Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

What You Need to Know About NERC CIP Compliance

Utility companies are increasingly being targeted by cybercriminals. Although the highest profile utility cyber attack in recent memory was the May 7 ransomware attack on Colonial Pipeline that caused gas shortages on the East Coast, power companies of all kinds are popular with criminals for a reason: they can’t afford a shutdown and they have the money to pay a ransom.

Explore and experience cybersecurity from a consulting point of view

The demand for highly qualified staff with the right skill sets along with hands on experience is not new news in cybersecurity. However, the difficulty of gaining experience prior to meeting the objectives for interviews for entry level jobs can be a tough hill to climb. Ample resources available online, including the ability to set up in-home labs, which helps.

Leveraging MISP and TheHive When You Create Your CTI Practice

Many CISOs I speak with across Europe tell me their cybersecurity teams rely on two, primary open-source platforms within their security operations (SecOps). The first is Malware Information Sharing Platform (MISP), that allows the storing and sharing of indicators of compromise (IoCs) with other MISP users. The second is TheHive, designed for security incident response (IR).

Privacy and the future of email - an interview with Ricardo Signes of Fastmail

What does the future of email look like? How can you be a better digital citizen? And, why is online privacy so important? We answered all these questions and more when we sat down with Ricardo Signes, Chief Technology Officer at Fastmail – a privacy focused email service with no tracking and no ads. Check out the highlights below, or listen to the full interview with Ricardo on our podcast, Random but Memorable.

Team Spotlight

The #LifeatTorq Team Spotlight is a Q&A series dedicated to the talented and generally kick-ass team that form the foundation of our growing company. Today we are spotlighting Ori Seri, an R&D team leader at Torq, based in our Tel Aviv office. Tell us a bit about your career path before Torq. Ori: I was an officer in an Israeli Defense Forces (IDF) Intelligence unit early on. Then I worked at a startup called Nuweba, where I began as an engineer, and later led an R&D team there.

Security Posture of the ASX 200 // Webinar

Are Australian businesses prepared for cyberattacks? We assess the security posture of the ASX 200. In our latest research, we assessed the scale of cyber risk in Australia by examining the ASX 200, the index of the top 200 public companies in Australia by market capitalization. Join Greg Pollock, VP Cyber Research, and Josh Kiff, VP Sales, as we explore the eye-opening findings.

7 Steps to Reducing the Risk of Insider Threats While Offboarding an Employee

There’s a certain type of data loss that presents a unique challenge to the HR department- INSIDER THREATS. Although it accounts for a small percentage of total data breaches, the damage done by an insider is far more detrimental to your business. Follow some or all of the steps listed to combat the exodus of company data that too often happens when employees end their time with a company.

Sumo Logic brings full coverage to modern IT and SecOps workflows with ServiceNow

Modern, digital-first businesses rely on agile, optimized IT and security operations teams to effectively monitor and secure their complex applications, infrastructure and workflows that ultimately drive increased productivity and improved user experiences. Implementing a high-performance, end-to-end process to achieve these positive outcomes can be challenging as it oftentimes requires combining multiple data silos and technologies for different teams with contrasting roles and responsibilities.