Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Understanding AWS Cloud Security

When Amazon Web Services (AWS) initially launched in 2006, it offered the first compute, storage, and database cloud service that developers could build on. Over time, AWS became a fundamental cloud service provider as organizations started migrating to the cloud. As one of the three primary cloud services providers, AWS remains integral to most businesses.

"Toward Automating IoT Security": Why It Matters and How KeyScaler Is Leading the Way

The global Internet of Things (IoT) ecosystem is growing at an unprecedented rate. It’s estimated that by 2030, there will be over 75 billion connected devices worldwide, up from approximately 12 billion in 2020. This massive growth presents significant opportunities, but it also exposes critical vulnerabilities, particularly when it comes to securing these devices.

Torq HyperSOC is the first Autonomous SOC Platform with Native Model-Context Protocol (MCP) Support

Innovation in cybersecurity technology, particularly in security operations, is advancing at an incredible pace. The past few months have seen a surge in announcements of Agentic AI solutions and SOC Analyst AI Agents, transforming the landscape rapidly. At BlackHat USA 2023, Torq pioneered this space by introducing Socrates, the first AI Agent SOC Analyst. This highlights the remarkable acceleration of AI adoption in cybersecurity and the significant advancements made in a relatively short period.

Threat Actors Are Increasingly Abusing AI Tools to Help With Scams

Cybercriminals are increasingly using AI tools to assist in malicious activities, according to Microsoft’s latest Cyber Signals report. “AI has started to lower the technical bar for fraud and cybercrime actors looking for their own productivity tools, making it easier and cheaper to generate believable content for cyberattacks at an increasingly rapid rate,” the report says.

Innovation in Extended Access Management: AI and productivity are changing how we approach cybersecurity

It’s been a year since we announced 1Password Extended Access Management, and in that time, it’s become clearer than ever that we are facing a major shift in how workers use technology to drive productivity. Whether it’s through organizations embracing the use of AI agents or tech-savvy employees independently seeking out any tool or application they need, the way we work has fundamentally evolved. And cybersecurity must evolve with it.