Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Friday Flows Special Edition: Change Control with AI Summary

Tyler Talaga, Staff Engineer at MyFitnessPal, is one of the early adopters of Tines' AI capabilities. In this special "Wednesday Workflows," Tyler walks through a story he built to improve the visibility of Change Control requests. This workflow routes Change Control requests to Slack with a detailed summary provided through the AI Action, helping the team quickly approve (or deny) a change. The MyFitnessPal team is building many new, helpful automations with the AI capabilities, including one to summarize vulnerabilities fixed in MacOS updates.

Policy Enforcement Redefined: Panoptica Integrates with Multi-Cloud Defense making it the first CNAPP solution to expand into Network Security

In the dynamic landscape of cybersecurity, the integration of cutting-edge technologies is paramount to stay ahead of evolving threats. In this pursuit, the fusion of Panoptica’s robust capabilities with Multi-Cloud Defense emerges as a game-changer. This groundbreaking integration not only fortifies organizations against multifaceted risks but also establishes a new paradigm in policy enforcement for unparalleled security.

Securing next-gen development: Lessons from Trust Bank and TASConnect

Today, the average application contains thousands of moving parts. Organizations deploy to multi-cloud environments with containers and microservices, using a combination of code written by internal teams, generated by AI, and curated by third parties. Security teams face a tall order in keeping these complex applications secure, especially given the increasing number of software supply chain attacks.

Operation Grandma: A Tale of LLM Chatbot Vulnerability

Who doesn’t like a good bedtime story from Grandma? In today’s landscape, more and more organizations are turning to intelligent chatbots or large language models (LLMs) to boost service quality and client support. This shift is receiving a lot of positive attention, offering a welcome change given the common frustrations with bureaucratic delays and the lackluster performance of traditional automated chatbot systems.

Psychological Deterrence: Using Simple Tactics to Prevent Cyber Attacks | Razorthorn Security

Learn from Robert Black about using psychological deterrence in cybersecurity. He shares insights on how simple techniques, like the presence of CCTV or symbolic imagery, can influence behaviour and prevent attacks. Discover how these principles can be applied in cyberspace.

Three Questions to Ask About Your Cloud Security Posture

For most organizations, the decision to adopt cloud technologies is a simple one. Cloud apps streamline operations and costs while enabling users to access resources from anywhere and on any device. But migrating to the cloud has also introduced some complexity, which comes with new risks. Instead of everything residing neatly within your corporate perimeter, your data now resides within countless apps and is being handled by users and endpoints that operate outside of your sphere of influence.

Introducing AI in Tines

Everyone in the market is talking about AI right now. It’s a modern marvel; some say it might even be as big as the Industrial Revolution. We’re not big on grandiose statements like that, but we are big on delivering products that help our customers be more efficient and secure and, as a result, have happier and more engaged teams. That’s why today, we’re excited to announce AI in Tines. Two powerful features to make Tines even more accessible to any member of your organization.

7 Types of exposures to manage beyond CVEs

As cybersecurity leaders try to get ahead of threats to their organization, they're increasingly seeking ways to get off the hamster wheel of chasing countless CVEs (common vulnerabilities and exposures). The brass ring that most CISOs reach for today is prioritization of exposures in their infrastructure (and beyond), so their teams can focus on tackling the ones that present the greatest risk. In some cases, the highest priority exposures will still be critical CVEs on mission critical assets.

Transforming Security: Kerstin Demko's Vision at Brivo

In this exclusive video, we dive deep into the heart of Brivo's innovation - led by none other than Kerstin Demko. Discover how Brivo is revolutionizing the security industry with its user-friendly cloud solutions. Under Kerstin's guidance, Brivo is not just about enhancing security; it's about creating smarter, more efficient spaces that empower businesses and individuals alike.