{"id":4215,"date":"2025-05-02T11:27:27","date_gmt":"2025-05-02T11:27:27","guid":{"rendered":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/02\/how-to-automate-cve-and-vulnerability-advisory-response-with-tines\/"},"modified":"2025-05-02T11:27:27","modified_gmt":"2025-05-02T11:27:27","slug":"how-to-automate-cve-and-vulnerability-advisory-response-with-tines","status":"publish","type":"post","link":"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/02\/how-to-automate-cve-and-vulnerability-advisory-response-with-tines\/","title":{"rendered":"How to Automate CVE and Vulnerability Advisory Response with Tines"},"content":{"rendered":"<p>\u200bRun by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community &#8211; all free to import and deploy through the platform\u2019s Community Edition.<br \/>\nA recent standout is a workflow that automates monitoring for security advisories from CISA and other vendors, enriches advisories with CrowdStrike\u00a0Run by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community &#8211; all free to import and deploy through the platform\u2019s Community Edition.<br \/>\nA recent standout is a workflow that automates monitoring for security advisories from CISA and other vendors, enriches advisories with CrowdStrike\u00a0\u00a0The Hacker News<\/p>","protected":false},"excerpt":{"rendered":"<p>\u200bRun by the team at workflow orchestration and AI platform Tines, the Tines library features pre-built workflows shared by security practitioners from across the community &#8211; all free to import and deploy through the platform\u2019s Community Edition. A recent standout is a workflow that automates monitoring for security advisories from CISA and other vendors, enriches&hellip;&nbsp;<a href=\"https:\/\/news.cybertechworld.co.in\/index.php\/2025\/05\/02\/how-to-automate-cve-and-vulnerability-advisory-response-with-tines\/\" class=\"\" rel=\"bookmark\">Read More &raquo;<span class=\"screen-reader-text\">How to Automate CVE and Vulnerability Advisory Response with Tines<\/span><\/a><\/p>\n","protected":false},"author":0,"featured_media":4216,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","_themeisle_gutenberg_block_has_review":false,"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4215"}],"collection":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/types\/post"}],"replies":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/comments?post=4215"}],"version-history":[{"count":0,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/posts\/4215\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media\/4216"}],"wp:attachment":[{"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/media?parent=4215"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/categories?post=4215"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/news.cybertechworld.co.in\/index.php\/wp-json\/wp\/v2\/tags?post=4215"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}