Part 3 : Respond and protect with a multi-pronged automated approach
Tutorials

Part 3 : Respond and protect with a multi-pronged automated approach

This is part 3 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 2 : Enrich alerts, avoid toil, and regain control during incidents
Tutorials

Part 2 : Enrich alerts, avoid toil, and regain control during incidents

This is part 2 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Part 1 : Breaches are inevitable and early detection is crucial
Tutorials

Part 1 : Breaches are inevitable and early detection is crucial

This is part 1 of a 3 part series on security automation for dealing with account compromise. Part 1 covers detection, part 2 looks at enrichment and case management, while part 3 tackles protection and response including prompting the user to acknowledge the incident via a side-channel.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
What to Consider when investing in Infosec Case Management
Tutorials

What to Consider when investing in Infosec Case Management

There are many challenges when trying to get teams to collaborate and work well together. Boundaries and barriers block progress. Effective and efficient communication is paramount (if not one of the most important things) and tools should strengthen and lubricate interactions rather than weaken or hinder them.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines
Crowdsourcing Detections for the Suspicious and Impossible
Tutorials

Crowdsourcing Detections for the Suspicious and Impossible

There’s a wealth of knowledge and intelligence available from an application’s point of use. Crowdsourcing detections can be as simple as asking the user to confirm whether they did actually just log in and from where. Here, time can be your ally rather than your enemy.

Donal O Duibhir
Donal O Duibhir
Security Engineering, Tines