Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Falcon Exposure Management's AI-Powered Risk Prioritization Shows Organizations What to Fix First

As the attack surface expands and the number of vulnerabilities grows, organizations face a new crisis: how to prioritize which vulnerabilities to fix first based on their level of risk. CrowdStrike Falcon Exposure Management addresses this challenge with new AI-powered capabilities to help defenders identify what matters most and take action with precision. New innovations include AI-powered Asset Criticality, Client-Side Attack Path Analysis, and a CrowdStrike Falcon Next-Gen SIEM integration.

NGINX Integration: How to install nginx and instrument it to observe API traffic

In this step-by-step tutorial, we walk you through the complete process of installing NGINX and instrumenting it to monitor and observe API traffic. Whether you're just getting started or looking to improve your observability stack, this guide will help you set up NGINX for effective traffic monitoring. In this video you'll learn: Why is this important? Observing API traffic helps you detect issues early, optimize performance, and ensure your services are running smoothly.

GDPR vs CCPA: The Differences You Need to Know

The European Union’s General Data Protection Regulation (GDPR) and the California Consumer Privacy Act (CCPA) are two essential and well-known regulations designed to protect user data. However, despite the similarities, there are major differences between them. To help you gain more clarity on GDPR vs CCPA, we will explain the similarities and differences, so you can understand more about how both can help you manage your data. Table of contents.

What is muckwork?

Muckwork: the low-leverage, repetitive tasks that keep teams from doing their best work. At Tines, we’re on a mission to eliminate it. Forever. Our CEO Eoin Hinchy published The End of Muckwork, sharing how AI and orchestration, built with intention and control, can transform how teams work. Now, we’re bringing that mission to life in a new video. Read the blog: tines.com/blog/the-end-of-muckwork.

AI Agent action - Task or Chat?

AI Agents give you the power to do so much, reducing friction between your team and other departments without adding to your team’s workload. So where do you start? The first thing to decide is whether you want to use a task or chat. This video explains when you should use a task, and when chat is better suited to your story. New to Tines? Sign up for our always-free Community Edition and start building right away.

What Are Website Vulnerabilities?

What exactly are website vulnerabilities, and why should you care? In this video, we explain what website vulnerabilities are, how attackers exploit them, and the risks they pose to your business or personal website. From SQL Injection and Cross-Site Scripting (XSS) to security misconfigurations—understand the basics with simple examples.

The User Risk Puzzle: Why Your Security Tools Don't Add Up

As a security leader, you face an inevitable daily reality: a flood of alerts pouring in from dozens of different tools. Risky sign-ins are flagged in Microsoft 365, weak passwords are pinged from a vault audit, and a separate report identifies which employees failed the latest phishing simulation. While all this information is valuable, most leaders are unable to connect these separate data points to paint a clear, cohesive picture of an individual user’s overall risk.

The Mother of All Breaches: A Corporate Credential Security Wake-Up Call

Cybersecurity researchers uncovered what is being called the "mother of all breaches," a colossal dataset containing 16 billion login credentials, including user passwords for Google, Facebook, and Apple. To put that figure in context, the cache represents twice the current human population of the Earth. This event was not the result of a single breach, but likely a compilation of data stolen from multiple breaches over many years.