How to crowdsource detections related to logins from new or suspicious locations in a few simple steps.
How to leverage intelligent automation to give you the edge you need to stay ahead of what’s coming next, as complexity grows and incidents accelerate within your organization.
How to quickly upload text and attachments from emails to AWS S3 and then how to perform additional security and semantic analysis on them.
How to introduce modularization to a Story to enable its reuse across teams and future workflows.
How Tines helps teams securely draw from multiple data sources and use a range of patterns to carry out their defensive work at scale and across multiple channels.
A conversation with our CEO, Eoin Hinchy, on how using Carbon Black together with Tines can help make security teams more efficient, effective and happier.
In this tutorial, we'll demonstrate how to subscribe to notifications in Microsoft Graph.
We’ve written many blogs about how to analyze suspicious emails, attachments, URLs, even email headers. However, there is a consistent question prospects ask about analyzing emails – how does Tines automate the analysis of .eml files?
TinesBot is an automation Story built within the Tines automation platform which shares threat intelligence generated by the infosec community.
A Story run allows you to trace the exact path an event took through a Story. It contains the agents and their emitted events allowing you to easily troubleshoot and benchmark your automation stories.