Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

No-code vs. low-code and near-no-code security automation

It seems that “no-code” is a term we hear more often in the security automation context these days. And this is especially true because automation has become one of the major talking points in cybersecurity. How is no-code automation implemented in cybersecurity? How do no-code and Sumo Logic automation compare to each other? We’ll discuss all these questions in the following sections.

Keeper Now Supports Hardware Security Keys as a Single 2FA Method

While support for hardware security keys is not new to Keeper, historically users were required to have a backup Two-Factor Authentication (2FA) option in addition to using a security key. Keeper is excited to announce support for user authentication leveraging only a hardware security key as the 2FA method, without requiring a backup option.

Unusual, thought-provoking predictions for cybersecurity in 2024

Do you recall how tentatively and maybe naively we approached the year 2000, otherwise known as Y2K? We stressed over two bytes in COBOL programs and regression tested every line of code to ensure our systems were ready to go at midnight on January 1, 2000. The clock struck 12, and the world breathed a collective sigh of relief – we survived the predicted digital disaster.

Why Therapists need Data Protection and Cybersecurity

Did you know the New-Age Therapeutic sector is unregulated? If that surprises you, then you’re not alone. I was a little surprised, too. Yes, there are various professional bodies a practitioner can join, and there are courses they can attend, but they aren’t forced to.

Is it time to replace your SIEM?

Security teams with an existing security information and event management (SIEM) investment may find themselves having to pay more to their vendor in order to ingest and index more of their data. In fact, nearly half (44%) of organizations want to augment or replace their current SIEM solution. It may be time to replace your SIEM. Fortunately, Elastic allows all users to try out a new, powerful SIEM with little to no upfront cost.

Using Python in Tines: a quick how-to guide

While you can build nearly anything in Tines without writing code, users occasionally prefer to use Python scripts to perform a step in their stories. The reasons for this vary, but we're happy to share that there's a simple way to securely execute Python scripts in Tines. So let's take a closer look at how it works, and talk through some best practices for using Python in Tines.

From code to clicks: My journey from Python to Tines

We recently weighed in on the debate between full-code, low-code and no-code automation. In this post, developer and sales engineer Jesse Strivelli shares his perspective on using the native Tines builder to create automated workflows. I've been immersed in the world of programming for years, having pursued a computer science degree at university and accumulating extensive experience in the field, primarily with major Fortune 500 companies.

Are They Really Playing? Get to Know Play Ransomware

Play is a recent entrant into the realm of ransomware, with its initial appearance being identified in June 2022. In this context, “Play” encompasses both the entity responsible for its development and distribution, as well as the name of the executable used for the ransomware. Following a pattern observed among numerous actors in this domain, Play has embraced the strategy of double extortion.