Articles


Weekly Workflow: Realtime Gmail Phishing Detection
Phishing scams are a persistent threat in the digital world, with a staggering 3.4 billion malicious emails in circulation daily. Recognizing and responding to these threats is paramount for safeguarding oneself from financial and data loss.
Weekly Workflow: Realtime Gmail Phishing Detection
Phishing scams are a persistent threat in the digital world, with a staggering 3.4 billion malicious emails in circulation daily. Recognizing and responding to these threats is paramount for safeguarding oneself from financial and data loss.


Blink Ops Recognized as a Leader in GigaOm’s Latest SOAR Radar Report
Gil Barak, Co-founder and CEO of Blink Ops, shares his POV on Blink being named a Leader and Outperformer in GigaOm’s 2024 SOAR Radar Report.
Blink Ops Recognized as a Leader in GigaOm’s Latest SOAR Radar Report
Gil Barak, Co-founder and CEO of Blink Ops, shares his POV on Blink being named a Leader and Outperformer in GigaOm’s 2024 SOAR Radar Report.
%20(1).png)
%20(1).png)
AI for Incident Response: Benefits, Challenges & Best Practices
Discover how AI boosts incident response through automation, faster detection, and accuracy while addressing challenges and following best practices.
AI for Incident Response: Benefits, Challenges & Best Practices
Discover how AI boosts incident response through automation, faster detection, and accuracy while addressing challenges and following best practices.


Weekly Workflow: How to Find and Remove Unused Security Groups in AWS in 10 Seconds
75 AWS account owners alerted! Are you one of them? Unused security groups not only create a security risk, but also may be a time sink to clean up. Blink Copilot caan help you fix that.
Weekly Workflow: How to Find and Remove Unused Security Groups in AWS in 10 Seconds
75 AWS account owners alerted! Are you one of them? Unused security groups not only create a security risk, but also may be a time sink to clean up. Blink Copilot caan help you fix that.
.jpg)
.jpg)
Weekly Workflow: I Never Knew My Google Drive Was at Risk
We don't often think of Google Drive as not being secure, but the truth of it is that it's just as prone to attacks as any other service when you're not careful about your document share settings.
Weekly Workflow: I Never Knew My Google Drive Was at Risk
We don't often think of Google Drive as not being secure, but the truth of it is that it's just as prone to attacks as any other service when you're not careful about your document share settings.
%20V1%20(1).png)
%20V1%20(1).png)
Best Practices for Automating Vulnerability Management
Vulnerability management in Blink Ops is automated. Check out use cases like web app testing, third-party risk monitoring, API security and patch management.
Best Practices for Automating Vulnerability Management
Vulnerability management in Blink Ops is automated. Check out use cases like web app testing, third-party risk monitoring, API security and patch management.


Incident Response Tools: Features, Types & Top Tools
Discover the key features, types & best practices for incident response tools to improve your security posture and threat mitigation.
Incident Response Tools: Features, Types & Top Tools
Discover the key features, types & best practices for incident response tools to improve your security posture and threat mitigation.
.png)
.png)
Weekly Workflow: Password Nightmares
Maintaining password policies across your entire organization is a time consuming process for any company, especially large ones. An automated workflow can make things so much easier for you, ensuring that both your time and sensitive data are kept safe.
Weekly Workflow: Password Nightmares
Maintaining password policies across your entire organization is a time consuming process for any company, especially large ones. An automated workflow can make things so much easier for you, ensuring that both your time and sensitive data are kept safe.


Weekly Workflow: RegreSSHion
Qualys Threat Research Unit (TRU) uncovered a critical Remote Unauthenticated Code Execution (RCE) vulnerability, identified as CVE-2024-6387, affecting OpenSSH servers on glibc-based Linux systems.
Weekly Workflow: RegreSSHion
Qualys Threat Research Unit (TRU) uncovered a critical Remote Unauthenticated Code Execution (RCE) vulnerability, identified as CVE-2024-6387, affecting OpenSSH servers on glibc-based Linux systems.
%20(1).png)
%20(1).png)
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Control your cloud security everywhere.
Cloud native, Decentralized, and Secure.Start transforming your cloud and security operations with Blink.