SOCRadar® Cyber Intelligence Inc. | What is the Risk-Based Approach to Cybersecurity?
May 12, 2022
What is the Risk-Based Approach to Cybersecurity?

What is the Risk-Based Approach to Cybersecurity? Cybersecurity is one of the main topics for business managers in today’s world. The approach to cyber risks has changed from “maturity bas...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are the Top Ten Data Breaches of All Times?
May 06, 2022
What are the Top Ten Data Breaches of All Times?

What are the Top Ten Data Breaches of All Times? In the cyber world that grows and develops with cumulative data accumulation, “small” and short-term data breaches that we think we can ignore from tim...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are STIX/TAXII?
May 04, 2022
What are STIX/TAXII?

What are STIX/TAXII? The industry standard for sharing threat intelligence, STIX/TAXII is a great starting point for anyone new to threat intelligence. Technically speaking, STIX and TAXII a...

Learn More
SOCRadar® Cyber Intelligence Inc. | Real-Life Examples of Machine Learning in Cybersecurity
May 02, 2022
Real-Life Examples of Machine Learning in Cybersecurity

Real-Life Examples of Machine Learning in Cybersecurity ...

Learn More
SOCRadar® Cyber Intelligence Inc. | Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity
Apr 28, 2022
Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity

Behind the Experts’ Perspective: Ethical Issues Behind Cybersecurity Since the beginning of internet history, hackers have sought to exploit it for various purposes, ranging from pranks to theft and e...

Learn More
SOCRadar® Cyber Intelligence Inc. | How to Use SOCRadar Integrations?
Apr 19, 2022
How to Use SOCRadar Integrations?

How to Use SOCRadar Integrations? SOCRadar provides integrations with product groups such as SIEM, SOAR, EDR, firewalls, Threat Intelligence Platforms, Vulnerability Management, Ticketing, and Team Me...

Learn More
SOCRadar® Cyber Intelligence Inc. | Comparing Benefits from Different Security Monitoring Services
Apr 18, 2022
Comparing Benefits from Different Security Monitoring Services

Comparing Benefits from Different Security Monitoring Services By 2021, it is estimated that the total cost of cybercrime was 6 trillion USD making threat actors the third-largest economy after the U....

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need To Know About Cybersecurity in Power Grids
Apr 15, 2022
What Do You Need To Know About Cybersecurity in Power Grids

What Do You Need To Know About Cybersecurity in Power Grids Cyberattacks on the electrical power system are becoming as disruptive as natural disasters, and the danger is growing as power grids become...

Learn More
SOCRadar® Cyber Intelligence Inc. | 20 SOCRadar Notifications That Will Make You Feel Safer
Apr 08, 2022
20 SOCRadar Notifications That Will Make You Feel Safer

20 SOCRadar Notifications That Will Make You Feel Safer SOCRadar presents its detections through the alarm mechanism and adds new alarms to the system every day to provide safer conditions. In additio...

Learn More
SOCRadar® Cyber Intelligence Inc. | What are the Biggest Cybersecurity Risks in North America?
Apr 06, 2022
What are the Biggest Cybersecurity Risks in North America?

What are the Biggest Cybersecurity Risks in North America? The ongoing Russian invasion attempt of Ukraine has changed priorities on the global cyberattack surface. Experts talk about the necessity of...

Learn More
SOCRadar® Cyber Intelligence Inc. | Microsoft Exchange Server Cyberattack Timeline
Apr 04, 2022
Microsoft Exchange Server Cyberattack Timeline

Microsoft Exchange Server Cyberattack Timeline Microsoft Exchange Server is a mail calendaring server developed by Microsoft. Microsoft Exchange is considered an essential goal for hackers to control ...

Learn More
SOCRadar® Cyber Intelligence Inc. | 5 Things You Should Know About the Genesis Marketplace
Apr 01, 2022
5 Things You Should Know About the Genesis Marketplace

5 Things You Should Know About the Genesis Marketplace [April 5, 2023] Update: Law enforcement has seized the Genesis Market domains. The FBI has taken down the domains for the major marketplace Genes...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is Extended Threat Intelligence (XTI) and How Does it Make a Difference?
Mar 28, 2022
What is Extended Threat Intelligence (XTI) and How Does it Make a Diff...

What is Extended Threat Intelligence (XTI) and How Does it Make a Difference? Every day we hear news about industries negatively impacted by cyberattacks. It seems that conventional threat intell...

Learn More
SOCRadar® Cyber Intelligence Inc. | What Do You Need To Know About Vulnerability Intelligence
Mar 17, 2022
What Do You Need To Know About Vulnerability Intelligence

What Do You Need To Know About Vulnerability Intelligence A vulnerability is a weakness in computer software or hardware that allows an attacker to gain access to higher privilege levels. This could l...

Learn More
SOCRadar® Cyber Intelligence Inc. | ISO 27002 and Threat Intelligence: The New Security Standard
Mar 10, 2022
ISO 27002 and Threat Intelligence: The New Security Standard

ISO 27002 and Threat Intelligence: The New Security Standard ...

Learn More
SOCRadar® Cyber Intelligence Inc. | How Can You Avoid Potential Attacks with SOCRadar Integrations?
Feb 24, 2022
How Can You Avoid Potential Attacks with SOCRadar Integrations?

How Can You Avoid Potential Attacks with SOCRadar Integrations? Today’s blog post is about API services, security solutions, and integrations that SOCRadar offers. You can access the SOCRadar API docu...

Learn More
SOCRadar® Cyber Intelligence Inc. | What is The Intelligence Cycle?  
Jan 31, 2022
What is The Intelligence Cycle?  

What is The Intelligence Cycle?   The whole activity of leading the intelligence cycle, which is a collection of procedures used to convey decision-useful information (intelligence) to leaders, is ref...

Learn More
SOCRadar® Cyber Intelligence Inc. | Top 5 Cyberspace Search Engines Used by Security Researchers
Sep 14, 2021
Top 5 Cyberspace Search Engines Used by Security Researchers

Top 5 Cyberspace Search Engines Used by Security Researchers We are all familiar with the concept of internet search engines such as Google, Bing, Safari, and even Yahoo. But what if you looking for i...

Learn More
SOCRadar® Cyber Intelligence Inc. | 10 Things You Need to Know About CSM (Continuous Security Monitoring) for SOC Environments
Apr 26, 2021
10 Things You Need to Know About CSM (Continuous Security Monitoring) ...

10 Things You Need to Know About CSM (Continuous Security Monitoring) for SOC Environments Defense teams are switching from preventative ideology to early detection and rapid reaction in order to conf...

Learn More
SOCRadar® Cyber Intelligence Inc. | CTI is So Critical to SOC Teams for DNS Security
Feb 08, 2021
CTI is So Critical to SOC Teams for DNS Security

CTI is So Critical to SOC Teams for DNS Security Google reported that it served more than 400 billion DNS queries per day.[1] Furthermore, Let’s Encrypt issues around 600,000 digital certificates per ...

Learn More