Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

From backlog to breakthrough: enhancing IT service delivery and support with automation

Scaling IT operations was never going to be easy. By 2025, it was fair to expect that technology would ease classic challenges like high workloads, rising operational costs, and end-user friction. Yet IT leaders still face mounting pressure across identity and access management (IAM), endpoint management, request fulfillment, and incident response. Today’s end users are more demanding. IT operations are more complex. And time is in short supply.

What's new in Tines: April 2025 edition

Workbench offers many powerful capabilities, and with it, we believe you should be able to use any of your tools with their custom configurations. So, we decided private templates should be available for Workbench conversations. And the ability to take control of Tines AI features doesn’t stop there: Read more on private templates →

GitLab's CISO Josh Lemos on the pros and cons of making security practices public

In this week’s episode of The Future of Security Operations podcast, I'm joined by Josh Lemos, CISO at GitLab. Throughout his 15-year career in security, Josh has led teams at ServiceNow, Cylance, and Square. Known for his expertise in AI-driven security strategies, Josh is also a board member with HiddenLayer. He drives innovation at GitLab with a relentless focus on offensive security, identity management, and automation. Josh and I discuss.

The end of muckwork

Muckwork is the invisible drag on every company. It’s the repetitive, manual, low-leverage work we tolerate because we assume it’s necessary. Copying data between systems. Triaging alerts. Clicking through approvals. Tasks that keep things running but slow everything down. In 2006, Jeff Bezos called the backend plumbing of web apps “muck.” AWS was created to eliminate it. Today, the same kind of work is everywhere in the enterprise. We call it muckwork.

Brex's CISO Mark Hillick on avoiding tool bloat and learning from high-severity incidents

In this week’s episode of The Future of Security Operations podcast, I'm joined by Mark Hillick, CISO at Brex. Mark’s experience in the security industry spans more than two decades. He started out as a security engineer at Allied Irish Banks before advancing through companies like MongoDB to become Director and Head of Security at Riot Games. His book, The Security Path, features over 70 interviews with security professionals on their career journeys. Mark and I discuss.

Building better workflows with multiple drafts

In today's security and IT landscape, the workflows that power your operations are not merely convenient tools—they're essential infrastructure. When a phishing detection workflow fails or an access control process malfunctions, the consequences can be severe: security incidents remain undetected, response times suffer, and organizational risk escalates significantly. This reality creates a paradox for teams.

Automating your risk register using Tines Records

A risk register is a GRC tool used by teams to identify, assess, and manage various risks within an organization. It acts as a centralized repository and looks at the impact and probability of a risk to prioritize its management. In cyber security, a risk register helps maintain compliance with various standards like the ISO 27001 Information Security Management System (ISMS), NIST SP800-30 Guide for Conducting Risk Assessments, or the new European NIS 2 directive.

The Trade Desk's Joe McCallister on salary negotiation and leading without micromanaging

In this week’s episode of The Future of Security Operations podcast, I'm joined by Joe McCallister. Joe’s journey in security is truly unique - in less than a decade, he pivoted from selling BMWs to his current role as Senior Manager of Cybersecurity Operations at The Trade Desk. He’s also led impactful initiatives in risk management, threat hunting, and incident response at Synoptek.

Put AI to work where workflows work best

In this guest post, Jason English, Director and Principal Analyst at Intellyx explores how GenAI is moving beyond chat to orchestrate real action for SOC teams. As my colleague Eric Newcomer mentioned in the previous chapter of this series, GenAI changes the security automation game, with multi-system discovery, documentation, and task execution capabilities that can reduce cognitive load and toil for security analysts.

Celebrating our 1,000th Library entry - automated resource backup by GE Vernova

At Tines, we're committed to making workflow building as easy and efficient as possible. That’s why we’re so proud of our library, which reached an exciting milestone today when it officially became home to over 1000 pre-built workflows. These pre-built workflows, known to many Tines users as stories, are designed to foster knowledge sharing across the security and IT community, providing inspiration and shortcuts to help users build faster and more effectively.