Explore our core capabilities to transform your workflows.
Be inspired by over 500 pre-built workflows.
Discover our latest updates and releases.
A detailed look at how automated threat intelligence enrichment results in better insights, more thorough investigation, and faster remediation for Tines customers.
How do federal agencies ensure a successful shift towards zero trust? It starts with a zero trust security tech stack that serves your org’s unique needs.
Federal agencies are at a critical junction in the journey towards zero trust, but, the right workflow automation platform can help them get there faster, and with fewer resources.
Regional Vice President of Cyber Solutions at Elastic John Harmon shares best practices for federal agencies looking to reach their zero trust goals.
By filling out this form you agree to the terms and conditions in our Privacy Notice.
Malware analysis is important for understanding incidents and strengthening defenses against attacks. Here’s how to build and manage them using Tines workflows.
Kevin Menezes, Sr. Manager, Customer Success, shares his best practices for getting started with Tines.
83% of practitioners are using podcasts to stay informed on cybersecurity news and ideas. But which podcasts are they listening to?
Developer Jesse Strivelli reflects on the key differences between automating workflows using Python and the native Tines builder.
We're sharing best practices for users who prefer to use scripts to perform a step in their Tines workflows.
Yes, you can run scripts and Linux commands natively in Tines. But you might not necessarily want to. Here, we explore why.
Insights on AI's role in security, the ever-changing role of the CISO, and more.
Tines users love the pages feature so much, they started asking for pages within pages. Now they’re here!
Which security conferences are SOC analysts and leaders prioritizing in 2024? A new report reveals the 7 most popular events in the cybersecurity calendar.
Tines scales by design and by default. Our approach to scaling starts with the fundamental workings of our product, and continues through to the use of industry-standard tools and best practices in our execution.
Industry veteran Dmitriy Sokolovskiy discusses the art of responding to your own mistakes, and explains why cybersecurity needs a rebrand.
Introducing the 2023 Voice of the SOC report, packed with insights from our survey of 900 security professionals.