Why I'm leading Tines' internal workflow transformation

I first met Tines co-founders Eoin Hinchy and Thomas Kinsella more than a decade ago at eBay. Even then, we shared the same frustration: too much important work was slowed down by brittle processes, manual handoffs, and disconnected tools. We all believed technology should help people focus on meaningful work, not slow them down in muckwork. That idea has shaped my career ever since. I started out in security operations, using automation to make my own job easier.

The problem? The people you're blocking are often top performers.

Banning AI seems logical. Our new report shows why it's failing. The problem? The people you're blocking are often top performers. They're confident, innovative, and willing to work around the rules to get value. This video explains why this paradox changes everything. You can't just block curiosity. You have to harness it. Download the complete (ungated) report.

How to Avoid Phishing Attacks: A Complete Guide for Users and IT Teams

Phishing remains one of the most common cyber threats, affecting users across industries and regions. It targets human behavior rather than technology, which makes it more effective than many other attack methods. Now, attackers are using advanced tools, like AI, to make phishing more effective. To know how to avoid phishing attacks, you must understand how they work and the different forms they take.

React2Shell and related RSC vulnerabilities threat brief: early exploitation activity and threat actor techniques

On December 3, 2025, immediately following the public disclosure of the critical, maximum-severity React2Shell vulnerability (CVE-2025-55182), the Cloudforce One Threat Intelligence team began monitoring for early signs of exploitation. Within hours, we observed scanning and active exploitation attempts, including traffic originating from infrastructure associated with Asian-nexus threat groups.

Risk, Reward, and Reality: How to Decide the Right Amount to Invest in Crypto

Entering the world of crypto can feel exhilarating. Stories of rapid gains and high-profile success can make even cautious investors consider dipping their toes into digital assets. Yet, alongside the potential for reward comes significant risk. Understanding how much to invest in crypto is less about chasing opportunity and more about aligning investments with your financial reality, goals, and tolerance for volatility.

The Security Blind Spots Most Operators Miss - According to Igor Finkelshtein

In the cybersecurity world, it's easy to focus on the latest breach or high-profile vulnerability. But according to multi-industry operator Igor Finkelshtein, most security incidents don't begin with sophisticated attacks - they begin with overlooked operational weaknesses. From transportation to real estate to SaaS platforms, Finkelshtein's experience shows that cybersecurity is ultimately an operational discipline. The vulnerabilities that quietly accumulate inside a business often pose a greater risk than anything happening outside it.

Introducing DDI Central 5.6: Anomaly-aware, forecast-driven, monitoring-powered, Cisco-Smart DDI for modern networks

When we shipped DDI Central 5.5, we brought STIX/TAXII-powered threat intelligence into your DDI stack—enabling you to detect and respond to known threats in real time, using globally curated indicators of compromise. That release turned DNS and DHCP into active players in enterprise security.

Real-Time Cloud Detection & Response - 2025 MITRE ATT&CK Enterprise Evaluations

For the first time, the 2025 MITRE ATT&CK Enterprise Evaluations tested cloud detection and response capabilities, and CrowdStrike delivered 100% detection and protection with zero false positives. The evaluation simulated Scattered Spider attacks achieving AWS admin access in under one minute. Traditional cloud security struggles with delayed log processing, but CrowdStrike's real-time cloud detection analyzes logs instantly for immediate visibility.

Getting the Right People to the Table

Implementing Microsoft Purview is not just an IT project – it’s a company-wide transformation that touches nearly every aspect of how your organization manages, protects, and governs data. Success requires aligning diverse perspectives and building consensus across teams. The initial push for Purview can come from many departments. If you are leading the effort, identifying who needs to be involved and understanding why their input matters will be key to driving buy-in and long-term success.

Response to "Principles for the Secure Integration of Artificial Intelligence in OT"

This new guidance amounts to leading Western governments telling OT users (industrial businesses in manufacturing, energy, power, logistics, critical infrastructure, and the like), “Yes, you can use AI in OT, but only if you’re prepared for it to fail and you can recover quickly when it does.”