Latest articles from SOCRadar
In recent years, we have seen countless high-profile data breaches that have left businesses and individuals vulnerable. To combat these threats, there is one most effective security policy: Zero Trust (ZT). This powerful security concept is gaining traction… Continue Reading
In 1950, Alan Turing, the father of modern computing, asked, "Can machines think?" Over the years, that question has evolved into a quest for inventing machines that can understand and generate human-like text and has… Continue Reading
When the expression "first 100 days" is mentioned, we all immediately think of what a leading politician has done from the first day to the hundredth day. These "first 100 days" became iconic during Franklin… Continue Reading
A modern-day SOC is made from three components: people, processes, and technologies. In the people factor, a SOC team accounts for the provision of IT security services via detecting potential cyber threats and attacks actively,… Continue Reading
A senior-level executive known as a "CISO" is in charge of planning and executing an extensive information security program to safeguard the company from both internal and external threats. A CISO is a senior-level executive who carries… Continue Reading
Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise the network. Before a threat exploits any existing vulnerabilities, mitigating measures… Continue Reading
Chief information security officers (CISO) handle data protection and management's strategic, operational, and financial aspects. These experts collaborate closely with other leaders to design an enterprise or organization's information security policies and procedures. In addition,… Continue Reading
The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important critical infrastructures, with all its network, assets, and systems. It also interacts with… Continue Reading
Why is Ransomware One of the First Items on the CISOs Agenda? Rise with Pandemic With the pandemic, as we rush towards an increasingly digitized world, ransomware has become our institutions' most prevalent cyber threat. … Continue Reading
Cybersecurity technologies are now necessary for all types and sizes of organizations, not just enterprises. Since threat actors no longer target just the largest companies, everyone must have effective solutions and a thorough cybersecurity strategy. Whether… Continue Reading
Overview of Cloud Security Cloud security, in short, is the application of the best technology and best practices aimed at objectives such as data and brand protection, preventing disruption of services, and protecting the infrastructure within… Continue Reading
A McKinsey article states that today’s organizations are expected to suffer from three major trends for the next three to five years. These trends can be expressed simply as follows; Increase in the on-demand ubiquitous data access &… Continue Reading
A Security Operations Center (SOC) is a centralized function inside an organization that employs people, procedures, and technology to continually monitor and enhance an organization's security posture. It also prevents, identifies, analyzes, and reacts to cybersecurity… Continue Reading
Endpoint Security products are responsible for a market size of approximately 14 million in 2021. Regarding this market's compound annual growth rate (CAGR), it is estimated that the market will double in 9 years. According… Continue Reading
In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to detect cyberattacks using MITRE ATT&CK Framework, and how we can protect ourselves and… Continue Reading
Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization's IT infrastructure. What is Attack Surface Management? While similar in nature to asset discovery or asset management, frequently… Continue Reading
Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations. These attacks can result in major data breaches and leaks. This article tells… Continue Reading
Phishing attacks have victimized many users and companies for years, and it seems they will continue to do so. Many security measures have been taken against such attacks. However, the attackers develop new TTPs with the… Continue Reading
There are a variety of network monitoring and perimeter protection solutions available for both personal and commercial networks. Nevertheless, even the most protected businesses may fall prey to a cyber assault. The terrifying aspect of this… Continue Reading
BEC attack is a type of social engineering attack that takes place over email and the attacker aims for financial gain. Often, attackers aim to trick employees into sending money or valuable personal data (PII)… Continue Reading