Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Evolution Equity Partners' Portfolio Companies Tackle a Cyber Crisis

Patrick Orzechowski (also known as “PO”) is Torq’s Field CISO, bringing his years of experience and expertise as a SOC leader to our customers. PO is a seasoned security veteran with a deep understanding of the modern security landscape. You can find him talking to SOC leaders and CISOs from major brands at cybersecurity events around the world.

Introduction to the Australian Privacy Principles

The Privacy Act 1988 establishes the Australian Privacy Principles (APPs) as the foundation of privacy regulation in Australia. These 13 principles guide how organizations must handle, use, and manage personal information. The APPs apply to most Australian Government agencies, private organizations earning over $3 million annually, and certain smaller businesses—collectively called APP entities. For organizations doing business in Australia, APP compliance goes beyond avoiding penalties.

How to setup the OTP Verification plugin with WS Contact form?

OTP Verification Plugin validates users' email addresses or mobile numbers by sending a unique verification code (OTP) before form submission. By confirming the authenticity and accessibility of the provided contact details, this plugin effectively prevents fake leads. In this video, we'll walk you through the step-by-step process of using the miniOrange OTP Verification plugin with the WS Contact form. Get verified lead generation in WS Form using the OTP Verification plugin, ensuring verified user submissions.

EP 5 - Identity Debt: The Hidden Risk in SaaS Applications

In this episode of the Security Matters podcast, host David Puner sits down with Lior Yaari, CEO and co-founder of Grip Security, for a discussion that covers the concept of identity debt and its implications for modern cybersecurity. Lior shares insights from his experience in Israel's elite Unit 8200 and explains why identity is now the new security perimeter. They delve into the challenges organizations face in managing SaaS applications, the impact of generative AI on cybersecurity and the importance of proactive identity governance.

Ongoing TPRM Success: Continuous Security Monitoring with AI

All security professionals know third-party risk management doesn’t stop after one risk assessment. What about the next vendor? Or the future risks the vendors you’ve already evaluated will inevitably endure? While completing even a single risk assessment can feel like an arduous journey when done manually, all successful TPRM programs continue long after assessment.

Preparing for the Next Big Cyber Threat: Expert Recommendations

Staying ahead of the game is a top concern for security teams as the cyber threat landscape continues to evolve rapidly. Every year seems to bring new technological advances, which also introduce new cybersecurity trends and significant risks. As organizations face these challenges, it’s essential to build proactive defenses, not reactive responses. The next big cyber threat is already here—ready or not.

Introducing Cloudflare Secrets Store (Beta): secure your secrets, simplify your workflow

Every cloud platform needs a secure way to store API tokens, keys, and credentials — welcome, Cloudflare Secrets Store! Today, we are very excited to announce and launch Secrets Store in beta. We built Cloudflare Secrets Store to help our customers centralize management, improve security, and restrict access to sensitive values on the Cloudflare platform.