Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Implementing AI within your security strategy: 7 best practices

There’s a ton of media hype about the swift integration of AI across different business functions. It has also been reported that 98% of technology executives have paused their AI programs to establish guidelines and policies around its implementation. Depending on when and where you read about it, opinions on the speed of AI adoption vary. Nevertheless, AI is more than just hype.

Tines for Vulnerability Management

For teams focused on vulnerability management, maintaining a secure and resilient environment for your organization is paramount. From finding vulnerabilities and assessing their risk, to patch management and continuous reporting, teams are often juggling disconnected systems, various input sources, and manual prioritization and assignment to ensure vulnerabilities aren’t being overlooked.

Automated Penetration Testing: An Overview

Automated penetration testing, or automated pen testing, is a type of security assessment that uses specialist tools to uncover vulnerabilities. Although it can serve as part of a cohesive security strategy, it also presents some challenges. In this article, we outline the pros and cons of automated pen testing and compare it with manual pen testing.

Unlock Advanced Security Automation for Next-Gen SIEM

According to the CrowdStrike 2024 Global Threat Report, the fastest recorded eCrime breakout time was just 2 minutes and 7 seconds in 2023. This underscores the need to equip security analysts with modern tools that level the playing field and enable them to work more efficiently and effectively.

Drata Integration - How to Automate Technical Vulnerability Management

Aikido Security is now live on the Drata Integration marketplace! That’s great news because navigating today’s cybersecurity regulatory landscape is a bit like walking a tightrope in a hurricane. As cyber threats evolve, so do the regulations designed to keep them in check. Businesses now find themselves grappling with a growing list of compliance requirements, each more stringent than the last.

Accelerating privacy and security in AI with Tines

At Tines, our mission is to power the world's most important workflows, and AI has recently become a huge part of that story. We currently have two AI-powered capabilities that enable teams to work faster, reduce barriers to entry, and spend more time on the fulfilling work that attracted them to their professions in the first place. But this is only possible because they trust that these features are private and secure by design.

Using Records to improve story performance in Tines

In a guest blog post, Aaron Jewitt, Principal Detection Engineer at Elastic, walks us through a Tines workflow he built to improve the efficiency of his team's automated alert triage processes. He recently shared how his InfoSec team uses Tines to automate alert triage over on Elastic's blog, which makes a great companion piece to this post.

"AI is only useful when it solves real customer problems": Tines on Risky Biz

We’re all huge fans of the Risky Biz podcast here at Tines, so we were thrilled to be invited to appear on the show recently to talk about AI’s role in security automation. I had a great conversation with host Patrick Gray about the security and privacy challenges that go along with deploying an LLM in your environment, and how our approach to AI in Tines is fundamentally different. I loved every minute of this chat, and I hope you’ll find it interesting, too.