Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The ROI of DSPM: What CISOs Need to Know

Data security budgets are under more scrutiny than ever. When a CISO brings a new tool to the table, finance and the board want to know: What does this buy us, and how do we measure it? Data security posture management (DSPM) is one of the harder investments to quantify on paper, largely because its primary value is risk reduction rather than revenue generation. But that framing undersells it.

Strengthening authentication with passkeys: A CISO playbook

For decades, passwords have been the standard method for protecting access to systems and accounts. However, passwords can be compromised or stolen via tactics such as brute-force attacks, phishing attacks, and infostealer malware. The shift to multi-factor authentication (MFA) added another layer of security by requiring additional authentication to verify the user’s identity – some combination of something you know, own, or (in the case of biometrics) are.

CISOs Missing the Real AI Threat #podcast #aisecurity

This episode looks at what happens when AI starts finding vulnerabilities at scale, restricted access creates market imbalance, and security teams struggle to keep pace. It covers fragile infrastructure, bug brokers, overloaded analysts, CISO fear, and the growing sense that cyber defence is entering a faster and harsher era.

Top 4 AI Security Challenges CISOs Face

AI adoption is accelerating across enterprises, often faster than security teams can respond. Employees are already using AI tools, copilots, and agents across SaaS apps, browsers, and workflows. That creates new risk around shadow AI, sensitive data exposure, runtime threats, and autonomous actions that traditional controls were never built to handle. In this video, we break down the four AI security challenges CISOs are facing right now.

The CISO's AI Agent Production Approval Checklist: 7 Gates to Clear Before Go-Live

Your engineering lead is in your office Thursday morning. They want to push an AI agent to production next Tuesday. It’s a LangChain-based workflow agent, connected through MCP to three internal tools and one external API, with access to a customer database. The framework posters are on the wall. Your team has spent two quarters standing up runtime observability. And sitting in that chair, you still don’t know whether to say yes.

A CISO's Guide to Deploying AI Agents in Production Safely

Your CNAPP shows green across every posture check—hardened clusters, compliant configurations, no critical CVEs—but when your board asks "Are our AI agents safe in production?", you cannot answer with confidence because your tools see the infrastructure, not what the agents actually do at runtime.

The CISO's Role Is Rapidly Changing

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo John White is the Field CISO for EMEA at Torq. A respected security executive with more than 20 years of leadership experience, John previously served as CISO at Virgin Atlantic, where he led a multi-year transformation deploying the Torq AI SOC Platform to modernize cyber operations.

7 Important Questions Facing CISOs on Bridging the Gap Between AI Threats, Supply Chain, and Cyber Resilience

A CISO’s job never ends, and, according to a recent LevelBlue survey, the issues they are dealing with on a daily basis are piling up, causing some disconnect in priorities and a misunderstanding of how to accomplish specific cybersecurity goals. To help answer some of the more pressing questions CISOs face and to gain a different perspective on the survey’s results, we sat down with LevelBlue’s Chief Security & Trust Officer, Kory Daniels.

Fortifying Your SaaS: A CISO's Guide to Secure Embedded Analytics

In the competitive SaaS landscape, differentiation is key. Product leaders are constantly searching for the next feature that will not only attract new customers but also increase the stickiness of their platform. Enter embedded analytics. The ability to provide users with interactive, real-time data visualizations directly within your application is no longer a luxury; it's an expectation. But as we rush to empower our customers with data, are we inadvertently opening a new front in the cybersecurity war? For every visually stunning dashboard, there's a potential attack vector waiting to be exploited. The question then becomes not if you should implement embedded analytics, but how you can do so without compromising your security posture. This guide will walk you through the critical security considerations, from data isolation to API security, ensuring your next product enhancement doesn't become your next data breach headline.