Detection & Response Senior Security Engineer, Brandon Maxwell, describes how Auth0 use Tines to respond accurately at scale to security alerts.
Learn how to automate response to AWS Security Alerts using AWS Cloudwatch and SNS together with the Tines Security Automation platform.
Automate the Elasticsearch Search API to rapidly create canned and shareable threat hunting tools for you and your team.
How to subscribe to a Google Workspace endpoint and receive webhooks for important user account events. This will let us build custom workflows and tailored security responses for a range of scenarios.
A brief look at how to get connected (and authenticated) to the CrowdStrike API and enable Tines to utilize many aspects of the CrowdStrike Falcon platform.
Explore and then automate search operations for a simple Threat Hunting example. We will then turn our learnings into a fully-fledged self-service internal tool for use by colleagues (or perhaps other teams in your organization).
How to leverage some basic Qualys automation to maximize your impact and efficacy.
In the digital realm, we, as defenders, are too often on the back foot. We hunt for and react to an attacker’s movements, but what if we could tripwire certain paths and automate what happens next?
Continuous Improvement should imply 'Continuous Security', but is this really achievable? From a security operations perspective, the question then becomes, how do we automatically track, record, and address risk in near-real-time.
This is part 3 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response,
This is part 2 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response.
This is part 1 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response.
We’re excited to announce Phish.ly, a free service, built in partnership with urlscan, that allows security teams to automate the analysis of suspicious emails.
The ability of a security case management system to integrate with other systems, while itself providing a first-class API for automation, is also key in accelerating response times, enabling rapid enrichment, and fostering collaboration.
How to crowdsource detections related to logins from new or suspicious locations in a few simple steps.
How to leverage intelligent automation to give you the edge you need to stay ahead of what’s coming next, as complexity grows and incidents accelerate within your organization.
How to quickly upload text and attachments from emails to AWS S3 and then how to perform additional security and semantic analysis on them.
How to introduce modularization to a Story to enable its reuse across teams and future workflows.
How Tines helps teams securely draw from multiple data sources and use a range of patterns to carry out their defensive work at scale and across multiple channels.
A conversation with our CEO, Eoin Hinchy, on how using Carbon Black together with Tines can help make security teams more efficient, effective and happier.
In this tutorial, we'll demonstrate how to subscribe to notifications in Microsoft Graph.