GBH
GBH
Home Tags SOC

Tag: SOC

Modern CyberSOC – A Brief  Implementation Of Building a Collaborative Cyber Security Infrastructure

Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure

0
In earlier years, everyone depends on SOC (including firewalls, WAF, SIEM,etc.) and the priority in building the SOC provides security and the CIA was...
Intrusion Prevention System Architecture

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

0
Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive into Intrusion Prevention System...
Intrusion Detection System (IDS)  and Its Detailed Working Function – SOC/SIEM

Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

3
An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something is trying to compromise...
Windows Event logs

Diving Deeper to Understand the Windows Event logs for Cyber Security Operation Center (SOC)

0
Cyber Security operations center is protecting organizations and sensitive business data of customers. It ensures active monitoring of valuable assets of business with visibility,...

Security Information and Event Management (SIEM) – A Detailed Explanation

7
SIEM software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts generated by...

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

2
What is an Indicator of Attack (IOA) IoA's is some events that could reveal an active attack before indicators of compromise become visible. Use of...
SOC Analyst Training

SOC Analyst Training – Cyber Attack Intrusion Analysis With SIEM Tools|From Scratch To Advanced

0
SOC Training is one of the most important concernS in order to build a Quality Security Operation Center Team to fight against advanced threats...
How to Build and Run a Security Operations Center

How to Build and Run a Security Operations Center

12
Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information technology (IT) enterprise. This includes...

SOC First Defense Phase – Understanding The Cyber Attack Chain – A Defense Approach...

0
This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most times, the...
SOC Third Defense Phase

SOC Third Defense Phase – Understanding Your Organization Assets

0
In our first phase, we have seen the basic defense mechanisms which were recommended in organizations. In our second phase, we have seen the...

Complete Free Website Security Check

Website

Recent Posts