Phish.ly: Democratizing suspicious email analysis with Tines and urlscan
Product updates

Phish.ly: Democratizing suspicious email analysis with Tines and urlscan

We’re excited to announce Phish.ly, a free service, built in partnership with urlscan, that allows security teams automate the analysis of suspicious emails. Our hope is that by automating this time-consuming, manual task, teams can refocus on more engaging, higher-impact work.

Eoin Hinchy
Eoin Hinchy
Founder, Tines
What to Consider when investing in Infosec Case Management
Tutorials

What to Consider when investing in Infosec Case Management

There are many challenges when trying to get teams to collaborate and work well together. Boundaries and barriers block progress. Effective and efficient communication is paramount (if not one of the most important things) and tools should strengthen and lubricate interactions rather than weaken or hinder them.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Crowdsourcing Detections for the Suspicious and Impossible
Tutorials

Crowdsourcing Detections for the Suspicious and Impossible

There’s a wealth of knowledge and intelligence available from an application’s point of use. Crowdsourcing detections can be as simple as asking the user to confirm whether they did actually just log in and from where. Here, time can be your ally rather than your enemy.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
How to figure out what's next, with help from PagerDuty and Tines
Tutorials

How to figure out what's next, with help from PagerDuty and Tines

You’re on-call, it’s 3am and you’re not really asleep or awake. The background anxiety always peaks during on-call weeks but this time you know there’s something that could ratchet the stress down significantly.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Upload to AWS S3 for Hybrid Analysis with AI
Tutorials

Upload to AWS S3 for Hybrid Analysis with AI

One of the beautiful things about APIs and multiple integrations is that you can combine them to deliver immense value quickly. With an orchestration and automation engine, a nexus forms and you can achieve truly complex tasks with an intelligent interface and simple logic. Bearing this in mind, we’re going to show you how to quickly upload text and attachments from emails to AWS S3 and then how to perform additional security and semantic analysis on them.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Secure Your Productivity With SentinelOne and Jira Service Desk
Tutorials

Secure Your Productivity With SentinelOne and Jira Service Desk

Do you ever wish you could get more done in less time? One of the promises of automation is not just doing things faster, it’s doing things better, more consistently, and then scaling to become a force multiplier for both yourself and your team.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Insider Threat Hunting with Datadog and CrowdStrike
Tutorials

Insider Threat Hunting with Datadog and CrowdStrike

Rarely are all the elements for confident decision making located in a single silo, repository, or team. Equally, security patterns that are mandated for accessing disparate or remote data sources may be a mixture of 'push' or 'pull' depending upon the boundaries, zones, or enclaves to be crossed.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Partner Perspectives: Faster Response with Carbon Black and Tines.io
Tutorials

Partner Perspectives: Faster Response with Carbon Black and Tines.io

A conversation with our CEO, Eoin, on how using Carbon Black together with Tines can help make security teams more efficient, effective and happier

Eoin Hinchy
Eoin Hinchy
Founder, Tines
Subscribing to Notifications in MS Graph
Tutorials

Subscribing to Notifications in MS Graph

Responding to security alerts notifications is time critical. Subscribing to Notifications in MS Graph helps teams take actions the instant an alert fires

Thomas Kinsella
Thomas Kinsella
Co-founder & Chief Operating Officer, Tines
Automate the analysis of EML files
Tutorials

Automate the analysis of EML files

We’ve written many blogs about how to analyze suspicious emails, attachments, urls, even email headers. However there is a consistent question prospects ask about analyzing emails – how does Tines automate the analysis of .eml files?

Thomas Kinsella
Thomas Kinsella
Co-founder & Chief Operating Officer, Tines