Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

5 Secrets of a SOC Leader Turned Field CISO

Torq is thrilled to have Patrick Orzechowski (also known as “PO”) on board as our new Field CISO, bringing his expertise and years of experience as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. By way of introduction, below he shares his five top pieces of advice for SOC leaders facing today’s security challenges.

Building Powerful CrowdStrike Automations: Insights from Fal.Con 2024

This sentiment expressed by Fiverr’s VP of Business Technologies perfectly reflected the energy at the Fal.Con 2024 Torq booth and struck a chord with security teams using CrowdStrike’s powerful tools. Detection isn’t the problem — CrowdStrike excels at that. The challenge lies in automating what happens next.

Planning with AI: Minimizing Uncertainty, Maximizing Trust

Gal Peretz is Head of AI & Data at Torq. Gal accelerates Torq’s AI and data initiatives, applying his deep learning and natural language processing expertise to advance AI-powered security automation. He also co-hosts the LangTalks podcast, which discusses the latest AI and LLM technologies. To stay ahead of today’s threats, you must do more than keep pace — you need to equip your team with tools that enable smarter, faster responses.

Take Control with Torq's AI Data Transformation

Data interoperability is the backbone of building reliable and efficient hyperautomated workflows. However, manipulating and formatting massive amounts of data from various sources — especially in complex JSON files — can feel overwhelming and consume significant time and resources, particularly for those still gaining technical expertise. Teams often lack or have maxed out dedicated resources to wrangle this data.

What Happens If Your Vendor Isn't SOC 2 Compliant?

If your vendor isn't SOC 2 compliant, your business is sitting on a ticking time bomb. Many companies don't realize that trusting a third-party provider without SOC 2 certification leaves them exposed to data breaches, regulatory fines, and operational chaos - risks that can seriously harm your bottom line. In this article, you'll find a straightforward list of crucial steps to ensure your vendor is SOC 2 compliant and why it matters in the first place.

SOC 2 Compliance as a Selling Point: How It Helps Your Business Stand Out

There's a powerful strategy that can set your business apart from the competition and make you the go-to choice for clients who prioritize security and reliability. Most companies overlook it, yet it's one of the simplest ways to win more deals and increase your credibility.

Crushing False Positives: Supercharging SOC Efficiency with Smarter Threat Intel

Security Operations Centers (SOCs) are critical to protecting organizations against cyber threats. Tasked with monitoring networks, analyzing data, and responding to incidents, these teams rely heavily on threat intelligence to detect and mitigate risks. However, one of the most significant challenges they face is the issue of false positives — when benign activities are flagged as potential threats.

Reduce time to triage by up to 50% with Corelight's new Guided Triage capability

Security Operations Centers (SOCs) are under immense pressure to ensure no attack goes unnoticed. At Corelight, we’re being approached daily to help bring in network visibility. For many though, visibility isn’t enough. SOCs are already overloaded and Tier 1 Analysts often lack network expertise. Modern network visibility has to be easy to use and designed for maximizing SOC efficiency. For that, we built Guided Triage.