Articles


Weekly Workflow: How to Find and Remove Unused Security Groups in AWS in 10 Seconds
75 AWS account owners alerted! Are you one of them? Unused security groups not only create a security risk, but also may be a time sink to clean up. Blink Copilot caan help you fix that.
Weekly Workflow: How to Find and Remove Unused Security Groups in AWS in 10 Seconds
75 AWS account owners alerted! Are you one of them? Unused security groups not only create a security risk, but also may be a time sink to clean up. Blink Copilot caan help you fix that.
.jpg)
.jpg)
Weekly Workflow: I Never Knew My Google Drive Was at Risk
We don't often think of Google Drive as not being secure, but the truth of it is that it's just as prone to attacks as any other service when you're not careful about your document share settings.
Weekly Workflow: I Never Knew My Google Drive Was at Risk
We don't often think of Google Drive as not being secure, but the truth of it is that it's just as prone to attacks as any other service when you're not careful about your document share settings.
%20V1%20(1).png)
%20V1%20(1).png)
Best Practices for Automating Vulnerability Management
Vulnerability management in Blink Ops is automated. Check out use cases like web app testing, third-party risk monitoring, API security and patch management.
Best Practices for Automating Vulnerability Management
Vulnerability management in Blink Ops is automated. Check out use cases like web app testing, third-party risk monitoring, API security and patch management.


Incident Response Tools: Features, Types & Top Tools
Discover the key features, types & best practices for incident response tools to improve your security posture and threat mitigation.
Incident Response Tools: Features, Types & Top Tools
Discover the key features, types & best practices for incident response tools to improve your security posture and threat mitigation.
.png)
.png)
Weekly Workflow: Password Nightmares
Maintaining password policies across your entire organization is a time consuming process for any company, especially large ones. An automated workflow can make things so much easier for you, ensuring that both your time and sensitive data are kept safe.
Weekly Workflow: Password Nightmares
Maintaining password policies across your entire organization is a time consuming process for any company, especially large ones. An automated workflow can make things so much easier for you, ensuring that both your time and sensitive data are kept safe.


Weekly Workflow: RegreSSHion
Qualys Threat Research Unit (TRU) uncovered a critical Remote Unauthenticated Code Execution (RCE) vulnerability, identified as CVE-2024-6387, affecting OpenSSH servers on glibc-based Linux systems.
Weekly Workflow: RegreSSHion
Qualys Threat Research Unit (TRU) uncovered a critical Remote Unauthenticated Code Execution (RCE) vulnerability, identified as CVE-2024-6387, affecting OpenSSH servers on glibc-based Linux systems.
%20(1).png)
%20(1).png)
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
.png)
.png)
What is Compliance Automation? Benefits, Use Cases & Tools
Learn how compliance automation simplifies regulatory tasks, boosts efficiency, and reduces errors. Explore key benefits, use cases, and top tools.
What is Compliance Automation? Benefits, Use Cases & Tools
Learn how compliance automation simplifies regulatory tasks, boosts efficiency, and reduces errors. Explore key benefits, use cases, and top tools.


What Are The Key Differences Between XDR, SIEM and SOAR?
Explore the differences between XDR, SIEM, and SOAR, and learn how each security technology enhances detection, monitoring, and response.
What Are The Key Differences Between XDR, SIEM and SOAR?
Explore the differences between XDR, SIEM, and SOAR, and learn how each security technology enhances detection, monitoring, and response.


The Top 4 Industries at Risk for Cyber Attacks and How Security Automation Can Help
Discover how security automation strengthens defenses in healthcare, government, education, and finance—industries most at risk from cyberattacks due to their sensitive data and vast networks.
The Top 4 Industries at Risk for Cyber Attacks and How Security Automation Can Help
Discover how security automation strengthens defenses in healthcare, government, education, and finance—industries most at risk from cyberattacks due to their sensitive data and vast networks.
Control your cloud security everywhere.
Cloud native, Decentralized, and Secure.Start transforming your cloud and security operations with Blink.