Blog

Latest articles from SOCRadar

August 10, 2020

Top 10 Threat Intelligence Certifications – Empower Your Analysis Skills

Threat Intelligence plays a key role in providing the relevant intelligence for companies to help them carry out protective measures and keep their confidentiality. This makes it a promising career path for cyber security enthusiasts. … Continue Reading

by
August 3, 2020

Different Types of Threat Intelligence : What is it and Who is it for?

The information provided by the threat intelligence, it makes a significant contribution to various business decisions in organizations. The information presented to the organization from an outside perspective is important to require action in internal… Continue Reading

by
July 27, 2020

How to Protect Your Online Brand?

Creating and developing an eminent brand image is a process that includes significant hard work for years, therefore it makes a very valuable asset of an organization. Not being able to protect it, puts your… Continue Reading

by
July 20, 2020

What’s MITRE PRE-ATT&CK and How to Use it in Threat Intelligence?

Founded in 1958, MITRE is a non-profit company whose mission is to solve the problem of a safer world. A new curated knowledge base, known as MITRE ATT&CK, which stands for Adversarial Tactics, Techniques, and… Continue Reading

by
July 13, 2020

What you need to know about Traffic Light Protocol (TLP) usage in Threat Intelligence

There are a few standards and formats for timely and more effective exchange of sensitive intelligence, and Traffic Light Protocol, better known as TLP, is one of them. In other words, TLP is a comprehensive… Continue Reading

by
July 6, 2020

Open Source Intelligence (OSINT) 101

Open Source Intelligence, better known as OSINT, is a technology that refers publicly available and open sources of information (as opposed to covert or secret sources) used in connection with intelligence. OSINT is information that… Continue Reading

by
June 30, 2020

An overview of Verizon’s 2020 Data Breach Investigation Report: A Deep Look into Attacks, Attackers and Victims

For a better security posture, you need to be aware of what is going on around your industry vector and not just around your company. Thousands of breaches and millions of attacks can occur every… Continue Reading

by
June 22, 2020

Cyber Threat Intelligence Weekly Newsletter(2020/06/15 – 2020/06/22)

This week's most mentioned cybersecurity topics have been covered in this newsletter for you. Latest developments, cyberattacks, data breaches, recent vulnerabilities, threat intelligence insights, and more. Dark Web Insights Aussie websites listed for sale on… Continue Reading

by
June 19, 2020

Types of Threat Intelligence Gathering

For better security functioning, all organizations need reliable but also real-time cyber threat intelligence. Producing threat intelligence is a complex process and goes through a 5-staged cycle. We have previously written a blog explaining each… Continue Reading

by
June 11, 2020

5 Stages of The Threat Intelligence Lifecycle

Real-time and reliable cyber threat intelligence is essential for the security functions of organizations. It is leveraged by organizations of different sizes to understand adversary behavior and stay prepared for emerging threats. Producing it is… Continue Reading

by
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo