Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

The Critical Evolution of Cloud Detection and Response

Cloud security has reached an inflection point. Organizations have accelerated their cloud adoption and must navigate a complex threat landscape where workloads spin up and down in seconds, applications deploy continuously and identities span multiple services and providers.

Securely bringing your own AI to Tines

At Tines, we take pride in both the flexibility and security of our platform: it’s what allows us to do things like safely connect to any HTTP API in the world, and seamlessly deploy in fully air-gapped environments. Similarly, our AI capabilities have been designed from the ground up to be secure and private, with no logging, internet transit, or training on your data.

Future-gazing: How API Security Will Evolve in 2025

Who doesn’t love a little glimpse into the future? For cybersecurity—and more specifically, API security - gazing into the magic crystal ball may not strictly be necessary. But there are definite trends that will evolve for 2025 and make API security even more of an imperative for modern businesses. Here are our top five.

Why GenAI Should Be a Deciding Factor With Email Security Investments

The good news is that advanced email protection methods do not necessarily call for a trade-off. Generative AI (GenAI) is both a way to embrace innovation and an enabler of robust defense mechanisms to take action against dangers that are increasingly difficult to counter. Investing in this technology at any stage of your email security program can make your organization adaptive, future-focused, and fully prepared to mitigate the risks posed by cybercriminals leveraging AI tools for malicious purposes.

AI on your terms: introducing preferred AI providers in Tines

Leveraging AI is incredibly useful when orchestrating and automating your most important workflows. And it’s essential that you have the right AI model for your organization to handle those workflows as expected. Today, we’re excited to announce that you can select your preferred AI model when using AI in Tines products and features.

The Five Best Cloud Storage for Business Providers in 2025

Businesses are generating more data than ever, with 60% of company data being stored in the cloud, and businesses are storing 48% of their most important and sensitive data using some form of cloud storage. Even though businesses are using cloud storage, the risk of data breaches or attacks on company data is at the highest it's ever been, with 24% of breaches involving personal data and costing companies, on average, $4.88 million.

Ransomware Campaign Encrypting Amazon S3 Buckets using SSE-C

On January 13, 2025, Halcyon released a research blog about the Codefinger group conducting a ransomware campaign targeting Amazon S3 buckets. The attacks leverage AWS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data. The threat actors then demand ransom payments for the symmetric AES-256 keys required to decrypt it.

Demonstrating reduction of vulnerability classes: a key step in CISA's "Secure by Design" pledge

In today’s rapidly evolving digital landscape, securing software systems has never been more critical. Cyber threats continue to exploit systemic vulnerabilities in widely used technologies, leading to widespread damage and disruption. That said, the United States Cybersecurity and Infrastructure Agency (CISA) helped shape best practices for the technology industry with their Secure-by-Design pledge.