Blog

Latest articles from SOCRadar

communication-technology-internet-business-global-
October 16, 2020

Different Definitions of Threat Intelligence and Gartner’s Perspective

Cyber threat intelligence defined Cyber threat intelligence is information and intelligence gathered from outside sources, required in taking internal actions. With relevant and real-time intelligence, it helps organizations of different sizes, carry out protective measures,… Continue Reading

by
Shopping online concept
October 12, 2020

Top Threat Intelligence Use Cases for the E-Commerce Industry-I

The prevention of the landscape is no longer enough in today’s cybersecurity. All have never faced such high and concrete threats from advanced phishing operations to ransomware attacks to digital payment platforms and consumer databases… Continue Reading

by
technical financial graph on technology abstract background
October 5, 2020

Top Threat Intelligence Use Cases for the Finance Sector-II

Security departments in the financial industry are facing a daunting mission. They have to defend the company from an immense amount of indiscriminate attacks, which is the price of simply being an online enterprise. At… Continue Reading

by
October 1, 2020

Using Google Dorks for Threat Intelligence Operations

Enterprises have to deal with a range of mass campaigns as well as advanced attacks that target a specific industry or company. Threat actors use ever-changing methods to reach their target, and always research before… Continue Reading

by
September 28, 2020

Top Threat Intelligence Use Cases for the Finance Sector-I

Security departments in the financial industry are facing a daunting mission. They have to defend the company from an immense amount of indiscriminate attacks, which is the price of simply being an online enterprise. At… Continue Reading

by
August 10, 2020

Top 10 Threat Intelligence Certifications: Empower Your Analysis Skills

Threat Intelligence plays a key role in providing the relevant intelligence for companies to help them carry out protective measures and keep their confidentiality. This makes it a promising career path for cyber security enthusiasts.… Continue Reading

by
October 1, 2019

Defending Against Persistent Threats

Threat actors follow a series of events-called the “cyber kill chain framework” from defense perspective-to successfully infiltrate a network and either exfiltrate, destroy, or to cause business disruption. The lifecycle of an attack can be… Continue Reading

by
Newsletter

powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo