Security | Threat Detection | Cyberattacks | DevSecOps | Compliance



Economic impact of automation and artificial intelligence

One of the most important technology trends in cybersecurity is AI (artificial intelligence). The idea behind AI in cybersecurity is to use AI-enabled software to augment human expertise by rapidly identifying zero day malware, APTs, malwareless attacks, or hacking attempts, reducing the organizations’ incident costs.


Solving the Integration Problem at Scale: How Torq Connects With Any Tool Using Hyperautomation

Setting up your security tools to work together seamlessly is often easier said than done, leading to time-consuming tasks and potential security gaps, especially without the proper tools. You must have both the ability to connect to any product, using APIs, CLIs or proprietary protocols, and do that in a simple no-code manner, without having to know the ins and outs of each technology. Without these, the ability to quickly automate is greatly diminished – as in legacy SOAR products.

Friday Flows Episode 6: Normalize Alerts with ChatGPT

The strides in GenAI have been remarkable this year, but we're all still trying to figure out how to impact our day-to-day work. In this demo, we use AI in the best way we know how to at Tines: by speeding up a security analyst's work and making their life a little easier! Use ChatGPT to normalize alert formats, in this case from CRWD. Alerts from multiple sources are converted into a standard format for easier processing by a SOC, and a ticket is then created.

Redefining Cybersecurity Operations: The Power of Torq's Workflow-Centric Case Management

Cybersecurity is a landscape forever in motion, an arena where threats evolve at an alarming pace. The tools we employ to counter threats should match this pace and anticipate the unforeseeable. Still, a chasm exists where tools are not keeping up with the changes, particularly regarding case management. I’m Dor Morgenstern, lead PM for Case Management at Torq. With a background rooted in cybersecurity, I’ve seen firsthand the evolving challenges that security operations face.

Webinar - Securing your Cloud Infrastructure with AWS & Tines

In the first instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your AWS environment. Our first story monitors AWS IAM access keys and automatically deactivates any that are older than 30 days. Our second story looks at automatically stopping and starting EC2 instances that may have been spun up for testing purposes.