Cyber Threat Management with MITRE ATT&CK – Part 1
Let’s agree on this first, job of a SOC analyst is TOUGH, as tough as finding a needle in a […]
Automated Threat Response with SOAR
Earlier, there were very few options available to sneak into an organisation’s network. Today, the ways in which cyber criminals […]
Pandemic COVID-19 Outbreak – Cyber Security Implications
As the world is trying to deal with the coronavirus pandemic, it seems hackers, fraudsters, and spammers; all flourish and […]
What is SOC beyond a Monitoring Center?
Managed SOC / CSOC (aka Cyber Security Operations Center) is often regarded as the workplace where the nerdy information security […]
The Basics of Threat Hunting
Forms of Threat Hunt The truth is that threat hunt end goal plays an important role in the whole classification […]
A Threat Hunt Tale
The human domain is complex and unpredictable, and as a result the logic behind certain behaviors are also complex. The […]
Threat Modeling Recipe for a State-of-the-Art SOC
Today, every security expert agrees that we are in the middle of a cyber warfare walking right across a mine […]