SOCRadar® Cyber Intelligence Inc. | SOCRadar’s Integrated Takedown Management: A New Era of Online Threat Mitigation
Jan 02, 2025
SOCRadar’s Integrated Takedown Management: A New Era of Online Threat ...

SOCRadar’s Integrated Takedown Management: A New Era of Online Threat Mitigation SOCRadar’s Integrated Takedown Management offers a new way for brands to protect themselves from a growing number of di...

Learn More
SOCRadar® Cyber Intelligence Inc. | Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Server
Dec 13, 2024
Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Serve...

Revolutionizing Cybersecurity with SOCRadar’s Advanced TAXII 2.1 Server The cybersecurity landscape is evolving at an unprecedented pace, with organizations facing increasingly sophisticated and persi...

Learn More
SOCRadar® Cyber Intelligence Inc. | Why is SOCRadar the Preferred Choice for CISOs?
Nov 26, 2024
Why is SOCRadar the Preferred Choice for CISOs?

Why is SOCRadar the Preferred Choice for CISOs? Chief Information Security Officers (CISOs) are under constant pressure to safeguard their organizations against sophisticated threats while maximizing ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Metrics Every CISO Should Track for Better Security
Nov 20, 2024
Top 10 Metrics Every CISO Should Track for Better Security

Top 10 Metrics Every CISO Should Track for Better Security Chief Information Security Officers (CISOs) must navigate a wide range of threats and vulnerabilities in order to effectively protect their o...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Adversarial Threat Emulation and Validation?
Nov 14, 2024
What is Adversarial Threat Emulation and Validation?

What is Adversarial Threat Emulation and Validation? How prepared is your organization to face the same tactics used by the most advanced cyber attackers? Adversarial threat emulation answers this que...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Breach and Attack Simulation (BAS) Software in 2024
Oct 15, 2024
Top 10 Breach and Attack Simulation (BAS) Software in 2024

Top 10 Breach and Attack Simulation (BAS) Software in 2024 In the cyber world, attackers are constantly seeking out new vulnerabilities and weaknesses to exploit. From phishing campaigns to advanced m...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 CISO Statistics and Trends in Cybersecurity for 2024
Sep 25, 2024
Top 10 CISO Statistics and Trends in Cybersecurity for 2024

Top 10 CISO Statistics and Trends in Cybersecurity for 2024 The role of the Chief Information Security Officer (CISO) is increasingly challenging. Once viewed as technical experts focused on day-to-da...

Learn More
SOCRadar® Cyber Intelligence Inc. | Chrome Security Evolution and Impact on Stealer Logs in the Underground Market
Sep 23, 2024
Chrome Security Evolution and Impact on Stealer Logs in the Undergroun...

Chrome Security Evolution and Impact on Stealer Logs in the Underground Market [Update] October 30, 2024: “New Tool Compromises Chrome’s Enhanced Cookie Encryption” As one of the most widely use...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Free Penetration Testing Tools
Sep 18, 2024
Top 10 Free Penetration Testing Tools

Top 10 Free Penetration Testing Tools Penetration testing, or pentesting, is a security practice where real-world attacks are simulated on an organization’s systems to identify vulnerabilities and sec...

Learn More
SOCRadar® Cyber Intelligence Inc. | Understanding the Components of Information Security Risk Management
Sep 06, 2024
Understanding the Components of Information Security Risk Management

Understanding the Components of Information Security Risk Management Information Security Risk Management (ISRM) plays a critical role in safeguarding sensitive data and ensuring that risks are identi...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Does SOCRadar Use AI In Its Platform?
Sep 05, 2024
How Does SOCRadar Use AI In Its Platform?

How SOCRadar Uses AI SOCRadar leverages AI technologies in three distinct ways to enhance its threat intelligence capabilities and deliver more precise and valuable insights to its customers. ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Vote for SOCRadar: Finalist in the Computing Security Awards 2024
Sep 03, 2024
Vote for SOCRadar: Finalist in the Computing Security Awards 2024

Vote for SOCRadar: Finalist in the Computing Security Awards 2024! We are thrilled to announce that SOCRadar has been selected as a finalist in the 2024 Computing Security Awards! Our innovative solut...

Learn More
SOCRadar® Cyber Intelligence Inc. | SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Secure by Design, and NICCS
Sep 03, 2024
SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Se...

SOCRadar Contributes to CISA’s Key Cybersecurity Initiatives: JCDC, Secure by Design, and NICCS We are thrilled to announce that SOCRadar has been recognized by the Cybersecurity and Infrastructure Se...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Endpoint Security Management
Sep 02, 2024
What is Endpoint Security Management

What is Endpoint Security Management Endpoint Security Management refers to the processes, tools, and strategies used to secure endpoints or entry points on end-user devices such as computers, mobile ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández
Aug 27, 2024
Navigating the Cybersecurity Landscape: Insights from José Carlos Hurt...

Navigating the Cybersecurity Landscape: Insights from José Carlos Hurtado Hernández This interview is part of our ongoing series with industry leaders who share their experiences and strategies in the...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is IOC Management?
Aug 21, 2024
What is IOC Management?

What is IOC Management? IOC Management is a critical aspect of cybersecurity that involves identifying, handling, and responding to data points indicating potential security breaches or malicious acti...

Learn More
SOCRadar® Cyber Intelligence Inc. | Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns
Aug 08, 2024
Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training...

Unlocking the Future of Cybersecurity: SOCRadar’s Advanced AI Training Returns The cybersecurity landscape constantly evolves, and staying ahead of emerging threats with complicated risks is more cruc...

Learn More
SOCRadar® Cyber Intelligence Inc. | 5 Supply Chain Intelligence Use Cases with SOCRadar Module
Aug 07, 2024
5 Supply Chain Intelligence Use Cases with SOCRadar Module

5 Supply Chain Intelligence Use Cases with SOCRadar Module Numerous high-profile incidents have evidenced that cyber threats to the supply chain can have catastrophic consequences. To mitigate these r...

Learn More
SOCRadar® Cyber Intelligence Inc. | Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin
Jul 17, 2024
Executive Interview: Emerging Trends and Effective Strategies from GCI...

Executive Interview: Emerging Trends and Effective Strategies from GCISO Dan Maslin In our ongoing series of CISO interviews, we are excited to share insights from Dan Maslin, the Group Chief Informat...

Learn More
SOCRadar® Cyber Intelligence Inc. | Key Threat Intelligence Sources to Access Current Threat Insights
Jul 17, 2024
Key Threat Intelligence Sources to Access Current Threat Insights

Key Threat Intelligence Sources to Access Current Threat Insights Using various threat intelligence sources can make the difference between preventing an attack and falling victim to one. An AI illus...

Learn More