Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The extended Q+A: continuing the AI agents conversation

Last week, we hosted the Product Spotlight: Build agents in Tines, and it was a hit. We had so many questions that we couldn’t answer them all live, so we’re continuing the conversation here. Before we jump into the Q+A, here’s a quick recap of the webinar in case you missed it: In this session, Head of Product Stephen O'Brien introduced the AI Agent action and shared how it builds on our ongoing evolution of workflows.

SANS SOC Survey 2025: What's holding teams back and how to move forward

The 2025 SANS SOC Survey reveals that while technology keeps evolving, the core problems facing SOC teams remain stubbornly in place. Teams are understaffed. Tool sprawl is growing. And performance metrics often miss the mark. Many SOCs lack the workflows, strategy, and staff to connect tools, streamline processes, and reduce manual work. And now they face a new challenge: making AI actually deliver value. Let’s dig into the key findings.

What to Look for in a Phishing Site Detection and Takedown Solution

With the average phishing campaign now harvesting its first set of credentials in under 15 minutes , the efficacy of a detection strategy is measured in seconds, not hours.. Relying on scanning and takedown or traditional threat intelligence feeds – that inherently lag behind real-time user engagement – is no longer a viable defense against even unsophisticated credential theft and account takeover (ATO) scams.

NIST's new LEV metric: How does it help companies?

The National Institute of Standards and Technology (NIST) has unveiled a new metric that promises to revolutionize the way vulnerability management is prioritized. Likely Exploited Vulnerabilities (LEV) is a ranking designed to help organizations focus their efforts on the flaws that cybercriminals are actively using to perpetrate real-world attacks. Thousands of vulnerabilities are reported every year but only a small fraction is exploited in the wild.

CPS 234 vs. ISO 27001: Differences and overlaps

CPS 234 and ISO 27001 are two industry-accepted standards that help protect organisations from cyber attacks—one of the biggest threats and concerns Australian organisations experienced in 2024. The standards can be said to share the same end goal—increasing cyber resilience while helping manage information security more effectively. ‍ Despite this shared goal, CPS 234 and ISO 27001 come with notable differences.

Clash for Windows: Key Features and How to Use It Safely

The demand for web privacy and secure Internet access has sharply increased recently. As a result, many users are scrambling to find essential tools to guarantee online privacy and safety, such as Clash for Windows, one of the more popular tools. It comes with some powerful features that not only protect privacy but also improve the browsing experience. This post examines its main features and how it can be used safely.

Opening a Business in Hong Kong: Legal Setup, Local Requirements, and Practical Realities

Company registration, Hong Kong still stands tall-not because it shouts the loudest, but because it stays consistent. It's a place that favors action over noise. While many cities offer tax perks or startup hubs, few combine legal transparency, global banking access, and geographic reach like this one does. The process isn't glamorous, but it's clean. And in a region where unpredictability can kill momentum, that kind of dependability is gold.

Design as Risk Management in Fintech Products

For developers building in fintech, most conversations revolve around security, compliance, and architecture. But one layer is often underestimated - UX design. And that's ironic, because in fintech, design is risk. Take onboarding flows, KYC steps, or multi-step transfers - the smallest friction point or unclear interface can result in lost conversions, user errors, or compliance red flags.

How to Rent a Server in the USA While Living in Ukraine: My Experience, Challenges, and Tips

When I first thought about renting a server in the USA while living in Ukraine, I believed it would be pretty simple: choose a hosting provider, pay, and start using it. But in reality, it turned out to be quite an adventure - full of losses, misunderstandings, and surprises related to exchange rates and support delays. Today, I want to share my personal experience so that maybe some of you can avoid the same mistakes.

Data Protection vs. Cyber Resilience: Mastering Both in a Complex IT Landscape

Today's always-on, hyperconnected world requires CIOs to confront two equally important concepts: data protection and cyber resilience. As reliance on data to fuel analytics, engineering, marketing, and other key operations increases, the complexity surrounding IT infrastructure grows in tandem. Hybrid workforces, edge computing, cloud-native applications, and legacy systems add further complexity to the mix.