
Sign up to save your podcasts
Or


Cyberattack attempts on Ukraine surge tenfold
Ukraine's "IT army" targets Belarus railway network, Russian GPS
Eight-character passwords can be cracked in less than 60 minutes
There are many misconceptions about security automation, so Torq is debunking a security automation myth each day this week.
Myth 5: You Should Automate All Security Processes False. You should automate routine, repetitive tasks that are not subject to much conditional variance. But workflows that can't be reliably managed by automation tools, such as assessing the financial consequences of a breach or determining whether a security incident should trigger an application rollback, should remain the domain of humans. To learn more about the realities of automation, head to torq.io.
For the stories behind the headlines, head to CISOseries.com.
By CISO Series4.7
133133 ratings
Cyberattack attempts on Ukraine surge tenfold
Ukraine's "IT army" targets Belarus railway network, Russian GPS
Eight-character passwords can be cracked in less than 60 minutes
There are many misconceptions about security automation, so Torq is debunking a security automation myth each day this week.
Myth 5: You Should Automate All Security Processes False. You should automate routine, repetitive tasks that are not subject to much conditional variance. But workflows that can't be reliably managed by automation tools, such as assessing the financial consequences of a breach or determining whether a security incident should trigger an application rollback, should remain the domain of humans. To learn more about the realities of automation, head to torq.io.
For the stories behind the headlines, head to CISOseries.com.

187 Listeners

2,011 Listeners

1,649 Listeners

372 Listeners

371 Listeners

651 Listeners

1,028 Listeners

317 Listeners

418 Listeners

8,077 Listeners

175 Listeners

315 Listeners

195 Listeners

73 Listeners

9 Listeners