Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Grandfather-Father-Son Backup Explained

Protecting critical business data requires a reliable backup system that works consistently. The grandfather-father-son (GFS) backup rotation offers a structured approach through organized daily, weekly, and monthly backup cycles. The GFS backup scheme creates multiple recovery points, giving businesses flexibility when restoring data after unexpected issues.

Inside APT34 (OilRig): Tools, Techniques, and Global Cyber Threats

This blog is the latest in a series that delves into the deep research conducted daily by the Trustwave SpiderLabs team on major threat actor groups currently operating globally. APT34, also known as OilRig, Earth Simnavaz, and Helix Kitten, is a sophisticated, state-sponsored cyber threat group with suspected ties to Iran.

The Tines Lookback - a product recap of this past quarter (January 2025)

Here at Tines, we’re always looking for ways to continue enhancing how you build, run, and monitor your most important workflows. We asked a few of our Engineers, Designers, and Product Managers to hop on and show us their favorite features of the last few months. They covered topics such as: Visual updates to the change control review modal (00:24) New ways to build with conditional page elements (4:16) Working with arrays using the LOOP option (6:58) Using your preferred AI provider (10:26) Cases for mobile (13:16)

The Life of Pi - Privacy Leaders and Their Everyday

In today’s data-driven economy, enterprises are under increasing pressure to manage privacy risks effectively. The responsibility of identifying and mitigating these risks often falls on lawyers and Chief Data Privacy Officers (CDPOs), who must navigate complex regulatory landscapes, safeguard sensitive data, and ensure their organizations maintain customer trust.

Breaking Down Signature-Based Detection: A Practical Guide

Nearly 90% of cyberattacks are known methods that proper systems can detect, but most organizations don’t have the best defenses. Signature-based detection is a vital aspect of cybersecurity. It offers some benefits but also has some drawbacks. This blog will break it down simply to help you strengthen your defenses against new threats.