Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

IDC Validates Torq HyperSOC: A Game-Changer for SOC Analysts

IDC declares Torq HyperSOC the first solution to effectively mitigate SOC alert fatigue, false positives, staff burnout, and attrition. In a groundbreaking report, IDC emphatically recognizes the potential of Torq’s latest innovation, Torq HyperSOC, hailing it as a pivotal addition to the SOC analyst toolkit.

Elevating efficiency with automated enterprise application testing

Businesses are heavily reliant on a diverse range of technologies and applications for their growth. Today, business expansion is experiencing a significant boost due to widespread availability of robust cloud-based applications including SaaS, IaaS, and other "as a service" solutions. It is predicted by surveys that a majority of SMBs (77%) amplified their dependence on technology in response to the pandemic.

Friday Flows Episode 26: Use AI to Summarize CISA Alerts

In this Friday Flows, Kevin Davis walks through a new story incorporating CISA’s catalog of known exploited vulnerabilities, filters them to identify the most critical ones, and then prioritizes and offers a concise summary for each vulnerability… using our new AI features! There are two main ways Tines has incorporated AI into workflow building: 1) "Automatic Mode" in our Event Transform action and 2) a new AI action.

Automate Non-Human Identity Security and Management with Torq and Astrix

Organizations’ zero-trust policies and identity-centric programs ensure that user identities and login credentials are vigorously protected with IAM policies and security tools like MFA or IP restrictions. However, the situation is very different regarding non-human identities (NHI) like API keys, OAuth apps, service accounts, and secrets. Lack of visibility, monitoring, and governance of this permissive access is everywhere, and attackers have figured it out.

How to Automate Phishing Analysis with Torq Hyperautomation

How to Automate Phishing Analysis with Torq Hyperautomation. Phishing analysis has never been easier with Torq Hyperautomation. We make it easy to automate phishing analysis using our phishing templates in our template library. If you’re an Outlook user, this one’s is for you! In this example, we'll show you how to monitor an Outlook mailbox for phishing via Graph subscription.

How Torq Hyperautomation Simplifies Phishing Analysis for SOC Teams

2023 went down in history as the worst year for phishing attacks on record, with nearly 35 million attempted business email compromise (BEC) attacks detected and investigated, according to the Microsoft Threat Intelligence Cyber Signals report. Unfortunately, phishing analysis is one of the most time-consuming tasks for the SOC. Responding to a phishing incident requires careful examination.

Friday Flows Episode 25: API Pagination with Andrew Lee

Don't have a technical background, but want to create automations that can help your daily work? Andrew Lee, a Business Development Rep here at Tines, recently completed the certification & learned how to create Tines stories. In this Friday Flows, he walks through an API Pagination story to grab Star Wars characters. No matter your skill set, it's easy to get started. In a matter of weeks, you'll be prepared to build powerful workflows and start reducing mundane, repetitive tasks.

What Is Security Automation?

Digital transformation initiatives like moving servers to the cloud, extending work-from-home privileges, and deploying more IoT devices have expanded attack surfaces, making it easier than ever for threats to slip through. At the same time, the number of cyber threats is growing fast. According to Security Magazine, a cyberattack now happens at least every 39 seconds.

How security teams manage governance, risk, and compliance (GRC) with Tines

With a growing list of regulations adding to the pressure on already-stretched security teams, it's no surprise that many organizations are rethinking their approach to governance, risk, and compliance (GRC). Even the best-resourced security teams struggle to balance meeting regulations with pursuing their individual goals around improving security posture. The good news is that workflow automation and orchestration can help - let’s find out how.