Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Videos

How to Backup and Recovery for MySQL Database Server| BDRSuite Demo

In this BDRSuite demo, I'll guide you through configuring backups for your MySQL Database Server and restoring your data when needed. BDRSuite offers database-level backup for MySQL with flexible storage options, granular recovery, centralized management, and more.

Threat Hunting for macOS, Part Two

In part 1 of our Threat Hunting for macOS webinar series we explored basic use cases for utilizing macOS Unified Logging (MUL) and system telemetry to uncover suspicious behavior. Building upon this foundation, in part two we explore more intricate use cases and tap into third-party logs to uncover sophisticated attack TTPs.

Friday Flows Episode 33: From traditional SOAR to Tines automation, an engineer's perspective

Part 2 of Cameron's conversation with solutions engineer and experienced SOAR engineer Sif Baksh features a quick walkthrough of a simple but powerful workflow. This is a really interesting use of Tines Pages & Resources to simplify an impactful security use case. It also leverages GitHub and Cobalt Strike.

Friday Flows 35: Tines Workbench showcase

Tines Workbench is here, a true evolution in how automation and AI is leveraged within operations for security and IT. If you missed it, Workbench is a Tines-powered AI chat interface where you can take action and access proprietary data in real-time, privately and securely. In this episode of Friday Flows, Cameron welcomes security researcher Michael Tolan, who showcases Workbench's capabilities by focusing on a suspicious Okta login.