{"id":2895,"date":"2024-12-13T13:22:54","date_gmt":"2024-12-13T13:22:54","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/13\/how-to-generate-a-crowdstrike-rfm-report-with-ai-in-tines\/"},"modified":"2024-12-13T13:22:54","modified_gmt":"2024-12-13T13:22:54","slug":"how-to-generate-a-crowdstrike-rfm-report-with-ai-in-tines","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/13\/how-to-generate-a-crowdstrike-rfm-report-with-ai-in-tines\/","title":{"rendered":"How to Generate a CrowdStrike RFM Report With AI in Tines"},"content":{"rendered":"<p>\u200bRun by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform.\u00a0<br \/>\nTheir bi-annual \u201cYou Did What with Tines?!\u201d competition highlights some of the most interesting workflows submitted by their\u00a0Run by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform.\u00a0<br \/>\nTheir bi-annual \u201cYou Did What with Tines?!\u201d competition highlights some of the most interesting workflows submitted by their\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bRun by the team at orchestration, AI, and automation platform Tines, the Tines library contains pre-built workflows shared by real security practitioners from across the community, all of which are free to import and deploy via the Community Edition of the platform.\u00a0 Their bi-annual \u201cYou Did What with Tines?!\u201d competition highlights some of the most&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2024\/12\/13\/how-to-generate-a-crowdstrike-rfm-report-with-ai-in-tines\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">How to Generate a CrowdStrike RFM Report With AI in Tines<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":2896,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2895"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=2895"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/2895\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/2896"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=2895"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=2895"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=2895"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}