Tag: SOC

Security Information and Event Management (SIEM) – A Detailed Explanation

SIEM software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of security alerts...
Threat Profiles

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to...
Modern CyberSOC – A Brief  Implementation Of Building a Collaborative Cyber Security Infrastructure

Modern CyberSOC – A Brief Implementation Of Building a Collaborative Cyber Security Infrastructure

In earlier years, everyone depends on SOC (includes firewalls, WAF, SIEM,etc.) and the prioritize in building the SOC provides security and the...
attack chain

SOC First Defense Phase – Understanding The Cyber Attack Chain – A Defense Approach...

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most...
Intrusion Prevention System

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

Like an intrusion detection system (IDS), an intrusion prevention system (IPS) screens network traffic. An Intrusion Prevention System (IPS) is a framework...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Computer Security