Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Transitioning to Tines cases for automation tasks

Here at Tines, we’re laser-focused on listening to our customers and being the solution they need. It’s why Tines was created in the first place — to be the solution our founders needed but couldn’t find, so they built it themselves. In the same vein, we heard from our customers that they wanted a place to collaborate and track incidents, analyze them, and use the data to build even better automated workflows. Enter cases. Cases offer a space for your team to collaborate.

Introducing cases in Tines

Many, if not all, SOAR solutions in the market tout case management within their offerings. It’s a hard requirement for most analysts because it’s essential for their job. But those same analysts are burnt out and overwhelmed by high volumes of alerts, and they struggle to work through the near- endless backlog of tickets. When they look for alternatives, security teams are stuck between choosing good automation or good case management.

Tines achieves key AWS Partner milestones ahead of re:Inforce 2023

We’re excited about achieving several key milestones with Amazon Web Services as we head into re:Inforce 2023 next week. These milestones include achieving the AWS Security Competency, partaking in the Amazon Security Lake launch as a subscriber partner, and the introduction of a Tines-Amazon GuardDuty partner solution. To date, the flexibility of our no-code automation sets us apart from other automation partners by automating across any AWS workflow.

Capability deep dive: Data search

Data search, ID 3010 in the Automation Capability Matrix, is crucial for organizations to swiftly locate and analyze pertinent information. This makes it an essential tool for cybersecurity, IT operations, and compliance teams. Data search involves querying, filtering, and retrieving data from various sources such as SIEM platforms, databases, and other data storage solutions. This process allows organizations to discover valuable insights, identify anomalies, and make data-driven decisions.

Wiz's Yinon Costica: Using a self-serve model to better equip organizations and improve security posture

In this season’s finale of the Future of Security Operations podcast, Thomas chats with Yinon Costica, Vice President of Product and co-founder at Wiz, the leading cloud infrastructure security platform that enables organizations to identify and remove the most pressing risks in the cloud. Yinon has more than 15 years of experience leading cybersecurity product development teams, with expertise in the cloud security market.

Tines browser extension configuration guide

Professionals working in Cyber Threat Intelligence (CTI) enjoy playing detective, researcher, analyzer, and communicator. With Tines, now there’s a better way to quickly get answers for some of the most common questions that can tip off more strategic (read: exciting, fulfilling, meaningful) threat intelligence research.

BeyondTrust's Morey Haber: The challenges for security operations teams due to identity-based risks in a remote working world

In this episode of the Future of Security Operations podcast, Thomas chats with Morey Haber, Chief Security Officer at BeyondTrust. BeyondTrust is a worldwide leader in Privileged Access Management (PAM), focused on addressing the most urgent cybersecurity challenges, including zero trust, ransomware, cloud security, and more.

Counting the seconds: a method of showing automation value

Automation has revolutionized the way cybersecurity functions. Not only has it led to significant time savings, but it has also improved the consistency and accuracy of various processes. Here, we will discuss how to effectively record the time saved from automation to demonstrate its value. Tines offers great utilities to easily record the time an analyst has saved by automating manual, repetitive tasks over the course of a day, right down to the second.

Inevitable security incidents: The Unavoidable Reality

Incidents are an inevitable part of security, no matter how airtight your processes and systems are or how small your company is. Organizations saw a 125% increase in incidents from 2020 to 2021. Despite the tremendous amount of investments in security by major companies such as Uber, Okta, Microsoft, FireEye, and even the US Government over the past half-decade or so – they have all been successfully targeted by cyber attackers.