Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

September 2023

Smart, secure workflows for the whole team

Hi everyone, In a company all hands at the start of 2023, I shared that before the end of the year, we would officially make Tines available to teams outside security. You had a lot of questions, the most common of which was “why are we doing this?” My answer was that “this was always the plan”. Although true, that wasn’t exactly a helpful or insightful response.

Friday Flows Episode 6: Normalize Alerts with ChatGPT

The strides in GenAI have been remarkable this year, but we're all still trying to figure out how to impact our day-to-day work. In this demo, we use AI in the best way we know how to at Tines: by speeding up a security analyst's work and making their life a little easier! Use ChatGPT to normalize alert formats, in this case from CRWD. Alerts from multiple sources are converted into a standard format for easier processing by a SOC, and a ticket is then created.

Integrate HashiCorp Vault & 1Password using Tines

API-based automations rely on credentials and secrets. Managing these secrets across multiple locations can increase the workload for administrators. In this webinar, Tines Solutions Engineer Chris Kohanek will show you how to securely reference secrets stored in 1Password and HashiCorp Vault. This means you won't need to store API credentials in Tines, and updates to your secrets won't disrupt your Tines Stories. We'll also guide you through setting up a Secrets Automation Workflow in 1Password and demonstrate how Tines can automate the process of referencing secrets, making it more secure and reducing the administrative burden on your team.

Webinar - Securing your Cloud Infrastructure with AWS & Tines

In the first instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your AWS environment. Our first story monitors AWS IAM access keys and automatically deactivates any that are older than 30 days. Our second story looks at automatically stopping and starting EC2 instances that may have been spun up for testing purposes.