SOC Third Defense Phase – Understanding Your Organization Assets

In our first phase, we have seen the basic defense mechanisms which was recommended in organizations. In our second phase, we have seen the understanding and the importance of the behaviors of modern-day malware to...

Intrusion Detection System (IDS) And Its Detailed Working Function -SOC/SIEM

Intrusion detection system (IDS) gathers and analyzes information from within a computer or network to identify unauthorized access, misuse, and possible violations. IDS also can be referred as a packet sniffer which intercepts packets travel along various communication mediums. All the packets are...

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of compromise become visible. Use of IoAs provides a way to shift from reactive cleanup/recovery to a proactive mode, where attackers...


Signup to get Hacking News & Tutorials to your Inbox


Most Popular