SOCRadar® Cyber Intelligence Inc. | From the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1
Oct 01, 2024
From the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1

From the Trenches: Top 10 Cybersecurity Lessons Learned in 2024 H1 The first half of the year has been marked by sophisticated attacks, with ransomware incidents reaching alarming new heights and crit...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 CISO Statistics and Trends in Cybersecurity for 2024
Sep 25, 2024
Top 10 CISO Statistics and Trends in Cybersecurity for 2024

Top 10 CISO Statistics and Trends in Cybersecurity for 2024 The role of the Chief Information Security Officer (CISO) is increasingly challenging. Once viewed as technical experts focused on day-to-da...

Learn More
SOCRadar® Cyber Intelligence Inc. | Using Artificial Intelligence in Cybersecurity (Ultimate Guide)
Sep 13, 2024
Using Artificial Intelligence in Cybersecurity (Ultimate Guide)

Using Artificial Intelligence in Cybersecurity (Ultimate Guide) Welcome to the first of our ultimate guides on cybersecurity topics, starting with artificial intelligence in cybersecurity. In these co...

Learn More
SOCRadar® Cyber Intelligence Inc. | Vote for SOCRadar: Finalist in the Computing Security Awards 2024
Sep 03, 2024
Vote for SOCRadar: Finalist in the Computing Security Awards 2024

Vote for SOCRadar: Finalist in the Computing Security Awards 2024! We are thrilled to announce that SOCRadar has been selected as a finalist in the 2024 Computing Security Awards! Our innovative solut...

Learn More
SOCRadar® Cyber Intelligence Inc. | SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Secure by Design, and NICCS
Sep 03, 2024
SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Se...

SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Secure by Design, and NICCS We are thrilled to announce that SOCRadar has been recognized by the Cybersecurity and Infrastructure Se...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Ransomware Playbook: Evolving Threats and Defense Strategies for 2024
Aug 28, 2024
The Ransomware Playbook: Evolving Threats and Defense Strategies for 2...

The Ransomware Playbook: Evolving Threats and Defense Strategies for 2024 In 2024, ransomware will continue to rank as one of the most pervasive and effective threats to organizations globally. Attack...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández
Aug 27, 2024
Navigating the Cybersecurity Landscape: Insights from José Carlos Hurt...

Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández This interview is part of our ongoing series with industry leaders who share their experiences and strategies in the...

Learn More
SOCRadar® Cyber Intelligence Inc. | Examples of AI-Assisted Cyber Attacks
Aug 24, 2024
Examples of AI-Assisted Cyber Attacks

Examples of AI-Assisted Cyber Attacks AI-assisted cyberattacks, driven by the rapid advancements in generative AI, have become a significant concern in the cybersecurity landscape. Cybercriminals are ...

Learn More
SOCRadar® Cyber Intelligence Inc. | IBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of Cybersecurity Failures
Aug 21, 2024
IBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of Cybe...

IBM’s Cost of Data Breach Report 2024: Unveiling the True Cost of Cybersecurity Failures Managing a data breach goes beyond simply addressing the financial impact; it involves tackling a crisis that c...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Pretexting? Definition and Examples in Cybersecurity
Aug 20, 2024
What is Pretexting? Definition and Examples in Cybersecurity

What is Pretexting? Definition and Examples in Cybersecurity Pretexting is a social engineering tactic in which attackers fabricate a scenario or a “pretext” to trick people into disclosin...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 50 Cloud Statistics in 2024 (Essential Insights on Investments, Breaches, Misconfigurations, and More)
Aug 13, 2024
Top 50 Cloud Statistics in 2024 (Essential Insights on Investments, Br...

Top 50 Cloud Statistics in 2024 (Essential Insights on Investments, Breaches, Misconfigurations, and More) In the fast-changing world of cloud computing, it’s essential for both organizations and prof...

Learn More
SOCRadar® Cyber Intelligence Inc. | Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns
Aug 08, 2024
Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training...

Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns The cybersecurity landscape constantly evolves, and staying ahead of emerging threats with complicated risks is more cruc...

Learn More
SOCRadar® Cyber Intelligence Inc. | The Leidos Leak: What to Know, What Are Its Implications?
Aug 01, 2024
The Leidos Leak: What to Know, What Are Its Implications?

The Leidos Leak: What to Know, What Are Its Implications? In July, a post on BreachForums brought to light a significant leak involving Leidos Holdings Inc., claiming the exposure of internal files. L...

Learn More
SOCRadar® Cyber Intelligence Inc. | Exploit Chain: When One Vulnerability Isn't Enough
Jul 29, 2024
Exploit Chain: When One Vulnerability Isn't Enough

Exploit Chain: When One Vulnerability Isn’t Enough A vulnerability is a weakness that cybercriminals can exploit to gain unauthorized access to a computer system. Cybersecurity experts continual...

Learn More
SOCRadar® Cyber Intelligence Inc. | Threat Intelligence Maturity Model (TIMM) - Utilizing TIP (Threat Intelligence Provider)
Jul 24, 2024
Threat Intelligence Maturity Model (TIMM) - Utilizing TIP (Threat Inte...

Threat Intelligence Maturity Model (TIMM) – Utilizing TIP (Threat Intelligence Provider) Many organizations lack sufficient knowledge about the threats they face and their own security posture as well...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Custom GPT Models Facilitate Fraud in the Digital Age
Jul 23, 2024
How Custom GPT Models Facilitate Fraud in the Digital Age

How Custom GPT Models Facilitate Fraud in the Digital Age In recent years, the landscape of Artificial Intelligence (AI) has seen remarkable advancements, with GPT (Generative Pre-trained Transformer)...

Learn More
SOCRadar® Cyber Intelligence Inc. | Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin
Jul 17, 2024
Executive Interview: Emerging Trends and Effective Strategies from GCI...

Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin In our ongoing series of CISO interviews, we are excited to share insights from Dan Maslin, the Group Chief Informat...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 SOAR Platforms
Jul 12, 2024
Top 10 SOAR Platforms

Top 10 SOAR Platforms Security Orchestration, Automation, and Response (SOAR) platforms have become critical tools for improving security operations. These platforms integrate and automate security wo...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomware, Phishing, Industry Trends, and More)
Jul 05, 2024
Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomw...

Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomware, Phishing, Industry Trends, and More) Welcome to our roundup of the Top 50 Cybersecurity Statistics in 2024. As cyber threats ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Deepfake Scams Impacting Industries Worldwide
Jul 02, 2024
Top 10 Deepfake Scams Impacting Industries Worldwide

Top 10 Deepfake Scams Impacting Industries Worldwide Deepfake technology has emerged as an effective tool for both creative and malicious purposes. This technology employs AI to generate highly realis...

Learn More