SOCRadar® Cyber Intelligence Inc. | Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin
Jul 17, 2024
Executive Interview: Emerging Trends and Effective Strategies from GCI...

Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin In our ongoing series of CISO interviews, we are excited to share insights from Dan Maslin, the Group Chief Informat...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 SOAR Platforms
Jul 12, 2024
Top 10 SOAR Platforms

Top 10 SOAR Platforms Security Orchestration, Automation, and Response (SOAR) platforms have become critical tools for improving security operations. These platforms integrate and automate security wo...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomware, Phishing, Industry Trends, and More)
Jul 05, 2024
Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomw...

Top 50 Cybersecurity Statistics in 2024 (Essential Insights on Ransomware, Phishing, Industry Trends, and More) Welcome to our roundup of the Top 50 Cybersecurity Statistics in 2024. As cyber threats ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Deepfake Scams Impacting Industries Worldwide
Jul 02, 2024
Top 10 Deepfake Scams Impacting Industries Worldwide

Top 10 Deepfake Scams Impacting Industries Worldwide Deepfake technology has emerged as an effective tool for both creative and malicious purposes. This technology employs AI to generate highly realis...

Learn More
SOCRadar® Cyber Intelligence Inc. | CISO Guide for Quantum Computing: Risks and Opportunities (Part II)
Jun 30, 2024
CISO Guide for Quantum Computing: Risks and Opportunities (Part II)

CISO Guide for Quantum Computing: Risks and Opportunities (Part II) While the specter of quantum computing as a new source of threats usually dominates the discussion, it is imperative to note that wh...

Learn More
SOCRadar® Cyber Intelligence Inc. | An Overview of Intelligence Requirements in CTI
Jun 24, 2024
An Overview of Intelligence Requirements in CTI

An Overview of Intelligence Requirements in CTI Security, in general, is a complex domain where you need to keep in mind a variety of factors. In a complex field like this, the role of intelligence ca...

Learn More
SOCRadar® Cyber Intelligence Inc. | CISO Guide for Quantum Computing: Risks and Opportunities (Part I)
Jun 21, 2024
CISO Guide for Quantum Computing: Risks and Opportunities (Part I)

CISO Guide for Quantum Computing: Risks and Opportunities (Part I) For Chief Information Security Officers (CISOs) in charge of cybersecurity, quantum computing brings its paradox. It is both an oppor...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Cybersecurity Conferences
Jun 13, 2024
Top 10 Cybersecurity Conferences

Top 10 Cybersecurity Conferences In the dynamic and ever-evolving world of cybersecurity, certain events stand as pillars of knowledge exchange and innovation. These gatherings, many of which have bee...

Learn More
SOCRadar® Cyber Intelligence Inc. | Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigation Methods
Jun 13, 2024
Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigati...

Phishing in 2024: 4,151% Increase Since Launch of ChatGPT; AI Mitigation Methods Phishing remains a major threat in cybersecurity, with attacks growing more frequent and sophisticated each year. In 20...

Learn More
SOCRadar® Cyber Intelligence Inc. | Libraries for Red Teaming Your GenAI Applications
Jun 12, 2024
Libraries for Red Teaming Your GenAI Applications

Libraries for Red Teaming Your GenAI Applications It is critical to ensure the security and integrity of Generative AI (GenAI) applications. Red teaming these applications entails proactively identify...

Learn More
SOCRadar® Cyber Intelligence Inc. | CISO Guide to Deepfake Scams
Jun 10, 2024
CISO Guide to Deepfake Scams

CISO Guide to Deepfake Scams Initially perceived as a novelty, deepfakes have evolved into sophisticated fraud, misinformation, and manipulation tools. Utilizing artificial intelligence and machine le...

Learn More
SOCRadar® Cyber Intelligence Inc. | Unleashing AI's Potential: Top 10 Tools for CISO for Productivity (Part-2)
Jun 07, 2024
Unleashing AI's Potential: Top 10 Tools for CISO for Productivity (Par...

Unleashing AI’s Potential: Top 10 Tools for CISO for Security (Part-2) Even in large organizations, persistent and ever-evolving cyber challenges have broken down perimeter security, and traditional m...

Learn More
SOCRadar® Cyber Intelligence Inc. | Exploring the Most Common Passwords in Singapore: Trends, Implications, and Security Tips
Jun 07, 2024
Exploring the Most Common Passwords in Singapore: Trends, Implications...

Exploring the Most Common Passwords in Singapore: Trends, Implications, and Security Tips Passwords are essential for protecting your online accounts, yet many people still use weak, easy-to-guess pas...

Learn More
SOCRadar® Cyber Intelligence Inc. | Impacts of Geopolitics to Cyberspace: Sweden Faces Intensifying Hacktivist Attacks
Jun 07, 2024
Impacts of Geopolitics to Cyberspace: Sweden Faces Intensifying Hackti...

Impacts of Geopolitics to Cyberspace: Sweden Faces Intensifying Hacktivist Attacks On June 28, Salwan Momika, an Iraqi immigrant to Sweden, burned a Qur’an outside a Stockholm mosque. This act, coinci...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Supply Chain Monitoring Platforms
May 31, 2024
Top 10 Supply Chain Monitoring Platforms

Top 10 Supply Chain Monitoring Platforms In today’s globalized business environment, nearly every organization is part of a complex web of interdependencies. This interconnectedness, while enabl...

Learn More
SOCRadar® Cyber Intelligence Inc. | Unleashing AI's Potential: Top 10 Tools for CISO for Security (Part-1)
May 30, 2024
Unleashing AI's Potential: Top 10 Tools for CISO for Security (Part-1)

Unleashing AI’s Potential: Top 10 Tools for CISO for Security (Part-1) One of the most important shifts in the dynamic, modern cyber warfare space is the changing role of the CISO. Advanced threats fo...

Learn More
SOCRadar® Cyber Intelligence Inc. | Detecting Leaked Credentials with Identity & Access Intelligence
May 30, 2024
Detecting Leaked Credentials with Identity & Access Intelligence

Detecting Leaked Credentials with Identity & Access Intelligence Stealers are malicious software engineered by threat actors to compromise systems. Comparable to burglars, these trojans covertly e...

Learn More
SOCRadar® Cyber Intelligence Inc. | False Positives: Million Dollars Worth Issues – Spoiler: It is not even an issue.
May 29, 2024
False Positives: Million Dollars Worth Issues – Spoiler: It is not eve...

False Positives: Million Dollars Worth Issues – Spoiler: It is not even an issue. Fairy tales for adults: from the boy who cried wolf to alert fatigue. Once upon a time, a shepherd boy, bored with his...

Learn More
SOCRadar® Cyber Intelligence Inc. | Explore SOCRadar's Advanced Certified Training Program
May 24, 2024
Explore SOCRadar's Advanced Certified Training Program

Stay Ahead in Cybersecurity: Explore SOCRadar’s Advanced Certified Training Program The biggest challenge in cybersecurity is staying ahead of threats, and it requires continuous learning and adaptati...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Cyber Threats in 2024 - CISO Edition
May 21, 2024
Top 10 Cyber Threats in 2024 - CISO Edition

Top 10 Cyber Threats in 2024 – CISO Edition As organizations prepare for the challenges and opportunities of 2024, the critical importance of cybersecurity preparedness is increasingly apparent. In an...

Learn More