Tag: SOC
SOC Second Defense Phase – Understanding the Cyber Threat Profiles
In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to breaking the...
SIEM Better Visibility for SOC Analyst to Handle an Incident with Event ID
We are in the complex world where attacks are increasing day by day, so today the cyber intelligence depends on SIEM as a part of infosec (security...
Windows Registry Analysis – Tracking Every Activity That You Do on the Windows System
The purpose of this article is to provide you with a depth understanding of the Windows Registry and Wealth of information it holds. Today...
5 Considerations When Implementing A SOC Program
As cyberattacks become more sophisticated than ever, establishing a security operations center (SOC) has become essential. The SOC is a central IT center from...
SOC Fourth Defense Phase – Importance of Cyber Threat Intelligence
Cyber Threat intelligence is one of the most important concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage activities, the...