What's new in Tines: March edition
You can now configure monitoring for your entire Story. And still customize individual Action monitoring right from the Story panel. Get started by configuring Story-level monitoring in your tenant!
You can now configure monitoring for your entire Story. And still customize individual Action monitoring right from the Story panel. Get started by configuring Story-level monitoring in your tenant!
We're pretty fired up about what we've introduced to the product throughout November. We leaned into collaboration last month with an emphasis on the ability to work across teams effectively. If you haven’t already, see the month’s highlights.
Achieving any kind of compliance can be grueling. Ensuring your organization is SOC 2 compliant is often a particularly laborious endeavor, requiring extensive resources to obtain and maintain. SOC 2 is a comprehensive cybersecurity compliance framework developed by the AICPA (American Institute of Certified Public Accountants). It helps guarantee third-party service providers handle customer data with appropriate security measures.
In this episode of the Future of Security Operations podcast, Thomas interviews Andreas Schneider - the Field CISO EMEA at Lacework. Leveraging its data-driven platform and cloud-native application protection solution, Lacework helps organizations make sense of immense amounts of security data with minimal effort.
In this episode of Future of Security Operations, Thomas speaks with Jacob DePriest, VP & Deputy Chief Security Officer at GitHub, a company with a mission "to help every developer - regardless of experience level - learn, code, and ship software effectively." Before joining GitHub, DePriest spent more than 15 years as a senior executive at the National Security Agency (NSA) in the US.
With changing technology, evolving security threats, and the vast number of vendors out there, companies intent on successfully selling their products need new approaches. At the end of the day, it isn’t about convincing someone to buy your product whether they need it or not, but ensuring that your product is the right fit for them and that it will solve their problems—some of which they probably don’t realize they have.
Companies depend on Tines to protect their business through mission-critical automation workflows. Since the earliest versions of Tines, we’ve enabled users to put humans in the loop through forms and prompts. Workflows pause until a person completes an action via an email or messenger prompt. But these features felt limited, with the need for additional human interactions to take place elsewhere creating time-consuming friction.
Increased cloud adoption has introduced new security risks; organizations need to protect invaluable, sensitive data that can be accessed from anywhere. Traditional methods no longer suffice - today’s security operations teams must adopt innovative solutions and streamlined processes to effectively manage the increase in complexity and ensure mission-critical cloud loads are safeguarded.
Automation is often seen as the natural progression for a security operations center. However, deciding where and when to implement it can be pretty challenging. As an earlier blog post covers, Tines' Automation Capability Matrix is an innovative set of techniques that empower security operations teams to respond proactively and tackle common cyber-security incidents.
As organizations grapple with new economic realities, security leaders face the familiar challenge of keeping their systems and data safe with limited resources. To continue to do more with, in many cases, even less is a tricky tightrope walk that requires creativity and strategy to ensure overall success. To make the most of whatever resources are available, it’s important for security teams to evaluate their unique needs and vulnerabilities carefully.