Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Automation

What's exacerbating the cybersecurity skills gap and how to overcome it in 2023

As organizations grapple with new economic realities, security leaders face the familiar challenge of keeping their systems and data safe with limited resources. To continue to do more with, in many cases, even less is a tricky tightrope walk that requires creativity and strategy to ensure overall success. To make the most of whatever resources are available, it’s important for security teams to evaluate their unique needs and vulnerabilities carefully.

Why the quickest response is not always the best in cybersecurity

The need for fast incident response is a given. No industry professional would deny how critical a rapid response is when dealing with a cyber threat and an incident. However, it is equally important to understand that the quickest response is not always the best in cybersecurity. Security operations centers (SOCs) and organizations must factor in other variables, too, when preparing for the inevitable, as recent cyber stats suggest.

Enhance threat response with Tines' Automation Capability Matrix

Tines' Automation Capability Matrix is a set of techniques designed to help security operations teams understand their automation capabilities and respond more efficiently to security incidents. With this new matrix, teams can identify automation opportunities and implement strategies to enhance their threat response efforts. This blog offers key insights into the Automation Capability Matrix, giving you a comprehensive understanding of its purpose and benefits.

Pages

Tines Pages enable you to create a front end for any of your automation pipelines. You can gather and collect data from internal and external sources via a shareable link or URL, or create a centralized landing page for your end user to review any data built in your Story.

CircleCI Breach: How to Rotate All Stored Secrets ASAP

Yesterday, CircleCI, a Continuous Integration/Continuous Delivery (CI/CD) service, notified the world it had been breached via a critical advisory from its CTO. As a major software delivery pipeline service, CircleCI users store myriad credentials for various services in CircleCI’s “Secrets Store” infrastructure.

Is Cybersecurity Automation on Your List of New Year's Resolutions? 6 Tips to Help

Every year, millions of people make New Year’s resolutions, both personally and professionally, and we all know how difficult resolutions can be to keep. One of the top workplace resolutions cybersecurity professionals are making this year is to pursue security automation initiatives.