A little inspiration goes a long way when it comes to deciding which processes to automate next, whether they’re for saving time or human power.
Employee Spotlight: Get to know some of the people building Tines and learn more about our company culture.
When security teams first jump into Tines, we often get asked where the best place to "put all your stuff" is. Using some proven techniques, Tines can help security teams quickly get a handle on all of their security alerts.
Relay is a JavaScript framework for fetching and updating GraphQL data in React. This is achieved by declaring the data requirements on a per-component basis while Relay takes care of optimising data fetching and performance.
We’re all getting quite familiar with the sunk cost fallacy as it applies to building software products. Projects that run to completion when their failure is a foregone conclusion.
Even when you’re told it won’t work, always try the simple thing first. Surprisingly often, it’s enough.
Connect to CrowdStrike, read new detections, and create a Jira ticket for each detection with Tines.
Tines helps teams operate more effectively and efficiently without sacrificing best-of-breed software and control. #YDWWT is a light-hearted way to showcase the myriad of processes you can automate with our platform.
Introducing our employee spotlight! Get to know some of the people building Tines behind the scenes and learn more about our company culture.
There are lots of different approaches that companies use to evaluate whether a candidate is the right person for a role. At Tines, we want to make sure our process shows us how candidates would perform when doing the actual work...
Having a collaborative community that’s willing to share intel and resources to help all of us create better security strategies is arguably more important than having the right tools in your stack.
In a world where detecting and responding to incidents quickly is a key metric for any security program, automating the collection and analysis of suspicious URLs can reduce mistakes and improve response times. Above all, it will make your…
Tips, tricks, and best practices to help you get more from the Send to Story Action.
The question needs to be asked- if you’re trialing a Security Automation platform, what should you automate first?
Explore how Tines can be used to take logs from G Suite and forward them to ELK (Elasticsearch, Logstash, Kibana) for analysis and alerting.
Explore how Tines can be used in conjunction with out-of-the-box features provided by GSuite and Microsoft Exchange to amplify CEO Fraud detection and response.
We want demos of the Tines security automation platform to be different. In this post, we explore how we use our platform to automate customer demo preparation, ensuring we provide as valuable an experience as possible.
In this post we share a methodology security operations center analysts and engineers can use to help them develop a compelling SOAR or security automation proposal. We also share a deck based on the methodology, which you can use to develop your pitch.
Explore some of the DevSecOps design decisions we’ve made internally and why Tines is a great platform if you need to automate your own complex processes.
In part two of our deep-dive series into end-to-end automation of abuse inbox management and phishing response, we added additional URL threat intelligence services and submitted suspicious attachments to multiple malware sandboxes.
Managing abuse inboxes and phishing response across an enterprise is often a complex and manual operation. In this multi-part video series, we provide detailed instructions on how to use Tines to automate the process end-to-end.
Security teams need access to relevant data and systems to investigate and respond to security threats. In this post, we explore how to automate common G Suite security tasks.
We’re excited to announce that we’ve completed our Series-B funding to support our explosive growth, to ensure that every one of our customers continues to be successful, and to double down on our ambitious product vision.
Work with alerts generated by detections, query the log analytics backend of Azure Sentinel with data from other sources, and add threat intelligence indicators leveraging Azure Sentinel's watchlist and Tines.