Articles


Weekly Workflow: Just In Time Provisioning to an RDS Database
Here's how to use a Blink workflow to automate setting up an access lifespan in RDS databases using Jut-In-Time provisioning.
Weekly Workflow: Just In Time Provisioning to an RDS Database
Here's how to use a Blink workflow to automate setting up an access lifespan in RDS databases using Jut-In-Time provisioning.


Automating Security and Compliance with BlinkOps + Acronis XDR
Discover how BlinkOps integrates with Acronis XDR to automate security response, backup remediation, and compliance reporting. Reduce manual effort and respond to threats faster with no-code workflows.
Automating Security and Compliance with BlinkOps + Acronis XDR
Discover how BlinkOps integrates with Acronis XDR to automate security response, backup remediation, and compliance reporting. Reduce manual effort and respond to threats faster with no-code workflows.


SecOps AI Agents: Hype or Game Changer?
Every few years, we get a new savior: SIEM, SOAR, XDR, AI. But this time, the hype machine around AI agents might actually be on to something. If you’re in SecOps and not at least curious about agentic automation, you’re probably still fighting alert fatigue with duct tape and Python scripts.
SecOps AI Agents: Hype or Game Changer?
Every few years, we get a new savior: SIEM, SOAR, XDR, AI. But this time, the hype machine around AI agents might actually be on to something. If you’re in SecOps and not at least curious about agentic automation, you’re probably still fighting alert fatigue with duct tape and Python scripts.


BlinkOps + Twilio: Automating Security Communications and Verification
Find out how connecting Twilio with BlinkOps can give you instant security alerts, automated incident handling, and easy user verification processes. See how no-code automation helps security teams respond faster and makes compliance easier.
BlinkOps + Twilio: Automating Security Communications and Verification
Find out how connecting Twilio with BlinkOps can give you instant security alerts, automated incident handling, and easy user verification processes. See how no-code automation helps security teams respond faster and makes compliance easier.


13 Benefits of Workflow Automation
Discover 13 key benefits of workflow automation, from improved efficiency to better compliance, and how Blink Ops helps make it possible.
13 Benefits of Workflow Automation
Discover 13 key benefits of workflow automation, from improved efficiency to better compliance, and how Blink Ops helps make it possible.


5 Powerful Automations You Can Build with BlinkOps + Okta
Learn about 5 effective identity management automations you can create with BlinkOps and Okta. These automations make IAM tasks easier, ensure compliance, and save you hours of manual work.
5 Powerful Automations You Can Build with BlinkOps + Okta
Learn about 5 effective identity management automations you can create with BlinkOps and Okta. These automations make IAM tasks easier, ensure compliance, and save you hours of manual work.


What Is SOAR Automation? A Detailed Overview
SOAR (security orchestration, automation, and response) is a set of tools used in cybersecurity to help companies find, manage, and solve cyber threats more efficiently. Many security tasks can be done automatically with SOAR, which makes jobs easier and faster. This article will explain how SOAR automation works, with its features and benefits. We'll also look at some challenges and limitations it may present.
What Is SOAR Automation? A Detailed Overview
SOAR (security orchestration, automation, and response) is a set of tools used in cybersecurity to help companies find, manage, and solve cyber threats more efficiently. Many security tasks can be done automatically with SOAR, which makes jobs easier and faster. This article will explain how SOAR automation works, with its features and benefits. We'll also look at some challenges and limitations it may present.


Why We Built Security Agent Builder: Because One-Size-Fits-All AI Is a Myth
Over the past year, we’ve all watched the rise of AI agents. From simple chatbots to sophisticated copilots, the idea of pre-made AI agents is now everywhere—and every vendor seems to be racing to give you a “ready-to-go” solution.
Why We Built Security Agent Builder: Because One-Size-Fits-All AI Is a Myth
Over the past year, we’ve all watched the rise of AI agents. From simple chatbots to sophisticated copilots, the idea of pre-made AI agents is now everywhere—and every vendor seems to be racing to give you a “ready-to-go” solution.


What Is Security Automation? A Complete Guide
Today, we’ll discuss security automation including what it is, its benefits, types, and best practices to enhance your security processes.
What Is Security Automation? A Complete Guide
Today, we’ll discuss security automation including what it is, its benefits, types, and best practices to enhance your security processes.


Workflow Wednesday: 5 Workflows to Automate Penetration Testing
Automate penetration testing with Blink Ops to check credentials, find assets, scan for vulnerabilities, and test web security. Use tools like HIBP, Censys, Shodan, Tenable, OWASP ZAP, and Nuclei to detect threats faster.
Workflow Wednesday: 5 Workflows to Automate Penetration Testing
Automate penetration testing with Blink Ops to check credentials, find assets, scan for vulnerabilities, and test web security. Use tools like HIBP, Censys, Shodan, Tenable, OWASP ZAP, and Nuclei to detect threats faster.
Control your cloud security everywhere.
Cloud native, Decentralized, and Secure.Start transforming your cloud and security operations with Blink.