Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation

Friday Flows Episode 26: Use AI to Summarize CISA Alerts

In this Friday Flows, Kevin Davis walks through a new story incorporating CISA’s catalog of known exploited vulnerabilities, filters them to identify the most critical ones, and then prioritizes and offers a concise summary for each vulnerability… using our new AI features! There are two main ways Tines has incorporated AI into workflow building: 1) "Automatic Mode" in our Event Transform action and 2) a new AI action.

Automate Non-Human Identity Security and Management with Torq and Astrix

Organizations’ zero-trust policies and identity-centric programs ensure that user identities and login credentials are vigorously protected with IAM policies and security tools like MFA or IP restrictions. However, the situation is very different regarding non-human identities (NHI) like API keys, OAuth apps, service accounts, and secrets. Lack of visibility, monitoring, and governance of this permissive access is everywhere, and attackers have figured it out.

How to Automate Phishing Analysis with Torq Hyperautomation

How to Automate Phishing Analysis with Torq Hyperautomation. Phishing analysis has never been easier with Torq Hyperautomation. We make it easy to automate phishing analysis using our phishing templates in our template library. If you’re an Outlook user, this one’s is for you! In this example, we'll show you how to monitor an Outlook mailbox for phishing via Graph subscription.

How Torq Hyperautomation Simplifies Phishing Analysis for SOC Teams

2023 went down in history as the worst year for phishing attacks on record, with nearly 35 million attempted business email compromise (BEC) attacks detected and investigated, according to the Microsoft Threat Intelligence Cyber Signals report. Unfortunately, phishing analysis is one of the most time-consuming tasks for the SOC. Responding to a phishing incident requires careful examination.

Friday Flows Episode 25: API Pagination with Andrew Lee

Don't have a technical background, but want to create automations that can help your daily work? Andrew Lee, a Business Development Rep here at Tines, recently completed the certification & learned how to create Tines stories. In this Friday Flows, he walks through an API Pagination story to grab Star Wars characters. No matter your skill set, it's easy to get started. In a matter of weeks, you'll be prepared to build powerful workflows and start reducing mundane, repetitive tasks.

What Is Security Automation?

Digital transformation initiatives like moving servers to the cloud, extending work-from-home privileges, and deploying more IoT devices have expanded attack surfaces, making it easier than ever for threats to slip through. At the same time, the number of cyber threats is growing fast. According to Security Magazine, a cyberattack now happens at least every 39 seconds.

How security teams manage governance, risk, and compliance (GRC) with Tines

With a growing list of regulations adding to the pressure on already-stretched security teams, it's no surprise that many organizations are rethinking their approach to governance, risk, and compliance (GRC). Even the best-resourced security teams struggle to balance meeting regulations with pursuing their individual goals around improving security posture. The good news is that workflow automation and orchestration can help - let’s find out how.

An Introduction to SOC Automation

The security operations center, or SOC, is the backbone of modern security operations. By centralizing security monitoring, detection, and response, SOCs help organizations manage security risks more efficiently and effectively. But simply setting up a SOC doesn’t guarantee optimal security workflows. To get the very most from your SOC, you must automate its operations as much as possible.