Tag: SOC

attack chain

SOC First Defense phase – Understanding the Cyber Attack Chain – A Defense Approach...

This article will help you to understand the modern cyber threats and the most commonly used attack surfaces behind any malware/cyber-attacks. In most...
Threat Profiles

SOC Second Defense Phase – Understanding the Cyber Threat Profiles

In the first phase of architecturing the SOC, we have seen the basic level understanding of the attacks and necessary steps to...
Intrusion Prevention System

Intrusion Prevention System (IPS) In-depth Analysis – A Detailed Guide

Like an intrusion detection system (IDS), an intrusion prevention system (IPS) screens network traffic. An Intrusion Prevention System (IPS) is a framework...
Threat Intelligence

SOC Fourth Defense Phase – Importance of Cyber Threat Intelligence

Cyber Threat intelligence is one of the most important concerns in the evolving threat environment of rapid day-zero attacks, cyber-criminality and espionage...

SOC Third Defense Phase – Understanding Your Organization Assets

In our first phase, we have seen the basic defense mechanisms which was recommended in organizations. In our second phase,...

Newsletter

Signup to get Hacking News & Tutorials to your Inbox

Cyber Security Courses

ethicalhackersacademy

Computer Security