SOCRadar® Cyber Intelligence Inc. | ChatGPT for SOC Analysts
May 30, 2023
ChatGPT for SOC Analysts

ChatGPT for SOC Analysts ChatGPT, the language model developed by OpenAI, has taken the tech world by storm since its launch in November 2022. In a matter of months, it has amassed over 100 million mo...

Learn More
SOCRadar® Cyber Intelligence Inc. | Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy
May 26, 2023
Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy

Key to Achieving a Stronger Cybersecurity Posture: Zero Trust Policy In recent years, we have seen countless high-profile data breaches that have left businesses and individuals vulnerable. To combat ...

Learn More
SOCRadar® Cyber Intelligence Inc. | ChatGPT for CTI Professionals
May 23, 2023
ChatGPT for CTI Professionals

ChatGPT for CTI Professionals In 1950, Alan Turing, the father of modern computing, asked, “Can machines think?” Over the years, that question has evolved into a quest for inventing machines that can ...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Can Extended Threat Intelligence Help CISO's First 100 Days?
Feb 02, 2023
How Can Extended Threat Intelligence Help CISO's First 100 Days?

How Can Extended Threat Intelligence Help CISO’s First 100 Days? When the expression “first 100 days” is mentioned, we all immediately think of what a leading politician has done fro...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Can SOC Analysts Benefit from Cyber Threat Intelligence?
Nov 15, 2022
How Can SOC Analysts Benefit from Cyber Threat Intelligence?

How Can SOC Analysts Benefit from Cyber Threat Intelligence? A modern-day SOC is made from three components: people, processes, and technologies. In the people factor, a SOC team accounts for the prov...

Learn More
SOCRadar® Cyber Intelligence Inc. | Valuable Resources and Must-Attend Conferences for CISOs
Oct 18, 2022
Valuable Resources and Must-Attend Conferences for CISOs

Valuable Resources and Must-Attend Conferences for CISOs A senior-level executive known as a “CISO” is in charge of planning and executing an extensive information security program to safeguard the co...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are the Different Methods of Threat Detection?
Oct 14, 2022
What are the Different Methods of Threat Detection?

What are the Different Methods of Threat Detection? Threat detection is known as the process of evaluating a security ecosystem from top to bottom to find any malicious behavior that might compromise ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Skills Do You Need to Become a Better CISO?
Oct 11, 2022
What Skills Do You Need to Become a Better CISO?

What Skills Do You Need to Become a Better CISO? Chief information security officers (CISO) handle data protection and management’s strategic, operational, and financial aspects. These experts c...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top Cyber Threats Faced by the Aviation Industry
Sep 27, 2022
Top Cyber Threats Faced by the Aviation Industry

Top Cyber Threats Faced by the Aviation Industry The aviation industry covers a broad spectrum of stakeholders, including airlines, airports, technology providers, etc. It is one of the most important...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 10 Free Cybersecurity Solutions for SMB
Sep 21, 2022
Top 10 Free Cybersecurity Solutions for SMB

Top 10 Free Cybersecurity Solutions for SMB Cybersecurity technologies are now necessary for all types and sizes of organizations, not just enterprises. Since threat actors no longer target just ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Recent Attack Types Against Cloud Infrastructures
Sep 09, 2022
Recent Attack Types Against Cloud Infrastructures

Recent Attack Types Against Cloud Infrastructures ...

Learn More
SOCRadar® Cyber Intelligence Inc. | How XDR Powers Rapid Attack Detection and Response
Sep 07, 2022
How XDR Powers Rapid Attack Detection and Response

How XDR Powers Rapid Attack Detection and Response A McKinsey article states that today’s organizations are expected to suffer from three major trends for the next three to five years. These trends ca...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top Open Source Solutions for Building Security Operations Center II
Aug 31, 2022
Top Open Source Solutions for Building Security Operations Center II

Top Open Source Solutions for Building Security Operations Center II A Security Operations Center (SOC) is a centralized function inside an organization that employs people, procedures, and technology...

Learn More
SOCRadar® Cyber Intelligence Inc. | All You Need to Know About Endpoint Security
Aug 29, 2022
All You Need to Know About Endpoint Security

All You Need to Know About Endpoint Security Endpoint Security products are responsible for a market size of approximately 14 million in 2021. Regarding this market’s compound annual growth rate...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Detect Reconnaissance Using MITRE ATT&CK Framework
Aug 02, 2022
How to Detect Reconnaissance Using MITRE ATT&CK Framework

How to Detect Reconnaissance Using MITRE ATT&CK Framework In this article, we will look at the reconnaissance techniques from the MITRE ATT&CK framework’s point of view and discuss how to dete...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Free Attack Surface Management Tools
Jul 28, 2022
Top 5 Free Attack Surface Management Tools

Top 5 Free Attack Surface Management Tools Attack surface management is the continual identification, monitoring, assessment, prioritizing, and remediation of attack vectors within an organization’s I...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Domain Hijacking and How to Prevent
Jul 26, 2022
What is Domain Hijacking and How to Prevent

What is Domain Hijacking and How to Prevent Domain hijacking attacks can have many damaging consequences, such as the exposure of sensitive data and financial and reputational damage to organizations....

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Tools for Phishing Domain Detection
Jul 25, 2022
Top 5 Tools for Phishing Domain Detection

Top 5 Tools for Phishing Domain Detection Phishing attacks have victimized many users and companies for years, and it seems they will continue to do so. Many security measures have been taken against ...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Deep Web Monitoring?
Jul 22, 2022
What is Deep Web Monitoring?

What is Deep Web Monitoring? There are a variety of network monitoring and perimeter protection solutions available for both personal and commercial networks. Nevertheless, even the most protected bus...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is BEC Attack and How to Prevent it?
Jul 21, 2022
What is BEC Attack and How to Prevent it?

What is BEC Attack and How to Prevent it? BEC attack is a type of social engineering attack that takes place over email and the attacker aims for financial gain. Often, attackers aim to trick employee...

Learn More