SOC

SOC Fourth Defense Phase – Cyber Threat Intelligence GuideSOC Fourth Defense Phase – Cyber Threat Intelligence Guide

SOC Fourth Defense Phase – Cyber Threat Intelligence Guide

Cyber Threat intelligence is one of the most critical concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality…

2 years ago
SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOCSOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC

SOC First Defense – Understanding The Cyber Attack Chain – A Defense with/without SOC

This article will help you to understand the SOC modern cyber threats and the most commonly used attack surfaces behind any…

2 years ago
Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – GuideDiving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide

Diving Deeper Into Windows Event logs for Security Operation Center (SOC) – Guide

Cyber Security operations center is protecting organizations and the sensitive business data of customers. It ensures active monitoring of valuable…

2 years ago
SIEM Better Visibility for SOC Analyst to Handle an Incident with Event IDSIEM Better Visibility for SOC Analyst to Handle an Incident with Event ID

SIEM Better Visibility for SOC Analyst to Handle an Incident with Event ID

We are in a complex world where attacks are increasing day by day, so today cyber intelligence depends on SIEM as…

2 years ago
Modern CyberSOC – A Brief Implementation Of Building a Cyber Security InfrastructureModern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure

Modern CyberSOC – A Brief Implementation Of Building a Cyber Security Infrastructure

In earlier years, everyone depends on CyberSOC (including firewalls, WAF, SIEM, etc.) and the priority in building the SOC provides…

2 years ago
Intrusion Prevention System (IPS) In-depth Analysis – A Detailed GuideIntrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

Like an Intrusion detection system (IDS), an Intrusion prevention system (IPS) screens network traffic. In this article, we deep dive…

2 years ago
Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEMIntrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

Intrusion Detection System (IDS) and Its Detailed Working Function – SOC/SIEM

An intrusion detection system (IDS) is a type of security software designed to automatically alert administrators when someone or something…

2 years ago
Security Information and Event Management (SIEM) – A Detailed ExplanationSecurity Information and Event Management (SIEM) – A Detailed Explanation

Security Information and Event Management (SIEM) – A Detailed Explanation

SIEM software products and services combine security information management (SIM) and security event management (SEM). They provide real-time analysis of…

2 years ago
Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed ExplanationIndicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

Indicator Of Attack(IoA’s) And Activities – SOC/SIEM – A Detailed Explanation

What is an Indicator of Attack (IOA) IoAs is some events that could reveal an active attack before indicators of…

2 years ago
How to Build and Run a Security Operations Center (SOC Guide) – 2023How to Build and Run a Security Operations Center (SOC Guide) – 2023

How to Build and Run a Security Operations Center (SOC Guide) – 2023

Today’s Cyber security operations center (CSOC) should have everything it needs to mount a competent defense of the ever-changing information…

2 years ago