Processing and enriching AWS Security Hub findings in Tines

How to send findings from Security Hub to Tines so they can be enriched, prioritized, deduplicated, and ticketed.

Dynamodb and Tines security automation

How security teams can use AWS DynamoDB as a database in their automation Stories.

Automating URL analysis with Tines and URLScan

We are delighted to announce that Tines is sponsoring one of our favorite tools, URLScan.io. In this blog, learn more about URLScan automation.

Malware analysis automation using public and private sandboxes

In this blog we examine some private and public sandboxes that analyze suspicious files, and how the results of the analysis can help proactively protect our environments.

Automate the analysis of email headers using Tines

Continuing our series analyzing on automating the analysis of phishing messages, this blog will look at the importance, and methods, for analyzing email headers.

Threat intelligence sharing with Tines

This is the first blog in a series looking at how companies are consuming and sharing threat intelligence using Security Orchestration and Automation platforms like Tines.com.

SOAR tools and the crayon problem

The single most important feature of a Security Orchestration Automation and Response (SOAR) tool is its ability to integrate with other tools and systems, for example, SIEMs, case managers and threat intelligence feeds.

Centralize, triage and, respond to alerts from the Google Workspace (G Suite) Alert Centre

Explore how G Suite administrators and security teams can leverage security orchestration automation and response (SOAR) platforms, like Tines, to centralize, triage and respond to alerts from the G Suite Alert Center.

Exploring the VirusTotal API: Getting started with no-code automation

In this post, we explore the VirusTotal API. We also look at how Tines and no-code automation can power-up your usage of the VirusTotal API.

Automated information and data leaks

Security teams often unintentionally expose sensitive company information via sandboxes. Here we explore how no-code automation can help you avoid these data leaks.

Enabling Tines for Microsoft Graph security automation

Use information such as Outlook emails, organizational structure, advanced threat analytics, and more in your security automation program.

Automating abuse inbox management and phishing response (Part 2)

In part 1 of our Automating abuse inbox management and phishing response video series, we introduced the key concepts of Tines and built a basic Story. Here, in part two of the series, we go deep and add a lot of capability to our Story.

Automating trial creation

In this post, we explore what happens after you request a trial instance.

←  Prev