Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Simplify SOC Reporting with Customizable Dashboards

SOC teams often wrestle with clunky, siloed reporting tools that lack real-time, connected capabilities. Analysts end up buried under a mountain of fragmented xdata, forcing teams to spend valuable hours tracking down answers to their most pressing questions, rather than tackling threats head-on. At Torq, we feel SOC reporting should be your power move, not a painful process.

Introducing AlgoSec Cloud Enterprise: Your Comprehensive App-First Cloud Security Solution

Is it getting harder and harder to keep track of all your cloud assets? You're not alone. In today's dynamic world of hybrid and multi-cloud environments, maintaining clear visibility of your IT infrastructure has never been more complex. 82% of organizations report that lack of visibility is a major factor in cloud security breaches. Traditional tools often fall short, leaving potential security vulnerabilities exposed and your business at risk. But there's good news!

Meet Spark, an AI Test Agent That Autonomously Uncovers Vulnerabilities

We’re thrilled to announce the general availability of Spark, an AI Test Agent that lowers the entry barrier to white-box fuzz testing. In this blog, we explain how Spark works and share the main results from its beta testing that prove its effectiveness.

The New Cato Trust Center: An Essential Step for Today's Interconnected Enterprise

Transparency in security practices is essential for building trust in today’s interconnected digital world. Organizations that openly share certifications, audit reports, and policies demonstrate a commitment to safeguarding data and adhering to standards. This openness fosters stronger partnerships and sets a benchmark for accountability.

Best Practices for Securing Your SaaS Environment

Can you imagine a modern working world without Software-as-a-Service (SaaS) applications? Productivity, communication, and project management solutions have transformed the modern workplace, enabling hybrid and remote working, helping to cut costs, and offering unprecedented opportunities for collaboration and innovation. Without them, the business world would grind to a halt.

5 Cybersecurity Trends for 2025: Preparing for a Year of Elevated Risk and Accountability

As security and risk leaders look to the year ahead, they face a rapidly evolving and dynamic set of challenges. The implementation of more stringent cybersecurity standards—such as the U.S. Security and Exchange Commission’s (SEC) rules and the EU’s Network and Information Security Directive 2 (NIS2)—has placed boardroom scrutiny at an unprecedented level.

Industry Optimism Grows as TSA Proposes Balanced Cybersecurity Measures

The Transportation Security Administration (TSA) has proposed new rules requiring those under its jurisdiction to follow specific cyber risk management (CRM) requirements, report cybersecurity incidents in a certain timeframe, and address physical security concerns. This is positive news for the transportation industry, as hundreds of attacks have been leveled against the sector. These attacks have the potential to impact the supply chain, create chaos, and endanger human lives.

How MSPs Can Build Lasting Client Relationships

Clients are the heart of any business, be it service based or product based. But clients play a more important role in service-based business due to the consistent to and fro contact. For Managed Service Providers, building a lasting relationship with clients will take efforts but it is the foundation of a successful MSP business. Here’s how you can strengthen your client relationships.

Trustwave SpiderLabs December 2024: Phishing and Email Security Insights

There was some good, bad, and neutral news when it comes to email threats in December 2024, according to new data compiled by Trustwave SpiderLabs’ MailMarshal email security team. Trustwave SpiderLabs’ PageML, which is used in MailMarshal’s Blended Threat Module (BTM), flagged 19 million malicious URLs for VirusTotal, of which 2.2 million detections were only picked up by Trustwave. The team reported that 25% of all incoming spam emails were in fact phishing attacks of some type.

Four Ways Teleport Overcomes the Limitations of VPNs and Bastions

As organizations evolve to embrace cloud-native architectures and distributed teams, the limitations of legacy access solutions like virtual private networks (VPNs) and bastion hosts have become apparent. Once reliable for securing static, on-premises environments, these tools do not scale well for securing modern infrastructure, are expensive to maintain, increase security vulnerabilities, and can hinder regulatory compliance.