Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Introducing the AI Agent action

Today, we’re announcing a way to build and deploy agents in Tines through our AI Agent action. In the AI market, AI agents suddenly seem to be everywhere – software that can autonomously think and perform tasks on behalf of the user. But we’re still very early in the adoption curve of agents. One thing we’ve noticed is that most solutions can’t handle the varying complexities of mission-critical workflows.

Tines selected as a launch partner for enhanced version of AWS Security Hub

Today at re:Inforce Amazon Web Services (AWS), unveiled an enhanced version of AWS Security Hub which will enable organizations to surface and prioritize active risks in their cloud environment. Security Hub transforms security signals into actionable insights and offers intuitive visualizations and natural language summaries. Tines will offer workflow orchestration and automation for this enhanced version of Security Hub.

Why we moved our ECS services from Fargate to EC2

At Tines, we rely heavily on AWS Elastic Container Service (ECS) to power our workflow automation platform. For a couple of years, we used Fargate as our default compute layer – offering simplicity and removing the need to manage underlying hosts. However, as we scaled, we started hitting the edges of what Fargate could reliably offer. This is the story of why we migrated our backend services to an EC2-backed ECS Capacity Provider and what we learned along the way.

Tines' Field CISO Matt Muller on security's communications problem and the future of the SOC

In this week’s episode of The Future of Security Operations podcast, I'm joined by Matt Muller, Field CISO here at Tines. With over a decade of experience at companies like Material Security, Coinbase, and Inflection, Matt’s got a strong track record of scaling SecOps teams, building threat detection and mitigation programs, and driving trust and safety initiatives. His knowledge impressed the Tines team so much that we invited him to join the team as our first Field CISO. Matt and I discuss.

RegScale's Travis Howerton on taking the pain out of compliance in highly-regulated industries

In this week’s episode of The Future of Security Operations podcast, I'm joined by Travis Howerton, Co-founder and CEO of RegScale. Travis began his security career with roles at government and regulated organizations, including the National Nuclear Security Administration and Oak Ridge National Laboratory, before being inspired by inefficiencies in compliance processes to co-found RegScale.

Introducing Modern SecOps, a more realistic alternative to the "autonomous SOC"

I’ve always had a love-hate relationship with traditional SOC. Many SOC teams do great work within this structure. But there are also serious issues with the three-tier model - it’s rigid, costly, and unsustainable for any company that isn’t a large enterprise. In the push to address these limitations, the concept of an “autonomous SOC” has emerged, with some vendors already claiming to offer fully autonomous solutions.

Four common misconceptions about using AI in security operations

At this stage in AI's evolution, we’ve all heard the big promises - and overpromises - from vendors. But what about the people on the front lines of security operations? How are real practitioners feeling about using AI in their day-to-day work? In a recent webinar with guest speaker Allie Mellen, Principal Analyst at Forrester Research, we dug into how AI is actually being adopted in the SOC - what’s working, what’s not, and what's getting lost in the noise.

The top seven skills security analysts need to succeed, according to security leaders

According to the U.S. Bureau of Labor Statistics, demand for security analysts is expected to grow by more than 30% over the next decade, far outpacing the average for other roles. That’s good news for those entering or advancing in the field. But with heavy workloads and constant pressure to keep up with evolving threats, professional development can easily fall by the wayside. So how can security analysts stand out to hiring managers — and make sure their career path stays on track?