Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

A Real Example of Copilot Exposing Sensitive Data

Is Microsoft Copilot putting your sensitive data at risk? AI tools like Copilot can unintentionally expose sensitive information through indirect queries leading to data leaks, insider threats, and compliance risks. In this webinar, we break down real-world examples of how over-permissioned access and prompt manipulation can bypass security controls and what you can do to prevent it. Stay ahead of AI-driven threats.

Introducing the AI Agent action

Today, we’re announcing a way to build and deploy agents in Tines through our AI Agent action. In the AI market, AI agents suddenly seem to be everywhere – software that can autonomously think and perform tasks on behalf of the user. But we’re still very early in the adoption curve of agents. One thing we’ve noticed is that most solutions can’t handle the varying complexities of mission-critical workflows.

AI Agent action - Task or Chat?

AI Agents give you the power to do so much, reducing friction between your team and other departments without adding to your team’s workload. So where do you start? The first thing to decide is whether you want to use a task or chat. This video explains when you should use a task, and when chat is better suited to your story. New to Tines? Sign up for our always-free Community Edition and start building right away.

How AI-Powered Tools Are Revolutionizing Online Education security

Let's face it: the digital shift in education is permanent. Virtual classrooms, remote assignments, cloud-based exams-these are no longer futuristic concepts; they're the present-day norm. But while the benefits of flexibility and accessibility are undeniable, the vulnerabilities lurking beneath the surface are equally real. Imagine a scenario: a student logs into a popular education app from a public Wi-Fi network. That very act, innocent on the outside, can be a digital goldmine for cyber intruders if the platform lacks proper safeguards.

Why AI Trust Will Shape Your Next Decade of Software Development

AI is often compared to electricity, but without trust, it’s just a live wire. As organizations adopt AI to move faster, reduce manual effort, and push the boundaries of what’s possible, one truth is becoming clear: trust in AI isn’t optional. It’s foundational. And for software development teams, AI Trust is now the north star that guides safe, scalable innovation.

The privacy illusion: when deleting your data doesn't actually delete your data

Let’s talk about privacy—specifically, the kind you thought you had when you hit “delete.” OpenAI received a court order to retain every single ChatGPT conversation, even the ones you erased. Yep. Even the awkward ones. Even the ones that start with, “Hypothetically, if I were to…” Why? Because The New York Times is suing them over copyright, and now everyone’s deleted chats are potential evidence.

Defending at Machine Speed: Guiding LLMs with Security Context

Large Language Models (LLMs) provide strong reasoning and data summarization capabilities, making them valuable proxies for a variety of cybersecurity operations tasks. However, their performance can decline when applied to highly specific or enterprise-contextual tasks, particularly if the models rely solely on public internet data.

CISOs Brace for a Wave of AI-Powered, Domain-Based Cyber Threats

Domain-name system (DNS)- based cyber attacks are becoming increasingly complex, and AI will only make managing them even more challenging. According to a recent report, Chief Information Security Officers (CISOs) anticipate a tumultuous season of cyber threats, with low confidence in their abilities to defend against them effectively.

First Look, Then Leap: Why Observability is the First Step in Securing your AI Agents

AI Agents aren’t coming - they’re already here! reshaping industries, enhancing productivity, and unlocking new possibilities. Embedded in tools like Microsoft 365 Copilot, Salesforce Einstein, and custom-built assistants, they’re making decisions, automating workflows, and interacting with sensitive business data in real time. This wave of innovation is moving fast, but for once, security doesn’t have to play catch-up.