Tag: Security operation
Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure
In earlier years, everyone depends on SOC (including firewalls, WAF, SIEM,etc.) and the priority in building the SOC provides security and the CIA was...
SOC Second Defense Phase – Understanding the Cyber Threat Profiles
In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the...
SOC Fourth Defense Phase – Importance of Cyber Threat Intelligence
Cyber Threat intelligence is one of the most important concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage activities, the...