, our Senior Social Media & Content Manager to share insights on how AI-driven hyperautomation addresses the existential challenges SOC analysts face.

Introducing Step Builder

Introducing Step Builder! Here at Torq, we just launched a new feature that takes the manual work out of building steps and eliminates the need for advanced coding expertise. And you can build custom steps in just minutes with a few button clicks - or a wave of a magic wand! Now in GA, Step Builder extends Torq’s already impressive list of no-code capabilities. It gives Torq users the ability to quickly and easily create custom content without the need to code, making your options for integration truly limitless.

Step Builder: One Giant Leap for No-Code Capabilities

No-code support should be just that – the ability to build automations without coding. At Torq, we continually work to extend the out-of-the-box no-code automation features available in our platform. That’s just what we’re doing with Step Builder, a new no-code feature that is now in GA. Step Builder gives Torq users the ability to quickly and easily create custom content without the need to code, making your options for integration limitless.

Torq + Abnormal: Key Use Cases for More Secure Email

At Torq, we like to say “if it talks, we can connect to it.” Our limitless integrations are what set us apart from the pack. Our hyperautomation platform connects to any system seamlessly, no matter its complexity. It’s our open architecture that empowers this dramatic unification of your tech stack, and lets you maximize your security investment while enhancing efficiency and effectiveness of your security operations.

How To Automate Incident Response with SentinelOne and Torq

One of the superpowers of the Torq Hyperautomation platform is the ability to integrate with anything. We team up with leading security vendors to combine forces to create automations that make SOC analysts’ lives easier while also improving their organizations’ security posture. In this post, we’ll talk about how the enterprise-grade Torq Hyperautomation platform integrates with SentinelOne to level up your organization’s SOC workflows with autonomous incident response.

How To Automate Recorded Future With Torq

One of the superpowers of the Torq Hyperautomation platform is the ability to integrate with anything. We team up with leading security vendors to combine forces to create automations that make SOC analysts’ lives easier while also improving their organizations’ security posture. In our latest blog series, Hyperautomation Cheat Codes, we look at some of Torq’s key partners and highlight some of the automations that we pair up on.

How to Automate Cloud Security with Torq and Wiz

One of the superpowers of the Torq Hyperautomation platform is the ability to integrate with anything. We team up with leading security vendors to combine forces to create automations that make SOC analysts’ lives easier while also improving their organizations’ security posture. In our latest blog series, Hyperautomation Cheat Codes, we look at some of Torq’s key partners and highlight some of the automations that we pair up on.

Evade the SecOps Black Hole: A Five-Tier Approach to a Hyperautomated SOC

There’s a term to describe what happens to something that gets sucked into a black hole: “spaghettification.” The gravitational pull of a black hole is so forceful, that it is believed to stretch and compress objects into long thin shapes resembling spaghetti. SOC analysts spend their days trying to avoid being sucked into the black hole of overwhelming security events and alerts. They’re fighting to not be spaghettified.

Automating Extension Risk Assessment and Permissions

Browser extensions are a classic shadow IT concern. Assessing the reputation and security of a browser extension is crucial before installing it on a company computer, as extensions often have wide-ranging permissions that could be abused for data theft or other malicious activities. In an open environment style company, extensions generate significant shadow IT risk that needs to be managed and addressed.

Escape Python's Stranglehold With AWS CLI

One thing we’ve consistently heard from our customers is that using legacy SOAR solutions to build AWS automations and workflows is complex and painfully slow. Why? Because legacy SOAR solutions typically use Python to do anything, and to make Python work for you, you have to be an expert in it. Python is often complex and requires writing scripts to execute most commands.