We sought to unify the access path for both the REST API and the Web app. We found that the best way to do this was to use the existing GraphQL API implementation to power both the Web App and the REST API. This is how we did it.
GreyNoise is a catalog of all scanning services on the Internet, both malicious and benign. Using Tines and GreyNoise together allows team to not only handle your noisiest alerts but also respond to threats to your organization.
Metaphors and similes are some of the most powerful tools for thinking available to us as software engineers. They allow us to apply intuition we’ve developed in one domain to another.
Since things move quickly around here, we’ve put together this round-up of some notable new enhancements aimed at helping your cybersecurity and operations teams save more time and effort.
A little inspiration goes a long way when it comes to deciding which processes to automate next, whether they’re for saving time or human power.
Employee Spotlight: Get to know some of the people building Tines and learn more about our company culture.
When security teams first jump into Tines, we often get asked where the best place to "put all your stuff" is. Using some proven techniques, Tines can help security teams quickly get a handle on all of their security alerts.
Relay is a JavaScript framework for fetching and updating GraphQL data in React. This is achieved by declaring the data requirements on a per-component basis while Relay takes care of optimising data fetching and performance.
We’re all getting quite familiar with the sunk cost fallacy as it applies to building software products. Projects that run to completion when their failure is a foregone conclusion.
Even when you’re told it won’t work, always try the simple thing first. Surprisingly often, it’s enough.
Connect to CrowdStrike, read new detections, and create a Jira ticket for each detection with Tines.
Tines helps teams operate more effectively and efficiently without sacrificing best-of-breed software and control. #YDWWT is a light-hearted way to showcase the myriad of processes you can automate with our platform.
Introducing our employee spotlight! Get to know some of the people building Tines behind the scenes and learn more about our company culture.
There are lots of different approaches that companies use to evaluate whether a candidate is the right person for a role. At Tines, we want to make sure our process shows us how candidates would perform when doing the actual work...
Having a collaborative community that’s willing to share intel and resources to help all of us create better security strategies is arguably more important than having the right tools in your stack.
In a world where detecting and responding to incidents quickly is a key metric for any security program, automating the collection and analysis of suspicious URLs can reduce mistakes and improve response times. Above all, it will make your…
Tips, tricks, and best practices to help you get more from the Send to Story Action.
The question needs to be asked- if you’re trialing a Security Automation platform, what should you automate first?
Explore how Tines can be used to take logs from G Suite and forward them to ELK (Elasticsearch, Logstash, Kibana) for analysis and alerting.
Explore how Tines can be used in conjunction with out-of-the-box features provided by GSuite and Microsoft Exchange to amplify CEO Fraud detection and response.
We want demos of the Tines security automation platform to be different. In this post, we explore how we use our platform to automate customer demo preparation, ensuring we provide as valuable an experience as possible.
In this post we share a methodology security operations center analysts and engineers can use to help them develop a compelling SOAR or security automation proposal. We also share a deck based on the methodology, which you can use to develop your pitch.
Explore some of the DevSecOps design decisions we’ve made internally and why Tines is a great platform if you need to automate your own complex processes.
In part two of our deep-dive series into end-to-end automation of abuse inbox management and phishing response, we added additional URL threat intelligence services and submitted suspicious attachments to multiple malware sandboxes.