Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

How to Track Employee Time Away from the Computer (Idle & Active Time)

The time that employees spend away from the computer is known as Idle Time or Passive Time. With CurrentWare’s employee computer monitoring software solutions you can… Book a Custom Demo Learn More Want to learn more? In this article you will learn the difference between Active Time and Idle Time, how to track your employee’s Idle Time with CurrentWare’s system Idle Time tracker software, and the best practices for monitoring the Idle Time of employees. Table of Contents.

Reco + Torq: Dynamic SaaS Security, Fully Automated

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Torq AMP spotlights the partners redefining what’s possible in security operations. Each partner brings a unique strength that seamlessly extends Torq’s autonomous SOC platform. Together, these partnerships help SOC teams achieve speed, accuracy, and scale that were once out of reach. Explore the future of SOC in the AMP’d Sessions video series.

The Australian startups guide to ISO 27001

Not sure whether your Aussie startup needs to obtain an ISO 27001 certification? ISO 27001 isn’t legally required, but if you plan on trading internationally or have potential customers who are international, many organisations won’t even open conversation with you if you don’t have an ISO 27001 certification. ‍ To put a long story short: if you collect, store, transmit, or process data in any way, you may want to consider it.

The 9 Best Endpoint Security Solutions

Endpoint security solutions are specialized software designed to protect endpoint devices like computers, mobile phones, and tablets from cyber threats. These solutions prevent, detect, and respond to attacks by managing the security of these devices across the network. But with so many different endpoint security solutions available in the market, how can you know which is the right fit for your endpoint security strategy?

Mend.io + Wiz: A New Code-to-Cloud Integration for Accurate, Context-Driven Risk Prioritization

Today, we’re excited to announce the availability of Mend.io’s new integration with Wiz, delivering a powerful Code-to-Cloud security workflow for joint customers. By bringing Mend SAST’s high-accuracy code findings directly into the Wiz platform, organizations can now unify code-level risks with cloud posture, runtime context, identities, and infrastructure—unlocking the complete picture needed to prioritize and remediate risk with confidence.

How Generative AI is Changing the DLP Landscape

Generative AI has revolutionized productivity, but it has also introduced a new class of data risk that legacy DLP tools simply can’t see. From engineers pasting source code into ChatGPT to marketers rewriting strategy docs, sensitive IP is leaving the browser through "Shadow AI" channels daily. Learn why traditional pattern matching fails against LLMs and how a data lineage approach secures AI usage without halting innovation.

What is VoIP and How Does it Work?

Your phone rings. The number looks local, even familiar - so you answer. But within seconds, you're being asked to “verify your bank account” or “reset your login credentials.” Sounds suspicious? It is. That call likely came from a VoIP number, which is not a regular phone line. VoIP (Voice over Internet Protocol) lets anyone make calls over the internet, not just through mobile networks or landlines.

Why Account Takeover Is a CX Problem, Not Just a Security One

Account takeover is usually and unsurprisingly approached as a security incident, yet much of the customer impact begins earlier in the journey, long before security teams detect or analyse the event. When users face friction, lockouts, or unexpected changes to their accounts, trust starts to erode. This makes the account takeover impact on customer experience a major determinant of brand trust and loyalty.

Defining and Defending Against a Zero Day Attack

Unexpected attacks are the hardest to fend off. In the realm of cyber, Zero Day vulnerabilities are among the greatest risks, as these software flaws are unknown and exploited before a fix is available, potentially compromising the thousands of organizations that are unwittingly using vulnerable software.