SOCRadar® Cyber Intelligence Inc. | Top 10 Metrics Every CISO Should Track for Better Security
Nov 20, 2024
Top 10 Metrics Every CISO Should Track for Better Security

Top 10 Metrics Every CISO Should Track for Better Security Chief Information Security Officers (CISOs) must navigate a wide range of threats and vulnerabilities in order to effectively protect their o...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Adversarial Threat Emulation and Validation?
Nov 14, 2024
What is Adversarial Threat Emulation and Validation?

What is Adversarial Threat Emulation and Validation? How prepared is your organization to face the same tactics used by the most advanced cyber attackers? Adversarial threat emulation answers this que...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Breach and Attack Simulation (BAS) Software in 2024
Oct 15, 2024
Top 10 Breach and Attack Simulation (BAS) Software in 2024

Top 10 Breach and Attack Simulation (BAS) Software in 2024 In the cyber world, attackers are constantly seeking out new vulnerabilities and weaknesses to exploit. From phishing campaigns to advanced m...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 CISO Statistics and Trends in Cybersecurity for 2024
Sep 25, 2024
Top 10 CISO Statistics and Trends in Cybersecurity for 2024

Top 10 CISO Statistics and Trends in Cybersecurity for 2024 The role of the Chief Information Security Officer (CISO) is increasingly challenging. Once viewed as technical experts focused on day-to-da...

Learn More
SOCRadar® Cyber Intelligence Inc. | Chrome Security Evolution and Impact on Stealer Logs in the Underground Market
Sep 23, 2024
Chrome Security Evolution and Impact on Stealer Logs in the Undergroun...

Chrome Security Evolution and Impact on Stealer Logs in the Underground Market [Update] October 30, 2024: “New Tool Compromises Chrome’s Enhanced Cookie Encryption” As one of the most widely use...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Free Penetration Testing Tools
Sep 18, 2024
Top 10 Free Penetration Testing Tools

Top 10 Free Penetration Testing Tools Penetration testing, or pentesting, is a security practice where real-world attacks are simulated on an organization’s systems to identify vulnerabilities and sec...

Learn More
SOCRadar® Cyber Intelligence Inc. | Understanding the Components of Information Security Risk Management
Sep 06, 2024
Understanding the Components of Information Security Risk Management

Understanding the Components of Information Security Risk Management Information Security Risk Management (ISRM) plays a critical role in safeguarding sensitive data and ensuring that risks are identi...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Does SOCRadar Use AI In Its Platform?
Sep 05, 2024
How Does SOCRadar Use AI In Its Platform?

How SOCRadar Uses AI SOCRadar leverages AI technologies in three distinct ways to enhance its threat intelligence capabilities and deliver more precise and valuable insights to its customers. ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Vote for SOCRadar: Finalist in the Computing Security Awards 2024
Sep 03, 2024
Vote for SOCRadar: Finalist in the Computing Security Awards 2024

Vote for SOCRadar: Finalist in the Computing Security Awards 2024! We are thrilled to announce that SOCRadar has been selected as a finalist in the 2024 Computing Security Awards! Our innovative solut...

Learn More
SOCRadar® Cyber Intelligence Inc. | SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Secure by Design, and NICCS
Sep 03, 2024
SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Se...

SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Secure by Design, and NICCS We are thrilled to announce that SOCRadar has been recognized by the Cybersecurity and Infrastructure Se...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Endpoint Security Management
Sep 02, 2024
What is Endpoint Security Management

What is Endpoint Security Management Endpoint Security Management refers to the processes, tools, and strategies used to secure endpoints or entry points on end-user devices such as computers, mobile ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández
Aug 27, 2024
Navigating the Cybersecurity Landscape: Insights from José Carlos Hurt...

Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández This interview is part of our ongoing series with industry leaders who share their experiences and strategies in the...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is IOC Management?
Aug 21, 2024
What is IOC Management?

What is IOC Management? IOC Management is a critical aspect of cybersecurity that involves identifying, handling, and responding to data points indicating potential security breaches or malicious acti...

Learn More
SOCRadar® Cyber Intelligence Inc. | Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns
Aug 08, 2024
Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training...

Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns The cybersecurity landscape constantly evolves, and staying ahead of emerging threats with complicated risks is more cruc...

Learn More
SOCRadar® Cyber Intelligence Inc. | 5 Supply Chain Intelligence Use Cases with SOCRadar Module
Aug 07, 2024
5 Supply Chain Intelligence Use Cases with SOCRadar Module

5 Supply Chain Intelligence Use Cases with SOCRadar Module Numerous high-profile incidents have evidenced that cyber threats to the supply chain can have catastrophic consequences. To mitigate these r...

Learn More
SOCRadar® Cyber Intelligence Inc. | Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin
Jul 17, 2024
Executive Interview: Emerging Trends and Effective Strategies from GCI...

Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin In our ongoing series of CISO interviews, we are excited to share insights from Dan Maslin, the Group Chief Informat...

Learn More
SOCRadar® Cyber Intelligence Inc. | Key Threat Intelligence Sources to Access Current Threat Insights
Jul 17, 2024
Key Threat Intelligence Sources to Access Current Threat Insights

Key Threat Intelligence Sources to Access Current Threat Insights Using various threat intelligence sources can make the difference between preventing an attack and falling victim to one. An AI illus...

Learn More
SOCRadar® Cyber Intelligence Inc. | Explore SOCRadar's Advanced Certified Training Program
May 24, 2024
Explore SOCRadar's Advanced Certified Training Program

Stay Ahead in Cybersecurity: Explore SOCRadar’s Advanced Certified Training Program The biggest challenge in cybersecurity is staying ahead of threats, and it requires continuous learning and adaptati...

Learn More
SOCRadar® Cyber Intelligence Inc. | Executive Interview: CVA's Cyber Leaders on Navigating Emerging Threats
May 09, 2024
Executive Interview: CVA's Cyber Leaders on Navigating Emerging Threat...

Executive Interview: CVA’s Cyber Leaders on Navigating Emerging Threats In the rapidly evolving world of digital security, maintaining strong cybersecurity measures is no longer optional but crucial, ...

Learn More
SOCRadar® Cyber Intelligence Inc. | José Ferreira's Insights on Elevating Healthcare Cybersecurity: Strategies and Challenges
Apr 15, 2024
José Ferreira's Insights on Elevating Healthcare Cybersecurity: Strate...

José Ferreira’s Insights on Elevating Healthcare Cybersecurity: Strategies and Challenges In a landscape where cyber threats constantly evolve and present new challenges, especially in critical ...

Learn More