Deception Tech and Automated Incident Response
Tutorials

Deception Tech and Automated Incident Response

In the digital realm, we, as defenders, are too often on the back foot. We hunt for and react to an attacker’s movements, but what if we could direct them for a change and automate what happens next?

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Continuous Security with Snyk
Tutorials

Continuous Security with Snyk

Continuous Improvement should imply 'Continuous Security', but is this really achievable? From a security operations perspective, the question then becomes, how do we automatically track, record, and address risk in near-real or Internet time?

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 3 : Respond and protect with a multi-pronged automated approach
Tutorials

Part 3 : Respond and protect with a multi-pronged automated approach

This is part 3 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 2 : Enrich alerts, avoid toil, and regain control during incidents
Tutorials

Part 2 : Enrich alerts, avoid toil, and regain control during incidents

This is part 2 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 1 : Breaches are inevitable and early detection is crucial
Tutorials

Part 1 : Breaches are inevitable and early detection is crucial

This is part 1 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Phish.ly: Democratizing suspicious email analysis with Tines and urlscan
Product updates

Phish.ly: Democratizing suspicious email analysis with Tines and urlscan

We’re excited to announce Phish.ly, a free service, built in partnership with urlscan, that allows security teams automate the analysis of suspicious emails. Our hope is that by automating this time-consuming, manual task, teams can refocus on more engaging, higher-impact work.

Eoin Hinchy
Eoin Hinchy
Founder, Tines
What to Consider when investing in Infosec Case Management
Tutorials

What to Consider when investing in Infosec Case Management

There are many challenges when trying to get teams to collaborate and work well together. Boundaries and barriers block progress. Effective and efficient communication is paramount (if not one of the most important things) and tools should strengthen and lubricate interactions rather than weaken or hinder them.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Crowdsourcing Detections for the Suspicious and Impossible
Tutorials

Crowdsourcing Detections for the Suspicious and Impossible

There’s a wealth of knowledge and intelligence available from an application’s point of use. Crowdsourcing detections can be as simple as asking the user to confirm whether they did actually just log in and from where. Here, time can be your ally rather than your enemy.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
How to figure out what's next, with help from PagerDuty and Tines
Tutorials

How to figure out what's next, with help from PagerDuty and Tines

You’re on-call, it’s 3am and you’re not really asleep or awake. The background anxiety always peaks during on-call weeks but this time you know there’s something that could ratchet the stress down significantly.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Upload to AWS S3 for Hybrid Analysis with AI
Tutorials

Upload to AWS S3 for Hybrid Analysis with AI

One of the beautiful things about APIs and multiple integrations is that you can combine them to deliver immense value quickly. With an orchestration and automation engine, a nexus forms and you can achieve truly complex tasks with an intelligent interface and simple logic. Bearing this in mind, we’re going to show you how to quickly upload text and attachments from emails to AWS S3 and then how to perform additional security and semantic analysis on them.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines