Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Torq HyperSOC is the first Autonomous SOC Platform with Native Model-Context Protocol (MCP) Support

Innovation in cybersecurity technology, particularly in security operations, is advancing at an incredible pace. The past few months have seen a surge in announcements of Agentic AI solutions and SOC Analyst AI Agents, transforming the landscape rapidly. At BlackHat USA 2023, Torq pioneered this space by introducing Socrates, the first AI Agent SOC Analyst. This highlights the remarkable acceleration of AI adoption in cybersecurity and the significant advancements made in a relatively short period.

Broken Cyber Windows Theory

Have you ever walked down a street with broken windows, burnt out cars, graffiti and felt a bit uneasy? There's a reason for that, and it's not just about aesthetics. The Broken Windows Theory, introduced by social scientists James Q. Wilson and George L. Kelling in 1982, suggests that visible signs of crime and antisocial behavior encourage further crime and disorder. But what does this have to do with cybersecurity? More than you might think.

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams

Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsoft’s latest Cyber Signals report. “AI has started to lower the technical bar for fraud and cybercrime actors looking for their own productivity tools, making it easier and cheaper to generate believable content for cyberattacks at an increasingly rapid rate,” the report says.

Drata and 1Password unite to deliver secure, continuous compliance

Compliance without access control is incomplete. Security without continuous compliance is inadequate. With 1Password Extended Access Management and Drata, companies can finally unify these efforts—closing the Access-Trust Gap while accelerating audit readiness, improving security posture, and building trust overall. “Security and compliance are inseparable, especially as SaaS sprawl and AI adoption introduce new layers of complexity and risk,” says David Faugno, Co-CEO of 1Password.

Innovation in Extended Access Management: AI and productivity are changing how we approach cybersecurity

It’s been a year since we announced 1Password Extended Access Management, and in that time, it’s become clearer than ever that we are facing a major shift in how workers use technology to drive productivity. Whether it’s through organizations embracing the use of AI agents or tech-savvy employees independently seeking out any tool or application they need, the way we work has fundamentally evolved. And cybersecurity must evolve with it.

Supercharge your workflow: Use 1Password service accounts and SDKs to secure agentic AI access

AI agents are evolving fast — from helpful assistants to autonomous actors that can browse the web, analyze data, resolve customer service issues, assist in generating code, book travel, and more. As these agents take on more responsibilities, it’s crucial that the security model around them keeps up.

Identifying Threats is Great. Sharing That Info is Even Better

In the current climate, we are tackling the challenge of raising awareness at an industry level, highlighting the advantages of threat intelligence sharing: a practical and collaborative way to enhance cybersecurity awareness across industries and gain a tactical advantage in the evolving threat landscape.

KubeCon Europe 2025: Why Identity is the New Backbone of Secure Infrastructure

The standout themes at KubeCon + CloudNativeCon Europe 2025 in London strongly centered on how identity is rapidly becoming the linchpin for securing cloud-native infrastructure. The recurring theme I saw wasn’t just Kubernetes innovation—it was the rising urgency of securing the who behind every action across platforms, clusters, services, and tools.

Mend.io & HeroDevs Partnership: Eliminate Risks in Deprecated Package

The increasing reliance on open-source software coupled with the accelerated pace of software development has created a growing need for support of deprecated packages. The significant majority of open-source software packages are not actively maintained, meaning vulnerabilities are not patched, thereby leaving systems open to attack. Malicious actors often target deprecated open-source packages for this very reason.

Building a Future-Proof Career: The Role of Data in Professional Growth

In an era defined by rapid technological advancements and economic shifts, the ability to future-proof a career has become more critical than ever. Traditional job security no longer exists in the way it once did, as industries undergo significant transformations driven by automation, artificial intelligence, and big data. Professionals who wish to stay relevant must embrace continuous learning, adaptability, and data-driven decision-making. Data is at the core of modern business operations, influencing everything from strategic planning to consumer behavior analysis.