Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Emerging Trends in Wage and Hour Litigation: What You Need to Know

Wage and hour litigation has seen rapid evolution in recent years. With new legal developments and shifts in the workplace, businesses must stay vigilant to avoid noncompliance. This article explores the key trends and provides practical guidance for employers.

How to Automate Cloud Security with Torq and Wiz

One of the superpowers of the Torq Hyperautomation platform is the ability to integrate with anything. We team up with leading security vendors to combine forces to create automations that make SOC analysts’ lives easier while also improving their organizations’ security posture. In our latest blog series, Hyperautomation Cheat Codes, we look at some of Torq’s key partners and highlight some of the automations that we pair up on.

Cybersecurity operations in 2024: The SOC of the future

With the democratization of computing comes attack surface expansion. According to Gartner, 91% of businesses are engaged in some form of digital initiative, and 87% of senior business leaders say digitalization is a priority. 89% of all companies have already adopted a digital-first business strategy or are planning to do so.

*nix libX11: Uncovering and exploiting a 35-year-old vulnerability - Part 1 of 2

The JFrog Security research team has recently discovered two security vulnerabilities in X.Org libX11, the widely popular graphics library – CVE-2023-43786 and CVE-2023-43787 (with a high NVD severity CVSS 7.8). These vulnerabilities cause a denial-of-service and remote code execution. X11’s latest versions contain fixes for these vulnerabilities.

5 Cybersecurity Resolutions for Small Businesses in the New Year

Small businesses are not immune to cyberattacks. Many cybercriminals target smaller-size organizations because they often operate on a lower cybersecurity budget and have less infrastructure to protect the company’s data, making them easier to attack. This targeting by cybercriminals is widespread, as demonstrated by an ITRC study which reveals that 73% of small businesses state they have encountered cybersecurity problems over last year.

Navigating the Shift: From Vulnerability Management to Continuous Threat Exposure Management

In the rapidly evolving cybersecurity landscape, organizations face an ever-increasing barrage of threats. Traditional vulnerability management, while foundational, often falls short in proactively and continuously identifying and mitigating threats. This necessitates a paradigm shift towards Continuous Threat Exposure Management (CTEM), a more dynamic approach that aligns with the complexities of today’s digital environments.

Red Teaming in the Cloud: A Shift in Perspective

Cloud adoption is exploding, and rightfully so. Businesses are seeing the value of improved agility and efficiency when leveraging public cloud, resulting in 60% of all corporate data globally being stored in the cloud in 2022. As such, securing the cloud is becoming an increasingly important skill for defensive security teams, ergo red teaming the cloud is becoming increasingly important for us offensive security teams too.

Ensuring Microsoft 365 Data Security and Compliance with Veeam

As of 2023, Microsoft Office 365 is utilized by over a million companies globally, according to a recent Statista report. It has become an indispensable tool for organizations as they adapt to hybrid workforces and a global economy, leveraging its collaborative power and the need for a robust data protection strategy. At the core of Microsoft 365’s security framework lies the Shared Responsibility Model, delineating the responsibilities of Microsoft and organizations using their services.

The Need For a Shift Up Strategy, Using CRQ for Resilience, Part 2

Conducting business, no matter in which industry, is innately risky. Historically, some of the primary drivers of this business risk included natural disasters, hardware and inventory theft, legal and compliance regulations, and economic downturns. However, in the midst of the digital age, cyber threats loom as one of the most prominent forms of organizational uncertainty, housing the potential to cause trillions of dollars in damages.