Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How Torq Optimizes Agentic SecOps From Detection Through Resolution with Google SecOps

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo The AI SOC is cybersecurity’s fastest-growing category, and for very good reason. Machine-speed threats demand machine-speed responses, and the $82.45 billion market forming around this reality reflects just how urgent that need has become. The Torq AI SOC Platform delivers agentic insights and the ability to streamline action across the full security stack.

The 7 Rs of AWS Application Migration: Choosing the Right Path for Each Workload

Most application migration projects fail the same way: someone picks a single strategy for the entire portfolio, then tries to force every workload into it. Lift-and-shift everything to meet a data centre exit deadline. Refactor everything because someone read a cloud-native manifesto. Retire nothing because no one wants to make the decision. AWS’s 7 Rs framework exists to prevent that.

Cloudflare Just Shipped 20+ Features for AI Agents in One Week

The conversation explores why the Internet and the cloud were not designed for an AI-agent world, and what infrastructure needs to change as software agents begin generating code, running workflows, and interacting directly with online services. Ming and Anni walk through several announcements from Cloudflare’s Agents Week, including new tools for agent infrastructure, memory, developer workflows, AI Gateway, email, artifacts, browser automation, security, and agent-ready websites.

AI Workload Security on GKE: Evaluating Google Cloud Native vs Third-Party Solutions

A CISO running AI agents on GKE has watched three Google product launches in eighteen months — Model Armor, expanded Security Command Center coverage for AI workloads, additions to Chronicle’s curated detection content — and is being asked whether the GCP-native stack is now sufficient. The vendor demos and the Google Cloud blog say yes. The 2 AM analyst experience says something different.

The Zero-Trust Audit: Protecting Financial Intelligence in the Cloud

Digital finance is shifting away from the old way of securing data. The old method relied on a strong perimeter to keep threats out. Once someone was inside the network, they often had free rein to move around. Cloud systems make that perimeter vanish because data moves between different apps and users constantly.

12 Cloud Outages With Catastrophic Effects

There’s no infrastructure that’s always on and immune to all kinds of threats. Even the top providers leave a tiny margin in their Service Level Agreements (SLA), stating 99.999% uptime at most. The cloud, advertised as the universal cure for the problems of legacy on-premises setups, also turned out vulnerable. The most obvious and impactful manifestations of cloud vulnerability are cloud outages.

Quantum Computers Threaten Encryption - Here's the Fix | Sharon Goldberg

What happens to Internet security when quantum computers become powerful enough to break today’s encryption? In this clip from a full conversation on This Week in NET, Sharon Goldberg explains why researchers and companies are preparing for post-quantum cryptography, what could be at risk if current encryption is broken, and why the timeline may be closer than many expected. This clip is from the This Week in NET podcast about the future of encryption, quantum computing, and post-quantum cryptography.