How-To Guides
Show AllArticles
Show AllTop 5 Cloud Security Automations for SecOps Teams
Almost every week we add another workflow to our automation library. Our platform and copilot are helping people automate otherwise tedious tasks in security operations. Integrations between platforms traditionally involved security engineers writing custom code using application programming interfaces (APIs).
Company News
Show AllLatest Posts
Top 5 Cloud Security Automations for SecOps Teams
Almost every week we add another workflow to our automation library. Our platform and copilot are helping people automate otherwise tedious tasks in security operations. Integrations between platforms traditionally involved security engineers writing custom code using application programming interfaces (APIs).
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Try searching something else, or just check the latest Articles below.
Latest Posts
Top 5 Cloud Security Automations for SecOps Teams
Almost every week we add another workflow to our automation library. Our platform and copilot are helping people automate otherwise tedious tasks in security operations. Integrations between platforms traditionally involved security engineers writing custom code using application programming interfaces (APIs).
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Control your security everywhere.
Start transforming your security operations with Blink.