Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Real Example of Copilot Exposing Sensitive Data

Is Microsoft Copilot putting your sensitive data at risk? AI tools like Copilot can unintentionally expose sensitive information through indirect queries leading to data leaks, insider threats, and compliance risks. In this webinar, we break down real-world examples of how over-permissioned access and prompt manipulation can bypass security controls and what you can do to prevent it. Stay ahead of AI-driven threats.

EDR, DFIR and Endpoint Triage with Brian Carrier

Brian Carrier, CEO of Sleuth Kit Labs, joined Defender Fridays to discuss EDR, DFIR and Endpoint Triage. We explored how SOCs can effectively investigate endpoints after alerts to decide whether to wipe it or call an IR team. Brian covered leveraging EDR data and additional forensic artifacts for better Endpoint Triage, helping teams cut through the overwhelming amount of information to make informed response decisions.

Top Use Cases & Trends in Machine & Workload Identity

Speakers: As infrastructure becomes increasingly automated, the systems that deploy, manage, and scale it—CI/CD pipelines, service agents, orchestration tools—rely on a growing class of non-human identities (NHIs). These machine actors often operate with persistent credentials, excessive privileges, and limited visibility—leaving critical trust gaps in modern environments. This session explores three high-impact use cases where addressing NHI is both urgent and achievable.

NGINX Integration: How to install nginx and instrument it to observe API traffic

In this step-by-step tutorial, we walk you through the complete process of installing NGINX and instrumenting it to monitor and observe API traffic. Whether you're just getting started or looking to improve your observability stack, this guide will help you set up NGINX for effective traffic monitoring. In this video you'll learn: Why is this important? Observing API traffic helps you detect issues early, optimize performance, and ensure your services are running smoothly.

What is muckwork?

Muckwork: the low-leverage, repetitive tasks that keep teams from doing their best work. At Tines, we’re on a mission to eliminate it. Forever. Our CEO Eoin Hinchy published The End of Muckwork, sharing how AI and orchestration, built with intention and control, can transform how teams work. Now, we’re bringing that mission to life in a new video. Read the blog: tines.com/blog/the-end-of-muckwork.

AI Agent action - Task or Chat?

AI Agents give you the power to do so much, reducing friction between your team and other departments without adding to your team’s workload. So where do you start? The first thing to decide is whether you want to use a task or chat. This video explains when you should use a task, and when chat is better suited to your story. New to Tines? Sign up for our always-free Community Edition and start building right away.

What Are Website Vulnerabilities?

What exactly are website vulnerabilities, and why should you care? In this video, we explain what website vulnerabilities are, how attackers exploit them, and the risks they pose to your business or personal website. From SQL Injection and Cross-Site Scripting (XSS) to security misconfigurations—understand the basics with simple examples.