Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Cybersecurity: The Battle of Wits

With cybersecurity, the digital battlegrounds stretch across the vast expanse of the internet. On the one side, we have increasingly sophisticated and cunning adversaries. On the other, skilled cybersecurity practitioners who are desperate to protect their companies’ assets at all costs. One fundamental truth rings clear: it’s an ongoing and relentless battle of wits.

Taking Control of Your Inbox: How to Stop Spam Emails

In 2023, over 45% of all emails worldwide were spam - the digital equivalent of junk mail. Spam emails are an unsolicited nuisance and a pervasive problem overwhelming the Internet's email systems. Some spam is simply unwanted marketing and advertising from legitimate businesses, but some of it is much worse. It can quickly overwhelm your inbox and wreak havoc on your device. And yes, mobile phones can get viruses just like computers.

Leveraging RAG for Domain-Specific Knowledge Retrieval and Generation

In the era of big data and information overload, efficiently retrieving and generating relevant knowledge has become increasingly crucial across various domains. While traditional language models have made significant strides in natural language processing tasks, they often need help with factual accuracy, context awareness, and integrating external knowledge sources.

What Are Managed IT Services For Businesses? A Helpful Guide

In today’s fast-moving tech world, every business—big or small—needs an IT setup that’s not just robust but also smart enough to keep up with rapid changes and challenges. That’s where managed IT services come in. They do more than just prop up your tech; they turbocharge your business goals. Ever wonder how managed IT services slide into your overall business strategy? It’s not all about fixing tech breakdowns.

24 Real Examples of Business Email Compromise (BEC)

The FBI has named Business Email Compromise (BEC) a $26 billion scam, and the threat is only increasing. Business email compromise (BEC) is a type of cybercrime in which a threat actor uses an email information-seeking scam to target a business to defraud the entire organization. Using social engineering techniques, BEC often occurs over fraudulent emails.

Business Email Compromise (BEC): Types & How To Prevent

Many of us think we’re too smart to get scammed by fake company emails. We also believe our biggest cybersecurity threats will be more complex than they have been in the past, and that today’s scammers and phishers will only target government and financial institutions with cutting-edge hacking and infiltration techniques. Regrettably, the threat of seemingly simple business email compromise (BEC) attacks is as prevalent as ever.

5 pre-built workflows created and shared by Tines users

At Tines, we're super proud of our library. Featuring hundreds of pre-built workflows, it's an incredibly useful source of inspiration for Tines users, from newbies right up to advanced builders. This week, the library reached two major milestones - it now contains 750 pre-built workflows, 75 of which were submitted by Tines users.

Automating detection and response with Tines workflows and Sysdig

Sysdig and Tines have joined forces to provide an integrated detect, triage and respond solution that enhances cloud security. This partnership combines Sysdig’s expertise in Runtime Insights with Tines’ robust orchestration and automation features. The result is a powerful solution that enables DevSecOps, Operations, and SOC teams to streamline security workflows, shorten response times, and stay ahead of security incidents.

World Password Day

Passwords can often feel like the bane of our existence. They're necessary for practically every app, website, and device we engage with, demanding our constant attention and memory. Managing the multitude of passwords required for our daily routines can be overwhelming. And this is why we are all guilty of not managing passwords properly.