Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Gather & add correlated searches in Splunk Enterprise Security to Drata

Tired of manually exporting Splunk correlated search data into your compliance tools? This 5-minute flow from the Tines story library automatically queries Splunk Enterprise Security's notable index, polls for results, and uploads them directly as external evidence to your Drata security controls.

What Cybersecurity Risks Does CNC Automation Introduce in 2026?

Manufacturing floors are no longer air-gapped environments. As CNC machines connect to networks for automated loading, real-time monitoring, and remote diagnostics, they become potential entry points for cyber attackers targeting industrial operations. Companies like Gimbel Automation are advancing in-machine CNC automation that reduces manual labor and increases throughput. But every connected system, from spindle grippers to pneumatic workholding, needs cybersecurity planning alongside its mechanical engineering.

SOC Tool Sprawl: What It's Really Costing Your Security Operations

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo Security operations teams have never had more technology at their disposal… and they’ve never been more overwhelmed by it. The average SOC is now running 7 AI-powered solutions. 10% are managing 10 or more. And across the broader enterprise, organizations deploy an average of 83 security tools from 29 vendors, according to IBM research.

Extending ITSM with orchestration: from ticket to action

IT Service Management platforms like ServiceNow and Jira Service Management have fundamentally shaped how modern IT organizations operate. They bring structure to incident response, discipline to change management, and consistency to request fulfillment. For many enterprises, ITSM is the operational backbone that keeps digital services reliable, governed, and accountable.

Add alert evidence from Armis to Drata controls

Automate compliance evidence collection from Armis to Drata in under 5 minutes. Manually gathering and uploading alert evidence for compliance audits is time-consuming and error-prone. In this video, we walk through a Tines story that automatically pulls unhandled alerts from Armis and uploads them as external evidence to the matching alert controls in Drata, complete with pagination handling so no data gets missed. The result is a fully automated compliance evidence pipeline that saves your team hours of repetitive work.

Building Smarter Virtual Assistants with Gemini 3 Flash API: AI for Seamless Workflow Automation

As teams become more distributed and workloads continue to increase, the need for effective automation tools has never been greater. Traditional methods of collaboration often fall short when it comes to handling repetitive tasks, managing high volumes of information, or providing real-time, intelligent support. That's where AI virtual assistants come in, changing how teams collaborate, streamline workflows, and boost productivity.

How Armature Systems Uses Tines to Transform Our SOC Into a Faster, Leaner, Low-Friction Machine

Security operations often feel like a paradox: a discipline built on high-speed decision-making wrapped inside layers of noisy, inconsistent data. Every alert has some useful and not so useful noise, but only a few truly matter. Our job is to know the difference. For us, Tines became the medium through which the noise resolved into signal.

The CISO's Role Is Rapidly Changing

See how Torq harnesses AI in your SOC to detect, prioritize, and respond to threats faster. Request a Demo John White is the Field CISO for EMEA at Torq. A respected security executive with more than 20 years of leadership experience, John previously served as CISO at Virgin Atlantic, where he led a multi-year transformation deploying the Torq AI SOC Platform to modernize cyber operations.