Latest Posts
-min.jpg)
Time To Automation (TTA): The single most important security metric for 2025
Security teams are losing the battle against evolving threats due to a critical skills shortage and outdated SOAR playbooks. AI-driven security automation is the future—accelerate Time to Automation (TTA) and stay ahead of attackers with Blink’s no-code platform. Automate in seconds, not months.

Weekly Workflow: Automated CrowdStrike Update
The CrowdStrike security software update incident in July 2024 caused a major IT outage that affected various industries, from airlines to hospitals. This incident serves as a stark reminder of how quickly a seemingly routine process can lead to widespread disruptions and vulnerabilities. In this workflow, we're going to show you how you can schedule CrowdStrike, or any other updates to run when you want them to.

Weekly Workflow: How to Validate that All Azure Storage Accounts are Encrypted
Azure Storage Accounts offer a powerful cloud storage solution, but ensuring their encryption is important for comprehensive security. In this Weekly Workflow, we're going to look at how you can automate encryption checks for your Azure Storage Accounts.
%20(1).png)
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Try searching something else, or just check the latest Articles below.
Latest Posts
-min.jpg)
Time To Automation (TTA): The single most important security metric for 2025
Security teams are losing the battle against evolving threats due to a critical skills shortage and outdated SOAR playbooks. AI-driven security automation is the future—accelerate Time to Automation (TTA) and stay ahead of attackers with Blink’s no-code platform. Automate in seconds, not months.

Weekly Workflow: Automated CrowdStrike Update
The CrowdStrike security software update incident in July 2024 caused a major IT outage that affected various industries, from airlines to hospitals. This incident serves as a stark reminder of how quickly a seemingly routine process can lead to widespread disruptions and vulnerabilities. In this workflow, we're going to show you how you can schedule CrowdStrike, or any other updates to run when you want them to.

Weekly Workflow: How to Validate that All Azure Storage Accounts are Encrypted
Azure Storage Accounts offer a powerful cloud storage solution, but ensuring their encryption is important for comprehensive security. In this Weekly Workflow, we're going to look at how you can automate encryption checks for your Azure Storage Accounts.
%20(1).png)
Top 4 Security Automation Use Cases: A Detailed Guide
Learn about the top 4 security automation use cases that can streamline your cybersecurity efforts. This guide covers reducing enriching indicators of compromise (IoCs), monitoring external attack surface(s), scanning for web application vulnerabilities and monitoring for leaked user credentials - specifically email addresses.
Control your security everywhere.
Start transforming your security operations with Blink.