Articles


From Legacy SOAR to AI-Driven Security: How Time to Automation Became the New Standard
Legacy SOAR is out—AI-driven security automation is in. Learn why Time to Automation (TTA) is the new benchmark for SecOps and how AI is transforming security operations.
From Legacy SOAR to AI-Driven Security: How Time to Automation Became the New Standard
Legacy SOAR is out—AI-driven security automation is in. Learn why Time to Automation (TTA) is the new benchmark for SecOps and how AI is transforming security operations.


Case Management in Security: Definition and Best Practices
In this post, we explore what security case management entails, how it works, factors to consider, and best practices for its implementation.
Case Management in Security: Definition and Best Practices
In this post, we explore what security case management entails, how it works, factors to consider, and best practices for its implementation.


NIST, MITRE ATT&CK? Choosing a SOC Framework
Learn about security operations center frameworks and their benefits. Check out a list of 7 SOC frameworks to enhance your security.
NIST, MITRE ATT&CK? Choosing a SOC Framework
Learn about security operations center frameworks and their benefits. Check out a list of 7 SOC frameworks to enhance your security.


Understand SOC Processes and Best Practices
How do Security Operations Centers (SOCs) operate, their key SOC process, their best practices, and much more?
Understand SOC Processes and Best Practices
How do Security Operations Centers (SOCs) operate, their key SOC process, their best practices, and much more?


BlinkOps Joins the 2025 Cyber 150: A Milestone Achievement
BlinkOps is named to the 2025 Cyber 150, recognizing the fastest-growing midsize cybersecurity companies. Learn more about our innovation and commitment to redefining security automation.
BlinkOps Joins the 2025 Cyber 150: A Milestone Achievement
BlinkOps is named to the 2025 Cyber 150, recognizing the fastest-growing midsize cybersecurity companies. Learn more about our innovation and commitment to redefining security automation.


Weekly Workflow: From Threat to Quick Resolution
Unusual login attempts soften signal an attempted account intrusion. In this workflow, we're going to show you how you can automate the process of securing user accounts when a suspicious login is detected.
Weekly Workflow: From Threat to Quick Resolution
Unusual login attempts soften signal an attempted account intrusion. In this workflow, we're going to show you how you can automate the process of securing user accounts when a suspicious login is detected.


How to Improve Your SaaS Cybersecurity Posture with Security Automation
Improve SaaS cybersecurity with security automation: streamline API key management, scan staging environments, and monitor AWS workflows effectively.
How to Improve Your SaaS Cybersecurity Posture with Security Automation
Improve SaaS cybersecurity with security automation: streamline API key management, scan staging environments, and monitor AWS workflows effectively.


Weekly Workflow: Identity and Access Management
When an employee leaves a company, whether voluntarily or not, ensuring their access to company systems is promptly revoked is essential to maintain security.
Weekly Workflow: Identity and Access Management
When an employee leaves a company, whether voluntarily or not, ensuring their access to company systems is promptly revoked is essential to maintain security.


Weekly Workflow: Just In Time Provisioning to an RDS Database
Here's how to use a Blink workflow to automate setting up an access lifespan in RDS databases using Just-In-Time provisioning.
Weekly Workflow: Just In Time Provisioning to an RDS Database
Here's how to use a Blink workflow to automate setting up an access lifespan in RDS databases using Just-In-Time provisioning.


Weekly Workflow: Automated CrowdStrike Update
The CrowdStrike security software update incident in July 2024 caused a major IT outage that affected various industries, from airlines to hospitals. This incident serves as a stark reminder of how quickly a seemingly routine process can lead to widespread disruptions and vulnerabilities. In this workflow, we're going to show you how you can schedule CrowdStrike, or any other updates to run when you want them to.
Weekly Workflow: Automated CrowdStrike Update
The CrowdStrike security software update incident in July 2024 caused a major IT outage that affected various industries, from airlines to hospitals. This incident serves as a stark reminder of how quickly a seemingly routine process can lead to widespread disruptions and vulnerabilities. In this workflow, we're going to show you how you can schedule CrowdStrike, or any other updates to run when you want them to.
Control your cloud security everywhere.
Cloud native, Decentralized, and Secure.Start transforming your cloud and security operations with Blink.