CRFT: No-Code Automation for Cybersecurity Blog

CRFT: No-Code Automation for Cybersecurity
  • Home
  • Blog
How to Permanently 'Uninvite' Unwelcome Zoom Guests
Use Cases

How to Permanently 'Uninvite' Unwelcome Zoom Guests

With the ever-increasing need for the “work from home” model, our reliance on video conferencing has increased at an exponential rate. Unfortunately, this has also highlighted the security shortcomings of popular conferencing tools. Today we talk about managing security controls for Zoom.

  • Hamish Talbot
    Hamish Talbot
6 min read
Automating Search Pivot in Splunk Using CRFT
Use Cases

Automating Search Pivot in Splunk Using CRFT

Security teams can automate discovery of incident-related events by chaining pivoted searches in Splunk or any other event-based data stores, without writing a single line of code.

  • Anton Goncharov
    Anton Goncharov
4 min read
Hive Plots for Cybersecurity
Innovation

Hive Plots for Cybersecurity

Hive plots can empower security analytics and incident response UIs by providing unique visual fingerprints of threat detection events.

  • Anton Goncharov
    Anton Goncharov
4 min read
How to Automate Cyber Defense Without Paying a Dime
Technology

How to Automate Cyber Defense Without Paying a Dime

Andre Gironda shares his recommendations on cost-effective toolkits and frameworks that really change the game for cybersecurity defense teams, as they transition to the cloud.

  • Andre Gironda
    Andre Gironda
4 min read
5 Ways SOAR Misses the Mark on Security Automation
Technology

5 Ways SOAR Misses the Mark on Security Automation

The hype around SOAR (security orchestration, automation, and response) seems to be at its peak. Unfortunately, the current players can't seem to get past some significant shortcomings.

  • Anton Goncharov
    Anton Goncharov
5 min read
How to Deliver a Single Pane of Glass in Cybersecurity
Technology

How to Deliver a Single Pane of Glass in Cybersecurity

The idea of a 'single pane of glass' has been just as appealing to cybersecurity teams as it has been elusive, and despite security vendor claims, largely remains a myth.

  • Anton Goncharov
    Anton Goncharov
5 min read
Alex Dow: From 'Cloud Curious' to 'Cloud-Native'
Interview

Alex Dow: From 'Cloud Curious' to 'Cloud-Native'

Today we're talking with Alex Dow, the CTO of Mirai Security, and organizer of BSides Vancouver about cloud adoption, cybersecurity, and everything in between.

  • Anton Goncharov
    Anton Goncharov
6 min read
How to Fall in Love with Your Security Platform
Principles

How to Fall in Love with Your Security Platform

If automation of manual tasks is the ultimate objective of cyber teams, content-driven frameworks are the best way of delivering it. Code-based solutions simply don’t scale internally for customers.

  • Anton Goncharov
    Anton Goncharov
3 min read
Does Cybersecurity Solution Architecture Matter?
Principles

Does Cybersecurity Solution Architecture Matter?

Can security software drive positive change in the way enterprise works? What would it take to build something that can empower and enable teams, rather than waste time and add headaches?

  • Anton Goncharov
    Anton Goncharov
2 min read
CRFT: No-Code Automation for Cybersecurity © 2025
Blog · Contact · Privacy · Terms of Use