In this episode of the Future of Security Operations podcast, Thomas chats with Morey Haber, Chief Security Officer at BeyondTrust. BeyondTrust is a worldwide leader in Privileged Access Management (PAM), focused on addressing the most urgent cybersecurity challenges, including zero trust, ransomware, cloud security, and more.
Automation has revolutionized the way cybersecurity functions. Not only has it led to significant time savings, but it has also improved the consistency and accuracy of various processes. Here, we will discuss how to effectively record the time saved from automation to demonstrate its value. Tines offers great utilities to easily record the time an analyst has saved by automating manual, repetitive tasks over the course of a day, right down to the second.
Today, we’re announcing the ability to build APIs with Tines. Now you can create powerful workflows by connecting more tools and processes together - all without any code at all.
Incidents are an inevitable part of security, no matter how airtight your processes and systems are or how small your company is. Organizations saw a 125% increase in incidents from 2020 to 2021. Despite the tremendous amount of investments in security by major companies such as Uber, Okta, Microsoft, FireEye, and even the US Government over the past half-decade or so – they have all been successfully targeted by cyber attackers.
In this episode of the Future of Security Operations podcast, Thomas interviews Arthur Barnes, Senior Director of Security Operations at Oracle – the world’s largest database management company. Arthur is an experienced cybersecurity leader with 20 years of experience, having previously worked at Pearson, Dell, and M&S.
Integrate your Tines workflows in more places by enabling the response data switch via send to story. This makes it possible for an HTTP request that initiates a story run to receive event data back from the completed story run. Get started by reading the docs.
Security teams are using automation solutions more and more to achieve consistent and faster response times. Some of these responses require emails to be sent to various users or groups, and traditional methods of sending emails are outdated and not very secure. Security teams also need the ability to read emails from specific mailboxes, whether that is for automating responses to phishing submissions or something similar.