Torq

Portland, OR, USA
2021
Oct 26, 2021   |  By Zachary Flower
Controlling access to sensitive data is tough. Be too restrictive, and your employees run into too many roadblocks to do their jobs effectively. Too loose, and you are effectively guaranteeing that your organization will find itself on the front page as a victim of one of the many data breaches happening every day. That is why it is important to craft an effective data security strategy: one that relies on automation and oversight to ensure the privacy of your users’ data.
Oct 11, 2021   |  By Theo Despoudis
Maintaining an online business presence nowadays means that malicious actors are going to target and likely exploit any application vulnerabilities they can find sooner or later. According to the 2021 Mid Year Data Breach Report, although the number of breaches has declined by 24%, the staggering number of records that were exposed (18.8 billion) means that there is still room for improvement.
Oct 6, 2021   |  By Mike Mackrory
When we discuss cybersecurity and the threat of cyber attacks, many may conjure up the image of skillful hackers launching their attacks by way of undiscovered vulnerabilities or using cutting-edge technology. While this may be the case for some attacks, more often than not, vulnerabilities are revealed as a result of careless configuration and inattention to detail. Doors are left open and provide opportunities for attacks.
Oct 4, 2021   |  By Chris Tozzi
It has been argued that automation in the workplace tends to be misunderstood. Analysts are keen to point out that, despite myths to the contrary, automation isn't going to put most people out of work, for instance. Nor is AI going to become a real substitute for actual human intelligence. These are compelling arguments for rethinking the way we think about automation in general. But you can take the points further if you analyze the impact of automation on specific domains, such as cybersecurity. Indeed, automation is perhaps nowhere more misunderstood than in the realm of cybersecurity. To prove the point, here are five common myths about automation's impact on security, and why they're wrong.
Oct 4, 2021   |  By Konstantin Ostrovsky
At Torq, we use gRPC as our one and only synchronous communication protocol. Microservices communicate with each other using gRPC, our external API is exposed via gRPC and our frontend application (written using VueJS) uses the gRPC protocol to communicate with our backend services. One of the main strengths of gRPC is the community and the language support. Given some proto files, you can generate a server and a client for most programming languages.
Sep 28, 2021   |  By Eldad Rudich
Recently, I started to read the invaluable book Software Engineering at Google. It’s a great book by Google, describing their engineering practices across many different domains. One of the first chapters discusses the matter of making a “scalable impact,” which I find very interesting, and something that I believe has been overlooked by many organizations.
Sep 27, 2021   |  By Mike Mackrory
It’s no secret that cyber attacks are on the rise. Not only are they becoming more frequent, but the malicious actors who mount these attacks are constantly improving their skills and evolving the tools in their arsenals. Protecting your organization is challenging at best; especially since we measure the return on investment for cybersecurity as ‘preventing losses’ instead of ‘increasing revenue.’
Sep 13, 2021   |  By Torq
The #LifeatTorq Team Spotlight is a Q&A series dedicated to the talented and generally kick-ass team that form the foundation of our growing company. Today we are spotlighting Leen Neuman, a Front End Engineer at Torq, based in our Tel Aviv office.
Sep 8, 2021   |  By Theo Despoudis
We live in a technological society, and cyber attacks are on the rise. Much of this fraudulent activity is linked to malicious actors or gangs of cyber criminals who are trying to exploit anything they can get their hands on. By using tools like Cobalt Strike or customized alternatives, they attempt to penetrate an organization’s defenses in order to gain leverage, exfiltrate PIIs, plant ransomware or CnC beacons, or perform other kinds of malicious acts.
Sep 7, 2021   |  By Torq
The #LifeatTorq Team Spotlight is a Q&A series dedicated to the talented and generally kick-ass team that form the foundation of our growing company. Today we are spotlighting Ori Seri, an R&D team leader at Torq, based in our Tel Aviv office. Tell us a bit about your career path before Torq. Ori: I was an officer in an Israeli Defense Forces (IDF) Intelligence unit early on. Then I worked at a startup called Nuweba, where I began as an engineer, and later led an R&D team there.

Torq is a no-code automation platform that modernizes security and operations teams. With Torq, frontline security professionals can easily create automated flows that help them respond to threats faster, remediate risks automatically, and deliver better security to their teams.

Torq’s no code automation modernizes how security and operations teams work with easy workflow building, limitless integrations, and numerous prebuilt templates.

Five minutes to powerful security automation:

  • Supercharge your security posture: Respond to threats faster with automatically triggered flows. Remediate risks as soon as they’re detected in your environment.
  • Accelerate security operations: Build flows with a no-code, drag & drop designer — no developers or professional services needed. Easily connect to any tool in your environment to ensure complete protection.
  • Work your way — only faster: Start with automating a single step, expand your flow to complex branches. Best practice templates get you started fast and REST APIs help you customize as needed.
  • Compliant and Secure Platform: Our infrastructure and operations undergo rigorous external audits and meet the highest grade of industry security, privacy and compliance standards.

No-code automation for powerful security.