SOC Resources

We cover all the newest stories and changes about Security Operations Centers (SOC) resources in this section. This includes details about tools, technologies, best practices, and plans for making SOC processes run more smoothly. Learn about new developments in SOC management, new resources, and ways to improve your ability to watch and respond to security threats. Our coverage helps you keep up with managing and making your SOC setting better.

Intrusion Detection System (IDS) – A Detailed Guide & Working Function -SOC/SIEMIntrusion Detection System (IDS) – A Detailed Guide & Working Function -SOC/SIEM

Intrusion Detection System (IDS) – A Detailed Guide & Working Function -SOC/SIEM

An intrusion detection system (IDS) gathers and analyzes information from within a computer or network to identify unauthorized access, misuse, and…

2 years ago
Live Cyber Forensics Analysis with Computer Volatile MemoryLive Cyber Forensics Analysis with Computer Volatile Memory

Live Cyber Forensics Analysis with Computer Volatile Memory

The field of computer Forensics analysis involves identifying, extracting, documenting, and preserving information that is stored or transmitted in an…

2 years ago
SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOCSOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC

SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC

This article will help you to understand the SOC modern cyber threats and the most commonly used attack surfaces behind any…

2 years ago
Intrusion Prevention System (IPS) In-depth Analysis – A Detailed GuideIntrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive…

2 years ago
Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEMIntrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something…

2 years ago
Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed ExplanationIndicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of…

2 years ago
Windows Registry Analysis – Tracking Every Activity That You Do on the Windows SystemWindows Registry Analysis – Tracking Every Activity That You Do on the Windows System

Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System

The purpose of this article is to provide you with a depth understanding of the Windows Registry and the Wealth…

2 years ago
Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDRSecure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR

Secure Your Network From Advanced Cyber Threats With Next Gen SIEM & Open XDR

Security information and event management, or SIEM, was introduced some 17 years ago. It makes sense for a next-gen SIEM…

2 years ago
SOC Third Defense Phase – Understanding Your Organization AssetsSOC Third Defense Phase – Understanding Your Organization Assets

SOC Third Defense Phase – Understanding Your Organization Assets

In our first phase, we have seen the basic defense mechanisms which were recommended in organizations. In our second phase,…

4 years ago