Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

How Tines achieved SOC 2 compliance in record time, saving 250+ human hours

Achieving any kind of compliance can be grueling. Ensuring your organization is SOC 2 compliant is often a particularly laborious endeavor, requiring extensive resources to obtain and maintain. SOC 2 is a comprehensive cybersecurity compliance framework developed by the AICPA (American Institute of Certified Public Accountants). It helps guarantee third-party service providers handle customer data with appropriate security measures.

Lacework's Andreas Schneider: How to adapt as a CISO and the value of security failures

In this episode of the Future of Security Operations podcast, Thomas interviews Andreas Schneider - the Field CISO EMEA at Lacework. Leveraging its data-driven platform and cloud-native application protection solution, Lacework helps organizations make sense of immense amounts of security data with minimal effort.

GitHub's Jacob DePriest: How to attract and retain more diverse security talent

In this episode of Future of Security Operations, Thomas speaks with Jacob DePriest, VP & Deputy Chief Security Officer at GitHub, a company with a mission "to help every developer - regardless of experience level - learn, code, and ship software effectively." Before joining GitHub, DePriest spent more than 15 years as a senior executive at the National Security Agency (NSA) in the US.

It's time to rethink how we market and sell security products

With changing technology, evolving security threats, and the vast number of vendors out there, companies intent on successfully selling their products need new approaches. At the end of the day, it isn’t about convincing someone to buy your product whether they need it or not, but ensuring that your product is the right fit for them and that it will solve their problems—some of which they probably don’t realize they have.

Introducing the ability to build apps with Tines

Companies depend on Tines to protect their business through mission-critical automation workflows. Since the earliest versions of Tines, we’ve enabled users to put humans in the loop through forms and prompts. Workflows pause until a person completes an action via an email or messenger prompt. But these features felt limited, with the need for additional human interactions to take place elsewhere creating time-consuming friction.

Protect your cloud infrastructure at scale with Wiz and Tines

Increased cloud adoption has introduced new security risks; organizations need to protect invaluable, sensitive data that can be accessed from anywhere. Traditional methods no longer suffice - today’s security operations teams must adopt innovative solutions and streamlined processes to effectively manage the increase in complexity and ensure mission-critical cloud loads are safeguarded.

Utilizing Tines' Automation Capability Matrix

Automation is often seen as the natural progression for a security operations center. However, deciding where and when to implement it can be pretty challenging. As an earlier blog post covers, Tines' Automation Capability Matrix is an innovative set of techniques that empower security operations teams to respond proactively and tackle common cyber-security incidents.

What's exacerbating the cybersecurity skills gap and how to overcome it in 2023

As organizations grapple with new economic realities, security leaders face the familiar challenge of keeping their systems and data safe with limited resources. To continue to do more with, in many cases, even less is a tricky tightrope walk that requires creativity and strategy to ensure overall success. To make the most of whatever resources are available, it’s important for security teams to evaluate their unique needs and vulnerabilities carefully.

Enhance threat response with Tines' Automation Capability Matrix

Tines' Automation Capability Matrix is a set of techniques designed to help security operations teams understand their automation capabilities and respond more efficiently to security incidents. With this new matrix, teams can identify automation opportunities and implement strategies to enhance their threat response efforts. This blog offers key insights into the Automation Capability Matrix, giving you a comprehensive understanding of its purpose and benefits.