Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest News

Using Python in Tines: a quick how-to guide

While you can build nearly anything in Tines without writing code, users occasionally prefer to use Python scripts to perform a step in their stories. The reasons for this vary, but we're happy to share that there's a simple way to securely execute Python scripts in Tines. So let's take a closer look at how it works, and talk through some best practices for using Python in Tines.

From code to clicks: My journey from Python to Tines

We recently weighed in on the debate between full-code, low-code and no-code automation. In this post, developer and sales engineer Jesse Strivelli shares his perspective on using the native Tines builder to create automated workflows. I've been immersed in the world of programming for years, having pursued a computer science degree at university and accumulating extensive experience in the field, primarily with major Fortune 500 companies.

Snyk welcomes Helios, accelerating our ASPM vision with runtime insights

As applications and their software supply chains become more complex, designing an AppSec program that is agile enough to keep pace, while still providing a clear, enterprise-wide view of risk requires a deep understanding of applications — depth that covers every line of code and package from development all the way to their live, running state.

Are They Really Playing? Get to Know Play Ransomware

Play is a recent entrant into the realm of ransomware, with its initial appearance being identified in June 2022. In this context, “Play” encompasses both the entity responsible for its development and distribution, as well as the name of the executable used for the ransomware. Following a pattern observed among numerous actors in this domain, Play has embraced the strategy of double extortion.

Protecting your business against impersonation attacks

Companies grow through mergers and acquisitions. Marketing teams promote new products. New products spawn new web domains. As brand names, URLs, and cloud IT infrastructure proliferate, so do enterprises’ vulnerability to online attacks. At the same time, security professionals working with limited resources find it increasingly challenging to maintain oversight of their online assets.

How to save, share, and manage passkeys using 1Password

You can save all sorts of sensitive information in 1Password including your usernames and passwords, addresses, credit cards, and medical records. It’s also a safe and convenient place to store your passkeys – a new type of login credential that lets you sign in to accounts with unmatched security and convenience.

How to Manage 'Execute as Admin' Workflows in NetSuite

Last week, in response to an increasing number of questions from our NetSuite customers, we showed you how to manage scripts that execute in the Administrator role. One thing it didn’t cover, however, was workflows that execute as Administrator. The process for resolving this with Netwrix Strongpoint or Flashlight is similar — but there are some additional considerations that merit discussion in this post, particularly if you want to avoid material deficiencies on audit.

A 'Deep Clean' for Your Org: Salesforce Data Cleansing and Metadata Cleanup

As your business grows, so will your Org. And while a highly customized Salesforce Org reflects a booming business, there’s a critical difference between necessary complexity and technical debt. In the spirit of spring cleaning, we wanted to share two strategies for reducing technical debt: Salesforce data cleansing, and cleaning up unnecessary customizations and metadata in your Org. Both go hand-in-hand in improving usability and adoption.