Latest articles from SOCRadar

tactical cyber threat intelligence
September 21, 2021

What is Tactical Cyber Threat Intelligence and How to Use it

As cyber threats become more complex than ever, many organizations devote more resources to their security programs. Almost every organization creates security teams to deploy network solutions and address threats. A vital component of the… Continue Reading

domain hijacking
August 23, 2021

Detecting IoT Devices For Your Company

From smart wearables to interconnected industrial devices the IOT is becoming a larger part of our lives since the first coinage of the term in 1999 at a P&G presentation (although the idea goes far… Continue Reading

socradar blog cti
August 16, 2021

What is Strategic Cyber Intelligence and How to Use it

As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes are building security teams to deploy network solutions and address threats. A key component to… Continue Reading

May 10, 2021

Is RDAP (Registration Data Access Protocol) Going to Replace WHOIS?

RDAP was created as a WHOIS system successor and is ultimately expected to replace WHOIS as the official source for IP addresses, Domain Names, Autonomous Systems, and many other registry data. RDAP uses an HTTP… Continue Reading

September 17, 2020

Using Cyber Kill Chain for Threat Intelligence

To block the attack vector, you need to know how an attacker thinks. The same idea applies to organizations that want to prevent cybercrimes. The consequences of a cyber attack can be devastating in terms… Continue Reading

Connection Around Earth
September 11, 2020

Why Is It Important? East-West and North-South Traffic Security

Data centers are physical facilities designed to support your business applications, AI activities, file sharing, communications and collaboration services, and many more. They contain servers, storage systems, routers, firewalls, and other components which are crucial… Continue Reading

August 3, 2020

Different Types of Threat Intelligence: What is It & Who is It for?

The information provided by the threat intelligence, it makes a significant contribution to various business decisions in organizations. The information presented to the organization from an outside perspective is important to require action in internal… Continue Reading

July 20, 2020

What’s MITRE PRE-ATT&CK and How To Use It in Threat Intelligence?

Founded in 1958, MITRE is a non-profit company whose mission is to solve the problem of a safer world. A new curated knowledge base, known as MITRE ATT&CK, which stands for adversarial tactics, techniques, and… Continue Reading

July 13, 2020

What You Need To Know About Traffic Light Protocol Usage in Threat Intelligence

There are a few standards and formats for timely and more effective exchange of sensitive intelligence, and Traffic Light Protocol, better known as TLP, is one of them. In other words, TLP is a comprehensive… Continue Reading

July 6, 2020

Open Source Intelligence (OSINT) 101

Open Source Intelligence, better known as OSINT, is a technology that refers publicly available and open sources of information (as opposed to covert or secret sources) used in connection with intelligence. OSINT is information that… Continue Reading

June 19, 2020

Types of Threat Intelligence Gathering

For better security functioning, all organizations need reliable but also real-time cyber threat intelligence. Producing threat intelligence is a complex process and goes through a 5-staged cycle. We have previously written a blog explaining each… Continue Reading

June 11, 2020

5 Stages of The Threat Intelligence Lifecycle

Real-time and reliable cyber threat intelligence is essential for the security functions of organizations. It is leveraged by organizations of different sizes to understand adversary behavior and stay prepared for emerging threats. Producing it is… Continue Reading

June 3, 2020

The Difference Between Data, Information and Intelligence

Data. Information. Intelligence. Oftentimes confused by people, these very different terms can not be used interchangeably but have a tight connection between each other. The order goes like this: Data is collected, then assembled into… Continue Reading


powered by MailChimp!
SOCRadar helps you visualize digital risk, and reduce your company's attack surface
Request Demo