View Topics

Intezer and Torq partner for the first AI SOC agent-to-agent collaboration
4MIN READ

Agent-to-Agent Collaboration: Intezer and Torq Partner to Deliver the Next Leap in the AI SOC Revolution

Intezer and Torq pioneer the first AI SOC agent-to-agent collaboration to work together to triage, investigate, and remediate alerts.
Blog image with a checkmark to represent solving SOC challenges
4MIN READ

Growing Together: Solving SOC Challenges Over a 7-Year Journey with Intezer

Discover how a global enterprise tackled SOC challenges and scaled security with Intezer’s Autonomous SOC Platform over a 7-year partnership.
Proactive Security Blog Post Image
5MIN READ

How AI is Enabling More Proactive Security

New survey shows AI is helping SOCs shift from reactive work to proactive risk reduction. See where teams plan to apply AI next.
AI SOC pricing model blog post image
6MIN READ

Why Your AI SOC Pricing Model Should Support Your Security Strategy

Explore AI SOC pricing models—from alert volume to endpoint-based—and why full alert visibility is key to catching what humans might miss.
5MIN READ

AI in Cybersecurity: How CISOs Can Achieve Board Alignment 

Help your board navigate AI in cybersecurity. Learn how CISOs can align on AI risks, regulations, and governance with clear communication.
Agentic AI Domincated RSAC Blog Post Image
4MIN READ

Agentic AI Dominated RSAC 2025 — Now Comes the Hard Part

Agentic AI dominated RSAC 2025. Here's how to evaluate its impact in the SOC—and what matters now that it's more than just a buzzword.
5MIN READ

How to Fix Your Alert Backlog with Intezer and Microsoft

Learn how Intezer and Microsoft partner to eliminate alert backlogs, automate triage, and free up your security team for critical threats.
6MIN READ

The Top 10 SOC Influencers Making Waves

Top 10 SOC influencers shaping AI & automation security insights. Follow these experts for insights on SOC strategy and innovation.
Phishing trends blog post image
14MIN READ

Emerging Phishing Techniques: New Threats and Attack Vectors

Discover advanced phishing techniques bypassing email security—Intezer reveals threats hidden in SVGs, PDFs, OneDrive, and OpenXML files.