Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Tines

Friday Flows Episode 6: Normalize Alerts with ChatGPT

The strides in GenAI have been remarkable this year, but we're all still trying to figure out how to impact our day-to-day work. In this demo, we use AI in the best way we know how to at Tines: by speeding up a security analyst's work and making their life a little easier! Use ChatGPT to normalize alert formats, in this case from CRWD. Alerts from multiple sources are converted into a standard format for easier processing by a SOC, and a ticket is then created.

Integrate HashiCorp Vault & 1Password using Tines

API-based automations rely on credentials and secrets. Managing these secrets across multiple locations can increase the workload for administrators. In this webinar, Tines Solutions Engineer Chris Kohanek will show you how to securely reference secrets stored in 1Password and HashiCorp Vault. This means you won't need to store API credentials in Tines, and updates to your secrets won't disrupt your Tines Stories. We'll also guide you through setting up a Secrets Automation Workflow in 1Password and demonstrate how Tines can automate the process of referencing secrets, making it more secure and reducing the administrative burden on your team.

Webinar - Securing your Cloud Infrastructure with AWS & Tines

In the first instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your AWS environment. Our first story monitors AWS IAM access keys and automatically deactivates any that are older than 30 days. Our second story looks at automatically stopping and starting EC2 instances that may have been spun up for testing purposes.

Securing your Cloud Infrastructure with AWS

In the first instalment of "Tines, securing your cloud infrastructure" we look at two stories designed to save money and resources and close potential security gaps in your AWS environment. Our first story monitors AWS IAM access keys and automatically deactivates any that are older than 30 days. Our second story looks at automatically stopping and starting EC2 instances that may have been spun up for testing purposes.