Tag: Security operation

Modern CyberSOC – A Brief  Implementation Of Building a Collaborative Cyber Security Infrastructure

Modern CyberSOC – A Brief Implementation Of Building a Collaborative Cyber Security Infrastructure

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security and the...

SOC Second Defense Phase – Understanding the Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to...
Threat Intelligence

SOC Fourth Defense Phase – Importance of Cyber Threat Intelligence

Cyber Threat intelligence is one of the most important concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security