What is the Role of Single Sign-On in Security Measures? – Part 2
What is the Role of Single Sign-On in Security Measures? – Part 2 By SOCRadar Research Read the previous article: What is the Role of Single Sign-On in Security Measures? – Part 1 Maintaining easy and...
What is the Role of Single Sign-On in Security Measures? – Part 1
What is the Role of Single Sign-On in Security Measures? – Part 1 By SOCRadar Research Identity and Access Management (IAM) can be challenging in an enterprise environment. For users and administ...
Building Cybersecurity Awareness for Organizations
Building Cybersecurity Awareness for Organizations Cybersecurity has become a vital phenomenon for every institution today, but ensuring safety is a long process that includes different layers, and on...
The Ultimate OSINT Handbook on Personal Information
The Ultimate OSINT Handbook on Personal Information OSINT is a term that refers to the process of gathering information from publically accessible sources. These sources include but are not limited to...
Halloween Special: The Spookiest Cybersecurity Stories
Halloween Special: The Spookiest Cybersecurity Stories It’s the season of ghouls, ghosts, and outrageous costumes. But for cybersecurity professionals, Halloween is more likely to be a notification wa...
What are the Different Methods of Threat Detection?
What are the Different Methods of Threat Detection? Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise ...
Ten Things Will Change Cybersecurity in 2023
Ten Things Will Change Cybersecurity in 2023 Businesses come across more significant cybersecurity challenges as technology evolves. The digital environment and the attack surface are changing every s...
Top 10 Threat Intelligence Resources to Follow
Top 10 Threat Intelligence Resources to Follow Access to timely cyber threat intelligence is widely acknowledged as a crucial protection tactic in our dynamic cyber threat scenario. As a result, there...
What is Customer Identity and Access Management (CIAM)?
What is Customer Identity and Access Management (CIAM)? CIAM (Customer identity and access management) is part of the identity and access management (IAM) system integrated into applications for exter...
Top 10 Threat Intelligence Browser Extensions for SOC Analysts
Top 10 Threat Intelligence Browser Extensions for SOC Analysts Browser extensions simplify several tasks. They are not limited to standard web surfing but may also be helpful for cybersecurity special...
What is Strategic Cyber Intelligence and How to Use it
What is Strategic Cyber Intelligence and How to Use it As cyber threats become more sophisticated, many organizations are paying more attention to their security programs. Organizations of all sizes a...
Top 10 Search Engines for Pentesters and Bug Bounty Hunters
Top 10 Search Engines for Pentesters and Bug Bounty Hunters Gathering information is the first step in identifying security vulnerabilities and analyzing risks. To collect data, security professionals...
Top 10 DNS Threat Analysis and Monitoring Tools
Top 10 DNS Threat Analysis and Monitoring Tools DNS converts easy-to-remember domain names into numeric IP addresses determined by the primary network protocols of the computer services and devices to...
Expectations of SOC Team from CTI
Expectations of SOC Team from CTI Every company with an online component to its business needs cyber awareness; it also requires a Security Operations Center (SOC) if the online part is big enough. A ...
Major Cyber Attacks in Review: June 2022
Major Cyber Attacks in Review: June 2022 You can follow the major cyber security attacks of each month on SOCRadar’s “Radar” page! We experienced critical days last month due to...
Top 5 Phishing Resources for SOC Teams
Top 5 Phishing Resources for SOC Teams Phishing is a cyber-attack in which attackers defraud their victims through email, text messaging, phone calls, or websites. Attackers redirect their victims to ...
Top 5 Tactics Threat Actors Use for Initial Access
Top 5 Tactics Threat Actors Use for Initial Access A short while ago, combined security advice released by several national cybersecurity agencies highlighted the top ten attack vectors most used by t...
How DNS Sinkholing Works?
How DNS Sinkholing Works? ...
What are the Top Ten Data Breaches of All Times?
What are the Top Ten Data Breaches of All Times? In the cyber world that grows and develops with cumulative data accumulation, “small” and short-term data breaches that we think we can ignore from tim...
What are the Different Types of Attacks in Cybersecurity?
What are the Different Types of Attacks in Cybersecurity? A cyber attack is a sort of attack that uses numerous tactics to target computer systems, infrastructures, networks, or personal computer devi...