Latest Posts
Weekly Workflow: Automated CrowdStrike Update
The CrowdStrike security software update incident in July 2024 caused a major IT outage that affected various industries, from airlines to hospitals. This incident serves as a stark reminder of how quickly a seemingly routine process can lead to widespread disruptions and vulnerabilities. In this workflow, we're going to show you how you can schedule CrowdStrike, or any other updates to run when you want them to.
Weekly Workflow: How to Validate that All Azure Storage Accounts are Encrypted
Azure Storage Accounts offer a powerful cloud storage solution, but ensuring their encryption is important for comprehensive security. In this Weekly Workflow, we're going to look at how you can automate encryption checks for your Azure Storage Accounts.
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Try searching something else, or just check the latest Articles below.
Latest Posts
Weekly Workflow: Automated CrowdStrike Update
The CrowdStrike security software update incident in July 2024 caused a major IT outage that affected various industries, from airlines to hospitals. This incident serves as a stark reminder of how quickly a seemingly routine process can lead to widespread disruptions and vulnerabilities. In this workflow, we're going to show you how you can schedule CrowdStrike, or any other updates to run when you want them to.
Weekly Workflow: How to Validate that All Azure Storage Accounts are Encrypted
Azure Storage Accounts offer a powerful cloud storage solution, but ensuring their encryption is important for comprehensive security. In this Weekly Workflow, we're going to look at how you can automate encryption checks for your Azure Storage Accounts.
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Control your security everywhere.
Start transforming your security operations with Blink.