Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tines

Friday Flows Episode 22: Run a Simulated Phishing Attack on your employees

A fundamental pillar of cybersecurity continues to be employee education & awareness. Today's Friday Flows features an easy way to test your employees & teach them to keep an eye out for suspicious emails. 👀 This Tines story created by Conor Dunne grabs a list of employees from your HR system and sends them a simulated phishing email. A Tines Case will be created to track if a link in the email is clicked.

Elastic's Mandy Andress on switching from a tech-first to people-first approach to security

To kick off season 5 of the Future of Security Operations podcast, Thomas is joined by Mandy Andress. Mandy is the Chief Information Security Officer at Elastic, a leading platform for search-powered solutions, and has more than 25 years of experience in information risk management and security. Before Elastic, Mandy led the information security function at MassMutual and established and built information security programs at TiVo, Evant, and Privada. She also founded an information security consulting company with clients ranging from startups to Fortune 100 companies.

How security teams manage threat intelligence with Tines

Every day, the growing threat landscape presents new challenges for security teams, with threats becoming more diverse and complex. But while teams typically have the tools to gather the intelligence they need, they often run into trouble with the next steps in the process - enriching, prioritizing and responding to this intel.

Securing Your Cloud Infrastructure with Azure & Tines

In the third instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your Azure environment. Firstly, we'll address the task of 'Updating groups assigned to a user in Azure Active Directory' which allows admins to update a user's group membership in Azure Active Directory. This is essential for adding extra security to accounts flagged for suspicious activity and protecting the team & company as a whole.

Using automated workflows to reach zero trust goals faster

In an ideal approach to zero trust, in which every user and device must continually prove their identity, automation is more than a useful tool, it’s essential to your federal agency’s success. You don’t need to take our word for it - security automation and orchestration is mandated by M-22-09 and M-21-31, and forms an integral part of the framework in CISA’s ZTMM (zero trust maturity model).