How-To Guides
Show AllArticles
Show All
Why We Built Security Agent Builder: Because One-Size-Fits-All AI Is a Myth
Over the past year, we’ve all watched the rise of AI agents. From simple chatbots to sophisticated copilots, the idea of pre-made AI agents is now everywhere—and every vendor seems to be racing to give you a “ready-to-go” solution.
Company News
Show All
Top Automations for Risk Reviews with BlinkOps + SecurityScorecard
Learn about 4 easy ways to simplify third-party risk reviews using BlinkOps and SecurityScorecard. Find out how to keep track of vendor ratings, apply risk rules, and start workflows in tools like ServiceNow and Slack - all automatically.
Latest Posts

Top Automations for Risk Reviews with BlinkOps + SecurityScorecard
Learn about 4 easy ways to simplify third-party risk reviews using BlinkOps and SecurityScorecard. Find out how to keep track of vendor ratings, apply risk rules, and start workflows in tools like ServiceNow and Slack - all automatically.

Why We Built Security Agent Builder: Because One-Size-Fits-All AI Is a Myth
Over the past year, we’ve all watched the rise of AI agents. From simple chatbots to sophisticated copilots, the idea of pre-made AI agents is now everywhere—and every vendor seems to be racing to give you a “ready-to-go” solution.
-min.jpg)
Time To Automation (TTA): The single most important security metric for 2025
Security teams are losing the battle against evolving threats due to a critical skills shortage and outdated SOAR playbooks. AI-driven security automation is the future—accelerate Time to Automation (TTA) and stay ahead of attackers with Blink’s no-code platform. Automate in seconds, not months.

Weekly Workflow: Automated CrowdStrike Update
The CrowdStrike security software update incident in July 2024 caused a major IT outage that affected various industries, from airlines to hospitals. This incident serves as a stark reminder of how quickly a seemingly routine process can lead to widespread disruptions and vulnerabilities. In this workflow, we're going to show you how you can schedule CrowdStrike, or any other updates to run when you want them to.

Weekly Workflow: How to Validate that All Azure Storage Accounts are Encrypted
Azure Storage Accounts offer a powerful cloud storage solution, but ensuring their encryption is important for comprehensive security. In this Weekly Workflow, we're going to look at how you can automate encryption checks for your Azure Storage Accounts.
%20(1).png)
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Try searching something else, or just check the latest Articles below.
Latest Posts

Top Automations for Risk Reviews with BlinkOps + SecurityScorecard
Learn about 4 easy ways to simplify third-party risk reviews using BlinkOps and SecurityScorecard. Find out how to keep track of vendor ratings, apply risk rules, and start workflows in tools like ServiceNow and Slack - all automatically.

Why We Built Security Agent Builder: Because One-Size-Fits-All AI Is a Myth
Over the past year, we’ve all watched the rise of AI agents. From simple chatbots to sophisticated copilots, the idea of pre-made AI agents is now everywhere—and every vendor seems to be racing to give you a “ready-to-go” solution.
-min.jpg)
Time To Automation (TTA): The single most important security metric for 2025
Security teams are losing the battle against evolving threats due to a critical skills shortage and outdated SOAR playbooks. AI-driven security automation is the future—accelerate Time to Automation (TTA) and stay ahead of attackers with Blink’s no-code platform. Automate in seconds, not months.

Weekly Workflow: Automated CrowdStrike Update
The CrowdStrike security software update incident in July 2024 caused a major IT outage that affected various industries, from airlines to hospitals. This incident serves as a stark reminder of how quickly a seemingly routine process can lead to widespread disruptions and vulnerabilities. In this workflow, we're going to show you how you can schedule CrowdStrike, or any other updates to run when you want them to.

Weekly Workflow: How to Validate that All Azure Storage Accounts are Encrypted
Azure Storage Accounts offer a powerful cloud storage solution, but ensuring their encryption is important for comprehensive security. In this Weekly Workflow, we're going to look at how you can automate encryption checks for your Azure Storage Accounts.
%20(1).png)
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Control your security everywhere.
Start transforming your security operations with Blink.