
Exclusive Interview: Dark Web Monitoring, AI’s Role and Strategic Inve...
Exclusive Interview: Dark Web Monitoring, AI’s Role and Strategic Investments in Cyber Security We are delighted to present an exclusive interview with Nigel Simpson, Head of Global Cybersecurity for ...

Main Analytical Frameworks for Cyber Threat Intelligence
Main Analytical Frameworks for Cyber Threat Intelligence Threat intelligence is a cyber-security discipline focusing on detailed knowledge about the cyber threats targeting an organization. Threat Int...

Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Trick...
Mastering the Art of Monitoring the Dark Web for CISOs: Tips and Tricks In the ever-evolving landscape of cybersecurity, Dark Web monitoring has emerged as a significant area of concern for Chief Info...

What is New in the MITRE ATT&CK Framework v12 and v13?
What is New in the MITRE ATT&CK Framework v12 and v13? New threat actors are emerging on the dark web daily, and cybercrimes are increasing exponentially. According to some research insights,...

Open-Source RATs Leveraged By APT Groups
Open-Source RATs Leveraged By APT Groups The complexity and continuous evolution of cyber threats make the attack techniques developed by attackers with objectives such as information theft, espionage...

ChatGPT for SOC Analysts
ChatGPT for SOC Analysts ChatGPT, the language model developed by OpenAI, has taken the tech world by storm since its launch in November 2022. In a matter of months, it has amassed over 100 million mo...

Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy
Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy In recent years, we have seen countless high-profile data breaches that have left businesses and individuals vulnerable. To combat ...

ChatGPT for CTI Professionals
ChatGPT for CTI Professionals In 1950, Alan Turing, the father of modern computing, asked, “Can machines think?” Over the years, that question has evolved into a quest for inventing machines that can ...

How Can Extended Threat Intelligence Help CISO's First 100 Days?
How Can Extended Threat Intelligence Help CISO’s First 100 Days? When the expression “first 100 days” is mentioned, we all immediately think of what a leading politician has done fro...

How Can SOC Analysts Benefit from Cyber Threat Intelligence?
How Can SOC Analysts Benefit from Cyber Threat Intelligence? A modern-day SOC is made from three components: people, processes, and technologies. In the people factor, a SOC team accounts for the prov...

Valuable Resources and Must-Attend Conferences for CISOs
Valuable Resources and Must-Attend Conferences for CISOs A senior-level executive known as a “CISO” is in charge of planning and executing an extensive information security program to safeguard the co...

What are the Different Methods of Threat Detection?
What are the Different Methods of Threat Detection? Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise ...

What Skills Do You Need to Become a Better CISO?
What Skills Do You Need to Become a Better CISO? Chief information security officers (CISO) handle data protection and management’s strategic, operational, and financial aspects. These experts c...

Top Cyber Threats Faced by the Aviation Industry
Top Cyber Threats Faced by the Aviation Industry The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important...

Top 10 Free Cybersecurity Solutions for SMB
Top 10 Free Cybersecurity Solutions for SMB Cybersecurity technologies are now necessary for all types and sizes of organizations, not just enterprises. Since threat actors no longer target just ...

Recent Attack Types Against Cloud Infrastructures
Recent Attack Types Against Cloud Infrastructures ...

How XDR Powers Rapid Attack Detection and Response
How XDR Powers Rapid Attack Detection and Response A McKinsey article states that today’s organizations are expected to suffer from three major trends for the next three to five years. These trends ca...

Top Open Source Solutions for Building Security Operations Center II
Top Open Source Solutions for Building Security Operations Center II A Security Operations Center (SOC) is a centralized function inside an organization that employs people, procedures, and technology...

All You Need to Know About Endpoint Security
All You Need to Know About Endpoint Security Endpoint Security products are responsible for a market size of approximately 14 million in 2021. Regarding this market’s compound annual growth rate...

How to Detect Reconnaissance Using MITRE ATT&CK Framework
How to Detect Reconnaissance Using MITRE ATT&CK Framework In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to dete...
Warning: Undefined variable $postsAll in /var/www/html/wp-content/themes/socradar/category.php on line 175