Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Torq

SOAR is Dead. Why HYPERAUTOMATION is What's Next.

Today, Torq transformed security automation forever with the debut of the world’s first enterprise-grade security hyperautomation platform. Why does that matter? I’ll let Gartner explain. It says “Hyperautomation is a business-driven, disciplined approach that organizations use to rapidly identify, vet, and automate as many business and IT processes as possible.” Simply put, it’s the future of security automation, and we’re delivering on its promise, today.

IAM Legend: How Torq is Reinventing Identity and Access Management

Torq IAM is a critical foundation of modern enterprise IT infrastructures and governance. It’s one of the ways security professionals deliver value to their entire company, customer, and partner ecosystem. It’s also what drives the effective management of organizational roles, assets, and the connections between them. The product team at Torq is focused on changing the IAM game and leveling up our customers’ capabilities.

Building Efficient SecOps Pipelines with AWS Security Lake and Torq

Amazon Security Lake automatically centralizes an organization’s security data from cloud, on-premises, and custom sources it into a purpose-built data lake stored in a customer’s AWS account. Amazon Security Lake reduces the complexity and costs for customers to make their security solutions data accessible to address a variety of security use cases such as threat detection, investigation, and incident response.

How Torq Remediates the 3CX Supply Chain Attack

By Dallas Young Sr. Technical Marketing Manager, Torq According to researchers, the 3CX Voice over Internet Protocol (VoIP) desktop program for Windows and MacOS, which boasts over 600,000 customers and 12m daily users, has been compromised by a DLL sideloading attack and used in several supply chain attacks. 3CX is a private branch exchange (PBX) system, a private telephone network used within a company or organization.

How Continuous Threat Hunting Addresses Potential Okta Password Exposure Via Failed Login Attempts

Last week, the incident response firm Mitiga published research outlining the potential exposure of Okta passwords of organizational users. The method involves a mistaken entry of one’s password in the username field in an Okta login interface – something that, according to the research, is not an infrequent occurrence.

Automating Security and Defensive Framework to MITRE Standards

Learn how to standardize your team's response and implement it consistently through new approaches and updated tools. Enterprise Strategy Group and Torq experts look at how security automation platforms can put world-class security strategies within reach of any team, regardless of size or maturity level.

Managing the Complexity of Todays Threat Landscape

In this discussion-style webinar, our experts weigh in on the challenges that cybersecurity professionals currently face and how to harness the power of security automation to address those challenges successfully. Jason Chan, cybersecurity expert and Torq Advisor, and Leonid Belkind, cybersecurity automation expert and CTO of Torq, dive deeper into their conversation on the positive impacts security automation is having on organizations of all sizes, worldwide.