Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation

Featured Post

Understanding Task Automation: All You Need to Know

How often do you find yourself starved of time or unable to complete all the tasks on your to-do list? Rather than burning yourself out, working these tasks into the ground, consider task automation. By entrusting automation to handle essential tasks for you - whether it's internal approval processes, customer communication procedures, or anything in between - you can unlock precious work hours and resources. Nowadays, organizations face mounting pressure to keep operations moving and optimized while maintaining strict security, and automation is pivotal in helping them achieve that goal.

SOAR into 2025: SOAR's evolving role in security and beyond

Security Orchestration, Automation, and Response (SOAR) is rapidly evolving to meet the demands of modern security teams. As organizations face increasing threats and complexity, choosing the right SOAR solution has never been more critical. Join Matt Muller, Field CISO at Tines, and Andrew Green, Networking & Security Research Analyst at GigaOm, for an in-depth discussion on the state of the SOAR market and what’s next for security automation.

Securely bringing your own AI to Tines

At Tines, we take pride in both the flexibility and security of our platform: it’s what allows us to do things like safely connect to any HTTP API in the world, and seamlessly deploy in fully air-gapped environments. Similarly, our AI capabilities have been designed from the ground up to be secure and private, with no logging, internet transit, or training on your data.

Impossible Travel Detection with Torq: Defend Against the Most Prominent and Expensive Breach

With widespread remote work and global access, organizations face mounting challenges in securing user identities against sophisticated threats. One critical identity risk signal is impossible travel, where a user appears to log in from two unrecognized, geographically distant locations within an unrealistic timeframe, indicating the possibility of compromised credentials or session hijacking.

AI on your terms: introducing preferred AI providers in Tines

Leveraging AI is incredibly useful when orchestrating and automating your most important workflows. And it’s essential that you have the right AI model for your organization to handle those workflows as expected. Today, we’re excited to announce that you can select your preferred AI model when using AI in Tines products and features.

Friday Flows Episode 47: Using Tines to get into the festive spirit

In a festive special of Friday Flows, Colleen Gallagher joins host Cameron Higgs to walk through a workflow that uses AI in Tines, Pages, and branching logic to dynamically select the right playlist to match your mood for the holiday season. Colleen delivers all of the Tines bootcamps to our community of users.

Cut Through the Hype: Tips for Evaluating AI Solutions for an Autonomous SOC

As C-suites and boards are bombarded with headlines about AI revolutionizing cybersecurity, it’s no wonder they’re putting pressure on SOC leaders to adopt AI. The promise of AI in the SOC is rightfully alluring. An AI-native autonomous SOC has the potential to create a world where AI Agents collaborate with each other to take care of repetitive tasks and handle the majority of low-level alerts, freeing your human team up for strategic, proactive work. The hurdle?

Signing the CISA Secure by Design Pledge

Today, I’m thrilled to announce that Tines has formally signed CISA’s Secure by Design pledge. Since our founding, we have been guided by the fundamental belief that secure software is security software, and that our customers shouldn’t need to make a tradeoff between adding valuable automation capabilities or reducing their attack surface.