Zscaler Capabilities and Its Use in Threat Detection and Response
Background The emergence of cloud-based services has changed how businesses approach network security in the always changing field of cybersecurity. […]
Silentbob: A New Campaign by Team TNT Attacking Cloud Environments
The infrastructure of many organizations has included cloud computing in recent years due to its multiple advantages in terms of […]
What is SOC beyond a Monitoring Center?
Managed SOC / CSOC (aka Cyber Security Operations Center) is often regarded as the workplace where the nerdy information security […]
The Basics of Threat Hunting
Forms of Threat Hunt The truth is that threat hunt end goal plays an important role in the whole classification […]
A Threat Hunt Tale
The human domain is complex and unpredictable, and as a result the logic behind certain behaviors are also complex. The […]
Threat Modeling Recipe for a State-of-the-Art SOC
Today, every security expert agrees that we are in the middle of a cyber warfare walking right across a mine […]